Skip to content

Commit 73f0e40

Browse files
committed
mange incident settings - Yotam
2 parents 7ef8e81 + d61a47d commit 73f0e40

File tree

7 files changed

+36
-52
lines changed

7 files changed

+36
-52
lines changed

defender-endpoint/ios-whatsnew.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3333

3434
| Build| 1.1.70230101|
3535
| -------- | -------- |
36-
| Release Date |October 30, 2025|
36+
| Release Date |October 28, 2025|
3737

3838
**What's New**
3939

defender-endpoint/linux-install-manually.md

Lines changed: 2 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: install-set-up-deploy
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 08/11/2025
18+
ms.date: 11/03/2025
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -492,27 +492,7 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
492492

493493
## Defender for Endpoint package external package dependencies
494494

495-
The following external package dependencies exist for the `mdatp` package:
496-
497-
- The mdatp RPM package requires `glibc >= 2.17`
498-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`
499-
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`
500-
501-
> [!NOTE]
502-
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
503-
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following other dependencies on the auditd package exist for mdatp:
504-
> - The mdatp RPM package requires `audit`, `semanage`.
505-
> - For DEBIAN, the mdatp package requires `auditd`.
506-
> - For Mariner, the mdatp package requires `audit`.
507-
> For version older than `101.25032.0000`:
508-
> - RPM package needs: `mde-netfilter`, `pcre`
509-
> - DEBIAN package needs: `mde-netfilter`, `libpcre3`
510-
> - The `mde-netfilter` package also has the following package dependencies:
511-
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
512-
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
513-
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
514-
515-
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
495+
For information, see [Prerequisites for Microsoft Defender for Endpoint on Linux: External package dependency](./mde-linux-prerequisites.md#external-package-dependency).
516496

517497
## Troubleshoot installation issues
518498

defender-endpoint/onboard-downlevel.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -91,9 +91,9 @@ Review the following details to verify minimum system requirements:
9191
> Due to the [deprecation of SHA-1 support by the MMA agent](/azure/azure-monitor/agents/agent-windows#sha-2-code-signing-support-requirement), the MMA agent needs to be version 10.20.18029 or newer.
9292
9393
2. Obtain the workspace ID:
94-
- In the Defender for Endpoint navigation pane, select **Settings > Device management > Onboarding**
95-
- Select the operating system
96-
- Copy the workspace ID and workspace key
94+
- In the Defender for Endpoint navigation pane, select **Settings > Device management > Onboarding**.
95+
- Select the operating system.
96+
- Copy the workspace ID and workspace key.
9797

9898
3. Using the Workspace ID and Workspace key choose any of the following installation methods to install the agent:
9999
- [Manually install the agent using setup](/previous-versions/azure/azure-monitor/agents/agent-windows?tabs=setup-wizard#install-the-agent).
@@ -145,10 +145,10 @@ After completing the onboarding steps, you'll need to [Configure and update Syst
145145
Verify that Microsoft Defender Antivirus and Microsoft Defender for Endpoint are running.
146146

147147
> [!NOTE]
148-
> Running Microsoft Defender Antivirus is not required but it is recommended. If another antivirus vendor product is the primary endpoint protection solution, you can run Defender Antivirus in Passive mode. You can only confirm that passive mode is on after verifying that Microsoft Defender for Endpoint sensor (SENSE) is running.
148+
> Running Microsoft Defender Antivirus isn't required but it's recommended. If another antivirus vendor product is the primary endpoint protection solution, you can run Defender Antivirus in Passive mode. You can only confirm that passive mode is on after verifying that Microsoft Defender for Endpoint sensor (SENSE) is running.
149149
150150
> [!NOTE]
151-
> As Microsoft Defender Antivirus is only supported for Windows 10 and Windows 11, step 1 does not apply when running Windows Server 2008 R2 SP1.
151+
> As Microsoft Defender Antivirus is only supported for Windows 10 and Windows 11, step 1 doesn't apply when running Windows Server 2008 R2 SP1.
152152
153153
1. Run the following command to verify that Microsoft Defender Antivirus is installed:
154154

@@ -181,16 +181,16 @@ Follow the steps in [Run a detection test on a newly onboarded device](run-detec
181181

182182
For Windows Server 2008 R2 SP1, following updates are also required:
183183

184-
February 2018 Monthly Roll up - KB4074598 (Windows Server 2008 R2)
184+
- February 2018 Monthly Roll up - KB4074598 (Windows Server 2008 R2)
185185

186-
[Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4074598)<br>
187-
Download updates for Windows Server 2008 R2 x64
186+
- [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4074598)<br>
187+
- Download updates for Windows Server 2008 R2 x64
188188

189-
.NET Framework 3.5.1 (KB315418)<br>
190-
[For Windows Server 2008 R2 x64](/iis/install/installing-iis-7/install-windows-server-2008-and-windows-server-2008-r2)
189+
- .NET Framework 3.5.1 (KB315418)<br>
190+
- [For Windows Server 2008 R2 x64](/iis/install/installing-iis-7/install-windows-server-2008-and-windows-server-2008-r2)
191191

192192
> [!NOTE]
193-
> This article assumes you are using x64-based servers (MMA Agent .exe x64 New SHA-2 compliant version).
193+
> This article assumes you're using x64-based servers (MMA Agent .exe x64 New SHA-2 compliant version).
194194
195195
**Step 2: Create a file name DeployMMA.cmd (using notepad)**
196196
Add the following lines to the cmd file. Note that you'll need your WORKSPACE ID and KEY.
@@ -223,22 +223,22 @@ Create a new group policy specifically for onboarding devices such as "Microsoft
223223

224224
- Create a Group Policy Folder named "c:\windows\MMA"
225225

226-
:::image type="content" source="media/grppolicyconfig1.png" alt-text="The folders location" lightbox="media/grppolicyconfig1.png":::
226+
:::image type="content" source="media/grppolicyconfig1.png" alt-text="Screenshot of the folders location." lightbox="media/grppolicyconfig1.png":::
227227

228228
**This will add a new folder on every server that gets the GPO applied, called MMA, and will be stored in c:\windows. This will contain the installation files for the MMA, prerequisites, and install script.**
229229

230230
- Create a Group Policy Files preference for each of the files stored in Net logon.
231231

232-
:::image type="content" source="media/grppolicyconfig2.png" alt-text="The group policy - 1" lightbox="media/grppolicyconfig2.png":::
232+
:::image type="content" source="media/grppolicyconfig2.png" alt-text="Screenshot of the group policy - 1." lightbox="media/grppolicyconfig2.png":::
233233

234234
It copies the files from DOMAIN\NETLOGON\MMA\filename to
235235
C:\windows\MMA\filename - **so the installation files are local to the server**:
236236

237-
:::image type="content" source="media/deploymma.png" alt-text="The deploy mma cmd properties" lightbox="media/deploymma.png":::
237+
:::image type="content" source="media/deploymma.png" alt-text="Screenshot of the deploy mma cmd properties." lightbox="media/deploymma.png":::
238238

239239
Repeat the process but create item level targeting on the COMMON tab, so the file only gets copied to the appropriate platform/Operating system version in scope:
240240

241-
:::image type="content" source="media/targeteditor.png" alt-text="The target editor" lightbox="media/targeteditor.png":::
241+
:::image type="content" source="media/targeteditor.png" alt-text="Screenshot of the target editor." lightbox="media/targeteditor.png":::
242242

243243
For Windows Server 2008 R2 you'll need (and it will only copy down) the following:
244244

@@ -248,9 +248,9 @@ For Windows Server 2008 R2 you'll need (and it will only copy down) the followin
248248

249249
Once this is done, you'll need to create a start-up script policy:
250250

251-
:::image type="content" source="media/startupprops.png" alt-text="The start up properties" lightbox="media/startupprops.png":::
251+
:::image type="content" source="media/startupprops.png" alt-text="Screenshot of the start up properties." lightbox="media/startupprops.png":::
252252

253-
The name of the file to run here is c:\windows\MMA\DeployMMA.cmd.
253+
The name of the file to run here's c:\windows\MMA\DeployMMA.cmd.
254254
Once the server is restarted as part of the start-up process it will install the Update for customer experience and diagnostic telemetry KB, and then install the MMA Agent, while setting the Workspace ID and Key, and the server will be onboarded.
255255

256256
You could also use an **immediate task** to run the deployMMA.cmd if you don't want to reboot all the servers.
@@ -259,21 +259,21 @@ This could be done in two phases. First create **the files and the folder in** G
259259

260260
As the Script has an exit method and won't re-run if the MMA is installed, you could also use a daily scheduled task to achieve the same result. Similar to a Configuration Manager compliance policy it will check daily to ensure the MMA is present.
261261

262-
:::image type="content" source="media/schtask.png" alt-text="schedule task" lightbox="media/schtask.png":::
262+
:::image type="content" source="media/schtask.png" alt-text="Screenshot of the schedule task." lightbox="media/schtask.png":::
263263

264-
:::image type="content" source="media/newtaskprops.png" alt-text="The new task properties" lightbox="media/newtaskprops.png":::
264+
:::image type="content" source="media/newtaskprops.png" alt-text="Screenshot of the new task properties." lightbox="media/newtaskprops.png":::
265265

266-
:::image type="content" source="media/deploymmadowmload.png" alt-text="The deploy mma download properties" lightbox="media/deploymmadowmload.png":::
266+
:::image type="content" source="media/deploymmadowmload.png" alt-text="Screenshot of the deploy mma download properties." lightbox="media/deploymmadowmload.png":::
267267

268-
:::image type="content" source="media/tasksch.png" alt-text="The task scheduler" lightbox="media/tasksch.png":::
268+
:::image type="content" source="media/tasksch.png" alt-text="Screenshot of the task scheduler." lightbox="media/tasksch.png":::
269269

270270
As mentioned in the onboarding documentation for Server specifically around Server 2008 R2 please see below:
271271
For Windows Server 2008 R2 SP1, ensure that you fulfill the following requirements:
272272

273273
- Install the [February 2018 monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
274274
- Install either [.NET framework 4.5](https://www.microsoft.com/download/details.aspx?id=30653) (or later) or [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework)
275275

276-
Please check the KBs are present before onboarding Windows Server 2008 R2. This process allows you to onboard all the servers if you don't have Configuration Manager managing Servers.
276+
Check the KBs are present before onboarding Windows Server 2008 R2. This process allows you to onboard all the servers if you don't have Configuration Manager managing Servers.
277277

278278
## Offboard endpoints
279279

@@ -303,7 +303,7 @@ You can use either of the following methods:
303303

304304
2. Select the Defender for Endpoint workspace, and click **Remove**.
305305

306-
:::image type="content" source="media/atp-mma.png" alt-text="The Workspaces pane" lightbox="media/atp-mma.png":::
306+
:::image type="content" source="media/atp-mma.png" alt-text="Screenshot of the Workspaces pane." lightbox="media/atp-mma.png":::
307307

308308
#### Run a PowerShell command to remove the configuration
309309

defender-for-cloud-apps/network-requirements.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,8 @@ title: Network requirements
33
description: This article describes the IP addresses and ports you need to open to work with Defender for Cloud Apps.
44
ms.date: 04/06/2025
55
ms.topic: reference
6+
author: AbbyMSFT
7+
ms.author: abbyweisberg
68
---
79

810
# Network requirements

defender-for-identity/troubleshooting-known-issues.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -291,7 +291,7 @@ The gMSA configured for this domain controller or AD FS / AD CS server doesn't h
291291

292292
**Resolution:**
293293

294-
Add the gMSA to the **Performance Monitor Users** group on the server.
294+
Add the gMSA to the **Performance Log Users** group on the server.
295295

296296
## Report downloads can't contain more than 300,000 entries
297297

defender-vulnerability-management/tvm-microsoft-secure-score-devices.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ Select a category to go to the [**Security recommendations**](tvm-security-recom
4040
> [!TIP]
4141
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
4242
43+
Unmanaged devices (devices not enrolled in management solutions like Intune or Azure AD) do count towards your Secure Score but are typically marked as non-compliant for several security checks. These devices may lower your score, especially if they fail critical security assessments such as anti-malware status, patch management, and encryption requirements. It's recommended to bring these devices under management to improve both security posture and Secure Score.
44+
4345
## How it works
4446

4547
> [!NOTE]

defender-xdr/security-copilot-m365d-incident-summary.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -85,10 +85,10 @@ To summarize an incident:
8585

8686
### Manage Copilot incident summaries settings (preview)
8787

88-
By default, Copilot generates a summary for each incident, but you can change this setting to display incident summaries only in specific instances. You can choose to have summaries generated:
88+
By default, Copilot generates a summary for each incident the user opens, but you can change this setting to display incident summaries only in specific instances. You can choose to have summaries generated:
8989

90-
- Always
91-
- Based on the severity level of the incident
90+
- Always (for every incident opened)
91+
- Based on the severity level of the incident
9292
- On demand only
9393

9494
To change the settings for Copilot incident summaries in Microsoft Sentinel, follow these steps:
@@ -105,11 +105,11 @@ To change the settings for Copilot incident summaries in Microsoft Sentinel, fol
105105

106106
1. Select **Save**.
107107

108-
- When you select **Incident severity**, an estimate of the number of incidents of each severity level reviewed per day is displayed, along with the estimated SCU cost.
108+
- When you select **Incident severity**, an estimate of the number of incidents of each severity level reviewed per day is displayed, along with the estimated SCU consumption.
109109

110110
:::image type="content" source="./media/security-copilot-m365d-incident-summary/incident-severity.png" alt-text="Screenshot that shows the approximate number of incidents of each severity level.":::
111111

112-
- Copilot saves generated incident summaries for a week. If you select an incident whose summary is in the cache, the summary is automatically redisplayed at no cost regardless of the setting.
112+
- Copilot saves generated incident summaries for a week. If you select an incident whose summary is in the cache, and the incident hasn't changed significantly, the summary is automatically redisplayed at no cost regardless of the setting.
113113
- To generate a summary on demand for an incident that's not automatically generated, select the **Generate** button.
114114

115115
:::image type="content" source="media/security-copilot-m365d-incident-summary/generate-summary.png" alt-text="Screenshot that shows the Generate summary button on the incident page.":::

0 commit comments

Comments
 (0)