Skip to content

Commit 7413a86

Browse files
authored
Merge branch 'main' into dex-h-update
2 parents 329138d + b285309 commit 7413a86

File tree

4 files changed

+21
-27
lines changed

4 files changed

+21
-27
lines changed

CloudAppSecurityDocs/protect-egnyte.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
7979
>[!NOTE]
8080
>- Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
8181
>
82-
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
82+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more information, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
8383
8484
## Next steps
8585

defender-endpoint/enable-network-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 10/14/2024
6+
ms.date: 01/22/2025
77
ms.topic: conceptual
88
author: denisebmsft
99
ms.author: deniseb
@@ -84,8 +84,8 @@ To enable network protection, you can use one of the following methods:
8484

8585
| Windows Server version | Commands |
8686
|---|---|
87-
| Windows Server 2022 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88-
| Windows Server 2016 <br/>Windows Server 2012 R2 | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
87+
| Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88+
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
8989

9090
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
9191

defender-endpoint/ios-troubleshoot.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 12/02/2024
17+
ms.date: 01/22/2025
1818
---
1919

2020
# Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
@@ -48,8 +48,8 @@ While enabled by default, there might be some cases that require you to disable
4848

4949
3. Toggle off **Connect On Demand** to disable VPN.
5050

51-
> [!div class="mx-imgBorder"]
52-
> :::image type="content" source="media/ios-vpn-config.png" alt-text="The Connect on demand option" lightbox="media/ios-vpn-config.png":::
51+
> [!div class="mx-imgBorder"]
52+
> :::image type="content" source="media/ios-vpn-config.png" alt-text="The Connect on demand option" lightbox="media/ios-vpn-config.png":::
5353
5454
> [!NOTE]
5555
> Web Protection isn't available when VPN is disabled. To re-enable Web Protection, open the Defender for Endpoint app on the device and enable Web Protection.
@@ -127,13 +127,11 @@ If a user faces an issue that isn't already addressed in the above sections or i
127127

128128
1. Open the MS Defender app on the iOS/iPadOS device.
129129

130-
2. Select the menu (profile icon) on the top-left corner, and then select **Send Feedback**.
130+
2. Select the menu (profile icon) on the top-left corner, and then select **Help and Feedback**.
131131

132-
3. Choose from the given options. To report an issue, select **I don't like something**.
132+
3. Choose from the given options. Under troubleshooting, select **Send Logs to Microsoft**.
133133

134-
Provide details of the issue that you're facing and check **Send diagnostic data**. We recommend that you include your email address so that the team can contact you for a solution or a follow-up.
135-
136-
4. Select **Submit** to successfully send your feedback.
134+
4. Share Incident ID to your support engineer.
137135

138136
2. Users can use the following steps to send feedback if they are having sign in issues or the **Send Feedback** option is disabled (example GCC customers):
139137

defender-xdr/investigate-alerts.md

Lines changed: 11 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,24 @@
11
---
22
title: Investigate alerts in Microsoft Defender XDR
33
description: Investigate alerts seen across devices, users, and mailboxes.
4-
keywords: incidents, alerts, investigate, analyze, response, correlation, attack, machines, devices, users, identities, identity, mailbox, email, 365, microsoft, m365
54
ms.service: defender-xdr
6-
ms.mktglfcycl: deploy
7-
ms.sitesec: library
8-
ms.pagetype: security
95
f1.keywords:
10-
- NOCSH
6+
- NOCSH
117
ms.author: diannegali
128
author: diannegali
139
ms.localizationpriority: medium
1410
manager: deniseb
1511
audience: ITPro
1612
ms.collection:
17-
- m365-security
18-
- m365initiative-m365-defender
19-
- tier1
13+
- m365-security
14+
- m365initiative-m365-defender
15+
- tier1
2016
ms.custom: admindeeplinkDEFENDER
2117
ms.topic: conceptual
2218
search.appverid:
23-
- MOE150
24-
- met150
25-
ms.date: 1/17/2025
19+
- MOE150
20+
- met150
21+
ms.date: 01/17/2025
2622
---
2723

2824
# Investigate alerts in Microsoft Defender XDR
@@ -192,10 +188,9 @@ The **Manage alert** pane allows you to view or specify:
192188
- A comment on the alert.
193189

194190
> [!NOTE]
195-
> Around August 29th, 2022, previously supported alert determination values ('Apt' and 'SecurityPersonnel') will be deprecated and no longer available via the API.
196-
197-
> [!NOTE]
198-
> One way of managing alerts it through the use of tags. The tagging capability for Microsoft Defender for Office 365 is incrementally being rolled out and is currently in preview.
191+
> - In August 2022, previously supported alert determination values (`Apt` and `SecurityPersonnel`) were deprecated and are no longer available via the API.
192+
>
193+
> - One way of managing alerts it through the use of tags. The tagging capability for Microsoft Defender for Office 365 is currently in preview, rolling out incrementally.
199194
>
200195
> Currently, modified tag names are only applied to alerts created *after* the update. Alerts that were generated before the modification will not reflect the updated tag name.
201196
@@ -288,6 +283,7 @@ Create alert tuning rules from the Microsoft Defender XDR **Settings** area or f
288283

289284
> [!NOTE]
290285
> The **alert title (Name)** is based on the **alert type (IoaDefinitionId)**, which decides the alert title. Two alerts that have the same alert type can change to a different alert title.
286+
> The *Hide alert* feature is only available in Defender for Endpoint alerts.
291287
292288
<!--what does this mean?-->
293289

0 commit comments

Comments
 (0)