Skip to content

Commit 74612b8

Browse files
committed
Merge branch 'poliveria-entraid-10072025' of https://github.com/MicrosoftDocs/defender-docs-pr into poliveria-entraid-10072025
2 parents 95a56f2 + eb8a897 commit 74612b8

File tree

608 files changed

+3521
-3359
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

608 files changed

+3521
-3359
lines changed

.github/workflows/AutoLabelAssign.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,11 @@ jobs:
3030
with:
3131
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3232
AutoAssignUsers: 1
33-
AutoAssignReviewers: 1
33+
AutoAssignReviewers: 0
3434
AutoLabel: 1
3535
ExcludedUserList: '["user1", "user2"]'
3636
ExcludedBranchList: '["branch1", "branch2"]'
3737
secrets:
3838
AccessToken: ${{ secrets.GITHUB_TOKEN }}
3939
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}
40-
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}
40+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}

.openpublishing.redirection.defender-endpoint.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,11 @@
159159
"source_path": "defender-endpoint/mde-linux-arm.md",
160160
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",
161161
"redirect_document_id": false
162-
}
162+
},
163+
{
164+
"source_path": "defender-endpoint/contact-support.md",
165+
"redirect_url": "/defender-xdr/contact-defender-support",
166+
"redirect_document_id": false
167+
},
163168
]
164169
}

.openpublishing.redirection.defender-xdr.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -215,6 +215,16 @@
215215
"redirect_url": "/unified-secops-platform/mto-dashboard",
216216
"redirect_document_id": false
217217
},
218+
{
219+
"source_path": "defender-xdr/configure-deception.md",
220+
"redirect_url": "/defender-xdr/automatic-attack-disruption",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path": "defender-xdr/deception-overview.md",
225+
"redirect_url": "/defender-xdr/automatic-attack-disruption",
226+
"redirect_document_id": false
227+
},
218228
{
219229
"source_path": "defender-xdr/mto-endpoint-security-policy.md",
220230
"redirect_url": "/unified-secops-platform/mto-endpoint-security-policy",

advanced-threat-analytics/docfx.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242
"globalMetadata": {
4343
"feedback_system": "Standard",
4444
"author": "AbbyMSFT",
45-
"manager": "AbbyMSFT",
45+
"manager": "abbyweisberg",
4646
"ms.author": "abbyweisberg",
4747
"feedback_github_repo": "MicrosoftDocs/atadocs",
4848
"feedback_product_url": "https://techcommunity.microsoft.com/t5/Azure-Advanced-Threat-Protection/bd-p/AzureAdvancedThreatProtection",

defender-business/mdb-get-started.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ ms.collection:
1919
- tier1
2020
- essentials-get-started
2121
ms.custom: intro-get-started
22+
#customer intent: As a Defender for Business admin, I need quick guidance to navigate the Microsoft Defender portal and find first steps so I can get started securing devices and email.
2223
---
2324

2425
# Visit the Microsoft Defender portal

defender-endpoint/TOC.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -126,15 +126,13 @@
126126
- name: Step 2 - Configure device proxy and Internet settings
127127
href: configure-proxy-internet.md
128128
- name: Step 3 - Verify client connectivity to service URLs
129-
href: verify-connectivity.md
130-
131-
- name: Streamlined connectivity
132-
items:
133-
- name: Onboarding devices using streamlined method
134-
href: configure-device-connectivity.md
135-
- name: Migrating devices to streamlined method
129+
href: verify-connectivity.md
130+
- name: Onboard devices using streamlined method
131+
href: configure-device-connectivity.md
132+
- name: Migrate devices to streamlined method
136133
href: migrate-devices-streamlined.md
137-
134+
- name: Enable access to service URLs - US government
135+
href: streamlined-device-connectivity-urls-gov.md
138136
- name: Onboard client devices
139137
items:
140138
- name: Onboard client devices running Windows or macOS
@@ -285,6 +283,8 @@
285283
href: linux-deploy-defender-for-endpoint-using-golden-images.md
286284
- name: Direct onboarding with Defender for Cloud
287285
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
286+
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
287+
href: mde-linux-deployment-on-sap.md
288288
- name: Configure Defender for Endpoint on Linux
289289
items:
290290
- name: Configure security policies and settings

defender-endpoint/access-mssp-portal.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,6 @@ appliesto:
2222
# Access the Microsoft Defender XDR MSSP customer portal
2323

2424

25-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
26-
2725

2826
> [!IMPORTANT]
2927
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

defender-endpoint/admin-submissions-mde.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,6 @@ ms.custom: FPFN
2020

2121
# Submit files in Microsoft Defender for Endpoint
2222

23-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
24-
2523

2624
In Microsoft Defender for Endpoint, admins can use the unified submissions feature to submit files and file hashes (SHAs) to Microsoft for review. The unified submissions experience is a one-stop shop for submitting emails, URLs, email attachments, and files in one, easy-to-use submission experience. Admins can use the Microsoft Defender portal or the Microsoft Defender for Endpoint Alert page to submit suspicious files.
2725

defender-endpoint/advanced-features.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Configure advanced features in Microsoft Defender for Endpoint
33
description: Turn on advanced features such as block file in Microsoft Defender for Endpoint.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.reviewer: yongrhee
88
ms.localizationpriority: medium
99
manager: bagol
@@ -14,17 +14,14 @@ ms.collection:
1414
ms.topic: how-to
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 02/25/2025
17+
ms.date: 10/31/2025
1818
appliesto:
1919
- Microsoft Defender for Endpoint Plan 2
2020

2121
---
2222
# Configure advanced features in Defender for Endpoint
2323

2424

25-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
26-
27-
2825
Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Defender for Endpoint with.
2926

3027
## Enable advanced features
@@ -168,9 +165,9 @@ For more information about role assignments, see [Create and manage roles](user-
168165

169166
Enabling this feature allows you to run unsigned scripts in a live response session.
170167

171-
## Deception
168+
## Automatic attack disruption
172169

173-
Deception enables your security team to manage and deploy lures and decoys to catch attackers in your environment. After you turn this on, go to Rules > Deception rules to run deception campaigns. See [Manage the deception capability in Microsoft Defender XDR](/defender-xdr/deception-overview).
170+
Automatic attack disruption disrupts attacks by automatically containing compromised assets that the attacker is using. It limits lateral movement early on, thereby reducing the overall impact of an attack, both on the associated costs and on loss of productivity. At the same time, it leaves security operations teams in complete control of investigating, remediating, and bringing assets back online. For more information, see [Automatic attack disruption in Microsoft Defender XDR](/defender-xdr/automatic-attack-disruption).
174171

175172
## Share endpoint alerts with Microsoft Compliance Center
176173

defender-endpoint/aggregated-reporting.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,13 @@ ms.collection:
1212
- tier3
1313
ms.topic: article
1414
search.appverid: met150
15-
ms.date: 03/04/2025
15+
ms.date: 10/20/2025
1616
appliesto:
1717
- Microsoft Defender for Endpoint Plan 2
1818
---
1919

2020
# Aggregated reporting in Microsoft Defender for Endpoint
2121

22-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2322

2423
Aggregated reporting addresses constraints on event reporting in Microsoft Defender for Endpoint. Aggregated reporting extends signal reporting intervals to significantly reduce the size of reported events while preserving essential event properties.
2524

@@ -33,13 +32,16 @@ When aggregated reporting is turned on, you can query for a summary of all suppo
3332

3433
The following requirements must be met before turning on aggregated reporting:
3534

36-
- Defender for Endpoint Plan 2 license
3735
- Permissions to enable advanced features
3836

39-
Aggregated reporting supports the following:
4037

41-
- Client version: Windows version 24H and later
42-
- Operating systems: Windows 11 (22H2, Enterprise), Windows 10 (20H2, 21H1, 21H2), Windows Server 2019 and later, Windows Server version 20H2 or Azure Stack HCI OS, version 23H2 and later
38+
### Supported operating systems:
39+
40+
- Windows 10 (20H2, 21H1, 21H2)
41+
- Windows 11 (22H2, Enterprise)
42+
- Windows Server 2019 and later
43+
- Windows Server version 20H2 or Azure Stack HCI OS, version 23H2 and later
44+
- Client version: Windows version 24H and later
4345

4446
## Turn on aggregated reporting
4547

@@ -77,9 +79,9 @@ To query new data with aggregated reports:
7779
3. When necessary, create new custom rules to incorporate new action types.
7880
4. Go to the **Advanced Hunting** page and query the new data.
7981

80-
Here is an example of advanced hunting query results with aggregated reports.
82+
Here is an example of advanced hunting query results with aggregated reports.
8183

82-
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports-small.png" alt-text="Screenshot of advanced hunting query results with aggregated reports." lightbox="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports.png":::
84+
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports-small.png" alt-text="Screenshot of advanced hunting query results with aggregated reports." lightbox="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports.png":::
8385

8486
## Sample advanced hunting queries
8587

@@ -125,4 +127,4 @@ DeviceNetworkEvents
125127
| where uniqueEventsAggregated > 10
126128
| project-reorder ActionType, Timestamp, uniqueEventsAggregated
127129
| sort by uniqueEventsAggregated desc
128-
```
130+
```

0 commit comments

Comments
 (0)