You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/caac-known-issues.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,27 +119,26 @@ When a session policy is enforced using Edge in-browser protection and the user
119
119
120
120
Example Scenario:
121
121
122
-
A user was originally assigned a CA policy for the Salesforce application, along with an Defender for Cloud apps session policy that blocked file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
122
+
A user was originally assigned a CA policy for Salesforce along with a Defender for Cloud Apps session policy to block file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
123
123
124
124
Although the admin later removed the CA policy, the user still experiences the download block in Edge due to cached policy data.
125
125
126
126
Mitigation Options:
127
127
128
128
Option 1: Automatic cleanup
129
-
1. Reassign the user/app to the CA policy.
130
-
2.Remove the corresponding Defender for Cloud Apps session policy.
131
-
3. Have the user access the application using Edge, this will trigger the policy removal automatically.
132
-
4.Remove the CA policy again.
129
+
1. Add the user/app back into the scope of the CA policy.
130
+
2.Remove the corresponding Defender for Cloud Apps session policy.
131
+
3. Wait for users to access the application using Edge. This will automatically trigger the policy removal.
132
+
4.Remove the user/app from the scope of the CA policy.
133
133
134
-
Option 2: Manual cleanup
135
-
1. Delete the cached policy file
136
-
- Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
137
-
- Delete the file: mda_store.txt
138
-
139
-
2. Remove the work profile in Edge
140
-
- Open Microsoft Edge.
141
-
- Navigate to Profile Settings.
142
-
- Delete the work profile associated with the outdated session policy.
134
+
Option 2: Delete the cached policy file (Manual cleanup)
135
+
1. Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
136
+
2. Delete the file: mda_store.txt
137
+
138
+
Option 3: Remove the work profile in Edge (Manual cleanup)
139
+
1. Open Edge.
140
+
2. Navigate to Profile Settings.
141
+
3. Delete the work profile associated with the outdated session policy.
143
142
144
143
These steps will force a policy refresh and resolve enforcement issues related to outdated session policies.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+3-69Lines changed: 3 additions & 69 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,29 +179,6 @@ From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're
179
179
- For Android Enterprise with a work profile, only apps installed on the work profile will be supported.
180
180
- For other BYOD modes, by default, vulnerability assessment of apps will **not** be enabled. However, when the device is on administrator mode, admins can explicitly enable this feature through Microsoft Intune to get the list of apps installed on the device. For more information, see details below.
181
181
182
-
### Configure privacy for device administrator mode
183
-
184
-
Use the following steps to **enable vulnerability assessment of apps** from devices in **device administrator** mode for targeted users.
185
-
186
-
> [!NOTE]
187
-
> By default, this is turned off for devices enrolled with device admin mode.
188
-
189
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
201
-
- Value: Enter 0 to disable privacy setting (By default, the value is 1)
202
-
203
-
4. Select **Next** and assign this profile to targeted devices/users.
204
-
205
182
### Configure privacy for Android Enterprise work profile
206
183
207
184
Defender for Endpoint supports vulnerability assessment of apps in the work profile. However, in case you want to turn off this feature for targeted users, you can use the following steps:
@@ -222,28 +199,6 @@ Turning the above privacy controls on or off won't affect the device compliance
222
199
223
200
Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
224
201
225
-
### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
226
-
227
-
Use the following steps to turn it on for targeted users:
228
-
229
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
241
-
- Value: Enter 1 to enable privacy setting. The default value is 0.
242
-
243
-
4. Select **Next** and assign this profile to targeted devices/users.
244
-
245
-
Using this privacy control won't affect the device compliance check or conditional access.
246
-
247
202
### Configure privacy for phishing alert report on Android Enterprise work profile
248
203
249
204
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -263,28 +218,6 @@ Turning the above privacy controls on or off won't affect the device compliance
263
218
264
219
Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
265
220
266
-
### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
267
-
268
-
Use the following steps to turn it on for targeted users:
269
-
270
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
282
-
- Value: Enter 1 to enable privacy setting. The default value is 0.
283
-
284
-
4. Select **Next** and assign this profile to targeted devices/users.
285
-
286
-
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
287
-
288
221
### Configure privacy for malware alert report on Android Enterprise work profile
289
222
290
223
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -308,9 +241,10 @@ Use the following steps to configure Disable out sign:
308
241
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
309
242
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
310
243
3. Select **Microsoft Defender for Endpoint** as the target app.
311
-
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
244
+
1. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
312
245
313
-
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
246
+
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles.
247
+
314
248
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
315
249
316
250
5. Select **Next** and assign this profile to targeted devices and users.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -384,6 +384,8 @@ Once the client versions are deployed to target iOS devices, processing starts.
384
384
385
385
> [!NOTE]
386
386
> If you're using SSL inspection solution within your iOS device, add the domain names `securitycenter.windows.com` (in commercial environments) and `securitycenter.windows.us` (in GCC environments) for threat and vulnerability management features to work.
387
+
>
388
+
> The TVM Privacy permission approval screen will only appear for Unsupervised and Non-Zero touch enabled devices. Even For Non-Zero touch enabled devices approval is __not required only on supervised devices__ where the `issupervised` key is configured
Copy file name to clipboardExpand all lines: defender-endpoint/mde-linux-prerequisites.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -176,7 +176,7 @@ For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Micro
176
176
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
177
177
178
178
- The mdatp RPM package requires `glibc >= 2.17`.
179
-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`.
179
+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`.
180
180
181
181
> [!NOTE]
182
182
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
@@ -188,7 +188,8 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
188
188
> For versions older than `101.25032.0000`, the following requirements apply:
189
189
> - RPM package needs: `mde-netfilter` and `pcre`
190
190
> - DEBIAN package needs: `mde-netfilter` and `libpcre3`
191
-
>
191
+
>
192
+
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
192
193
> The `mde-netfilter` package also has the following package dependencies:
193
194
> - For DEBIAN, the `mde-netfilter` package requires `libnetfilter-queue1` and `libglib2.0-0`
194
195
> - For RPM, the `mde-netfilter` package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-using-powershell.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ This guide provides the [Microsoft Defender Antivirus cmdlets](/powershell/modul
48
48
49
49
To use these cmdlets, open PowerShell as an administrator, run a command, and then press **Enter**.
50
50
51
-
You can check the status of all settings before you begin, or during your evaluation, by using the [Get-MpPreference PowerShell cmdlet](/powershell/module/defender/get-mppreference).
51
+
You can check the status of all settings before you begin, or during your evaluation, by using the [Get-MpPreference PowerShell cmdlet](/powershell/module/defender/get-mppreference), or by installing the [DefenderEval](https://www.powershellgallery.com/packages/DefenderEval/) module from the PowerShell Gallery and then using the `Get-DefenderEvaluationReport` command.
52
52
53
53
Microsoft Defender Antivirus indicates a detection through [standard Windows notifications](configure-notifications-microsoft-defender-antivirus.md). You can also [review detections in the Microsoft Defender Antivirus app](review-scan-results-microsoft-defender-antivirus.md).
0 commit comments