You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/protect-egnyte.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ This section describes how to connect Microsoft Defender for Cloud Apps to your
79
79
>[!NOTE]
80
80
>- Microsoft recommends using a short lived access token. Egnyte doesn't currently support short lived tokens. We recommend our customers to refresh the access token every 6 months as a security best practice. To refresh the access token, revoke the old token by following [Revoking an oAuth token](https://developers.egnyte.com/docs/read/Public_API_Authentication#Revoking-an-OAuth-Token). Once the old token is revoked, reconnect the Egnyte connector by following the process documented above.
81
81
>
82
-
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more infomration, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
82
+
>- Defender for Cloud Apps intentionally provides a lower rate limit than Egnyte's maximum to avoid exceeding the API constraints. For more information, see the relevant Egnyte documentation: [Rate limiting](https://developers.egnyte.com/docs/read/Best_Practices) | [Audit Reporting API v2](https://developers.egnyte.com/docs/read/Audit_Reporting_API_V2)
Copy file name to clipboardExpand all lines: defender-endpoint/enable-network-protection.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
3
3
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 10/14/2024
6
+
ms.date: 01/22/2025
7
7
ms.topic: conceptual
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -84,8 +84,8 @@ To enable network protection, you can use one of the following methods:
84
84
85
85
| Windows Server version | Commands |
86
86
|---|---|
87
-
| Windows Server 2022 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`|
88
-
| Windows Server 2016 <br/>Windows Server 2012 R2 |`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true`|
87
+
| Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`|
88
+
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true`|
89
89
90
90
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
Copy file name to clipboardExpand all lines: defender-endpoint/ios-troubleshoot.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: ios
16
16
search.appverid: met150
17
-
ms.date: 12/02/2024
17
+
ms.date: 01/22/2025
18
18
---
19
19
20
20
# Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
@@ -48,8 +48,8 @@ While enabled by default, there might be some cases that require you to disable
48
48
49
49
3. Toggle off **Connect On Demand** to disable VPN.
50
50
51
-
> [!div class="mx-imgBorder"]
52
-
> :::image type="content" source="media/ios-vpn-config.png" alt-text="The Connect on demand option" lightbox="media/ios-vpn-config.png":::
51
+
> [!div class="mx-imgBorder"]
52
+
> :::image type="content" source="media/ios-vpn-config.png" alt-text="The Connect on demand option" lightbox="media/ios-vpn-config.png":::
53
53
54
54
> [!NOTE]
55
55
> Web Protection isn't available when VPN is disabled. To re-enable Web Protection, open the Defender for Endpoint app on the device and enable Web Protection.
@@ -127,13 +127,11 @@ If a user faces an issue that isn't already addressed in the above sections or i
127
127
128
128
1. Open the MS Defender app on the iOS/iPadOS device.
129
129
130
-
2. Select the menu (profile icon) on the top-left corner, and then select **Send Feedback**.
130
+
2. Select the menu (profile icon) on the top-left corner, and then select **Help and Feedback**.
131
131
132
-
3. Choose from the given options. To report an issue, select **I don't like something**.
132
+
3. Choose from the given options. Under troubleshooting, select **Send Logs to Microsoft**.
133
133
134
-
Provide details of the issue that you're facing and check **Send diagnostic data**. We recommend that you include your email address so that the team can contact you for a solution or a follow-up.
135
-
136
-
4. Select **Submit** to successfully send your feedback.
134
+
4. Share Incident ID to your support engineer.
137
135
138
136
2. Users can use the following steps to send feedback if they are having sign in issues or the **Send Feedback** option is disabled (example GCC customers):
-[Microsoft Defender Experts for XDR](dex-xdr-overview.md)
31
32
32
-
This document outlines the key infrastructure requirements you must meet and important information on data access and compliance you must know before purchasing the Microsoft Defender Experts for Hunting service. Microsoft understands that customers who use our managed services entrust us with their most valued asset, their data.
33
+
[Microsoft Defender Experts for Hunting](defender-experts-for-hunting.md) is a managed service that provides hunting capabilities for novel emerging threats that aren't yet well known in the industry. The analysts for the hunting service review trends in the threat actor evolution based on world-renowned Microsoft Threat Intelligence and Research. They then apply the insights they gather to hunt for emerging attack vectors within the customer ecosystem.
34
+
35
+
With deep product expertise powered by threat intelligence, we're uniquely positioned to help you:
33
36
34
-
## Check if your environment meets licensing and access prerequisites
37
+
1. Focus on novel threat actor evolution in the context of your ecosystem.
38
+
1. Get detailed, step-by-step, and actionable guidance from our experts so you can respond to these emerging threats.
39
+
1.[Seek assistance](#ask-defender-experts) from Defender Experts.
35
40
36
-
Microsoft Defender Experts for Hunting is a separate service from your existing Defender products. Before enrolling in this service, make sure that you have the necessary license and access.
41
+
This document outlines the key infrastructure requirements you must meet and important information on data access and compliance you must know before purchasing the Microsoft Defender Experts for Hunting service. Microsoft understands that customers who use our managed services entrust us with their most valued asset, their data.
37
42
38
-
###Eligibility and licensing
43
+
## Eligibility and licensing
39
44
40
-
To enable us to get started with this threat hunting service, we require the following licensing prerequisites:
45
+
Defender Experts for Hunting is a separate service from your existing Microsoft Defender products. Before enrolling in this service, make sure that you have the necessary license and access.
46
+
47
+
We require the following licensing prerequisites to enable us to get started with this threat hunting service:
41
48
42
49
- Microsoft Defender for Endpoint P2 must be licensed and enabled on eligible devices
43
-
- Microsoft Defender Antivirus must be licensed and enabled in active mode on devices onboarded to Defender for Endpoint (required for endpoint detection and response capabilities)
50
+
- Microsoft Defender Antivirus must be licensed and enabled in active mode on devices onboarded to Defender for Endpoint (required for endpoint detection)
44
51
45
52
The following products are also eligible to get Defender Experts for Hunting coverage, and you must have their appropriate product licenses to get started with the service:
46
53
@@ -51,23 +58,31 @@ The following products are also eligible to get Defender Experts for Hunting cov
51
58
The following product is **not** covered by this service:
52
59
53
60
- Microsoft Defender for IoT
61
+
- Other Microsoft services not mentioned in the previous lists
62
+
63
+
### Defender Experts for Hunting coverage
54
64
55
-
### Server coverage
65
+
Defender Experts for Hunting relies on event signals from Defender for Endpoint, Defender for Office 365, Defender for Cloud Apps, Defender for Identity. It also relies on proprietary Microsoft Threat Intelligence sources.
56
66
57
-
Defender Experts for Hunting also covers servers—whether on premises or on a hyperscale cloud service provider—that have Defender for Endpoint deployed on them with a Microsoft Defender for Endpoint for Servers license. For Defender Experts coverage, a server is considered as a user account for billing. The service doesn't cover Microsoft Defender for Cloud.
58
-
[Learn more about specific hardware and software requirements](/defender-endpoint/minimum-requirements)
67
+
This service also covers servers—whether on premises or on a hyperscale cloud service provider—that have Defender for Endpoint deployed on them with a Microsoft Defender for Endpoint for Servers license.
68
+
69
+
Any detection that's not from Microsoft Defender products (for example, detections from other security vendors) isn't within the scope of Defender Experts for Hunting.
59
70
60
71
### Ask Defender Experts
61
72
62
-
Defender Experts for Hunting customers are assigned 10 **Ask Defender Experts** credits, which you can use to submit questions, at the start of each calendar quarter. Unused credits from the current quarter roll up to the next one. You can use up to 20 credits only per quarter. All unused credits expire by the end of the calendar year or at the end of your subscription term, whichever comes first.
73
+
[Ask Defender Experts](experts-on-demand.md) is intended to provide a better understanding of complex threats affecting your organization. It focuses on products included in Microsoft Defender XDR (Defender for Endpoint, Defender for Office 365, Defender for Cloud Apps, and Defender for Identity). [See sample questions you can ask Defender Experts](experts-on-demand.md#sample-questions-you-can-ask-from-defender-experts).
74
+
75
+
Defender Experts for Hunting customers are assigned 10 Ask Defender Experts credits, which you can use to submit questions, at the start of each calendar quarter. Unused credits from the current quarter roll up to the next one. You can use up to 20 credits only per quarter. All unused credits expire by the end of the calendar year or at the end of your subscription term, whichever comes first.
63
76
64
77
[Learn more about Microsoft's commercial licensing terms](https://www.microsoft.com/licensing/terms/productoffering/Microsoft365/MCA)
65
78
66
-
###Access requirements
79
+
## Access requirements
67
80
68
-
Anyone from your organization can complete the customer interest form for Microsoft Defender Experts for Hunting service, however, you need to work with your Commercial Executive to transact the SKU. You might need certain roles and permissions to fully access the service capabilities. Refer to [Custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md) for details.
81
+
Anyone from your organization can [apply for the Defender Experts for Hunting service](#apply-for-microsoft-defender-experts-for-hunting-service). However, you need to work with your Commercial Executive to transact the SKU.
69
82
70
-
## Understand the service's availability and data access requirements
83
+
You might need certain roles and permissions to fully access the service capabilities. Refer to [Custom roles in role-based access control for Microsoft Defender XDR](custom-roles.md) for details.
84
+
85
+
## Service availability and data protection
71
86
72
87
Defender Experts for Hunting is a managed threat hunting service that proactively hunts for threats across endpoints, email, identity, and cloud apps. To carry out hunting on your behalf, Microsoft experts need access to your Microsoft Defender XDR advanced hunting data. Enrolling in this service means you're granting permission to Microsoft experts to access the said data.
73
88
@@ -77,7 +92,7 @@ The following sections enumerate additional information about the service's data
77
92
78
93
All data used for hunting from existing Defender services will continue to reside in the customer's original Microsoft Defender XDR service storage location. [Learn more](/microsoft-365/enterprise/o365-data-locations)
79
94
80
-
Defender Experts for Hunting operational data, such as case tickets and analyst notes, are generated and stored in a Microsoft data center in the US region for the length of the service, irrespective of the Microsoft Defender XDR service storage location. Data generated for the reporting dashboard is stored in customer's Microsoft Defender XDR service storage location. Reporting data and operational data will be retained for a grace period of no more than 90 days after a customer's subscription expires. If the customer terminates their subscription, data will be deleted within 30 days.
95
+
Defender Experts for Hunting operational data, such as case tickets and analyst notes, are generated and stored in a Microsoft data center in the US region for US customers and in the European Union for EU customers, for the length of the service, irrespective of the Microsoft Defender XDR service storage location. Data generated for the reporting dashboard is stored in customer's Microsoft Defender XDR service storage location. Reporting data and operational data will be retained for a grace period of no more than 90 days after a customer's subscription expires. If the customer terminates their subscription, data will be deleted within 30 days.
81
96
82
97
Microsoft experts hunt over [advanced hunting logs](advanced-hunting-schema-tables.md) in Microsoft Defender XDR advanced hunting tables. The data in these tables depend on the set of Defender services the customer is enabled for (for example, Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity, Microsoft Defender for Cloud Apps, and Microsoft Entra ID). Experts also use a large set of internal threat intelligence data to inform their hunting and automation.
83
98
@@ -93,15 +108,16 @@ This service is available worldwide for customers in our commercial public cloud
93
108
94
109
This service is currently delivered in English language only.
95
110
96
-
## Apply for Microsoft Defender Experts for Hunting service
111
+
## Apply for Microsoft Defender Experts for Hunting service
97
112
98
-
If you haven't done so yet, you can complete the customer interest form for Defender Experts for Hunting:
113
+
You can apply for the Defender Experts for Hunting by performing the following steps:
99
114
100
-
1. Complete the[customer interest form](https://aka.ms/DEX4HuntingCustomerInterestForm). Anyone from your company can apply, but if you're accepted, you need to work with your Commercial Executive to transact the SKU.
101
-
2. Enter your name, company name, and company email ID.
102
-
3. Select**Submit**. Someone from our sales team will reach out within five business days.
0 commit comments