Skip to content

Commit 76f8b6b

Browse files
committed
Merge branch 'main' into v-smandalika-8894710
2 parents 30e25b7 + 860b6e3 commit 76f8b6b

File tree

3 files changed

+20
-6
lines changed

3 files changed

+20
-6
lines changed

defender-endpoint/controlled-folders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 03/05/2024
6+
ms.date: 07/30/2024
77
author: siosulli
88
ms.author: siosulli
99
audience: ITPro
@@ -112,7 +112,7 @@ You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/
112112

113113
Example query:
114114

115-
```PowerShell
115+
```
116116
DeviceEvents
117117
| where ActionType in ('ControlledFolderAccessViolationAudited','ControlledFolderAccessViolationBlocked')
118118
```

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ This article describes how admins can manage entries for files in the Microsoft
5454
- An entry should be active within 5 minutes.
5555

5656
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
57-
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Defender for Office 365** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
57+
- [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) (If **Email & collaboration** \> **Exchange Online permissions** permissions is :::image type="icon" source="media/scc-toggle-on.png" border="false"::: **Active**. Affects the Defender portal only, not PowerShell): **Authorization and settings/Security settings/Detection tuning (manage)** or **Authorization and settings/Security settings/Core security settings (read)**.
5858
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo):
5959
- _Add and remove entries from the Tenant Allow/Block List_: Membership in one of the following role groups:
6060
- **Organization Management** or **Security Administrator** (Security admin role).

defender-xdr/breadcrumb/toc.yml

Lines changed: 17 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,21 @@
1+
12
- name: 'Microsoft Defender'
23
tocHref: /defender/
34
topicHref: /defender/index
45
items:
5-
- name: 'Microsoft Defender XDR'
6-
tocHref: /defender-xdr/
7-
topicHref: /defender-xdr/index
6+
- name: 'Microsoft Defender XDR'
7+
tocHref: /defender-xdr/
8+
topicHref: /defender-xdr/index
9+
- name: Microsoft Defender XDR
10+
tocHref: /defender-for-identity/
11+
topicHref: /defender-xdr/index
12+
13+
## Azure override
14+
- name: 'Microsoft Defender'
15+
tocHref: /azure/
16+
topicHref: /defender/index
17+
items:
18+
- name: 'Microsoft Defender XDR'
19+
tocHref: /azure/sentinel/
20+
topicHref: /defender-xdr/index
21+

0 commit comments

Comments
 (0)