Skip to content

Commit 8099705

Browse files
authored
Merge branch 'public' into patch-7
2 parents 4c13a80 + 3fb4b0b commit 8099705

File tree

5 files changed

+62
-57
lines changed

5 files changed

+62
-57
lines changed

defender-endpoint/manage-tamper-protection-intune.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ manager: deniseb
55
description: Turn tamper protection on or off for your organization in Microsoft Intune.
66
ms.service: defender-endpoint
77
ms.localizationpriority: medium
8-
ms.date: 08/15/2024
8+
ms.date: 10/08/2024
99
audience: ITPro
1010
ms.topic: how-to
1111
author: denisebmsft
@@ -55,7 +55,7 @@ Tamper protection helps protect certain [security settings](prevent-changes-to-s
5555
| Requirement | Details |
5656
|---|---|
5757
| Roles and permissions | You must have appropriate permissions assigned through roles, such as Security Administrator. See [Microsoft Entra roles with Intune access](/mem/intune/fundamentals/role-based-access-control#azure-active-directory-roles-with-intune-access). |
58-
| Device management | Your organization uses [Intune to manage devices](/mem/intune/fundamentals/manage-devices). |
58+
| Device management | Your organization uses Configuration Manager or [Intune to manage devices](/mem/intune/fundamentals/manage-devices). Co-Managed devices are not supported for this feature|
5959
| Intune licenses | Intune licenses are required. See [Microsoft Intune licensing](/mem/intune/fundamentals/licenses). |
6060
| Operating System | Windows devices must be running Windows 10 [version 1709 or later](/lifecycle/announcements/revised-end-of-service-windows-10-1709) or Windows 11. (For more information about releases, see [Windows release information](/windows/release-health/release-information).) <br/><br/>For Mac, see [Protect macOS security settings with tamper protection](tamperprotection-macos.md). |
6161
| Security intelligence | You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version `1.287.60.0` (or later). |
@@ -117,9 +117,10 @@ You can use a registry key to determine whether the functionality to protect Mic
117117
|---|---|---|
118118
| `6` | (any value) |The device is managed by Intune only. <br/>(*Meets a requirement for exclusions to be tamper protected.*) |
119119
| `7` | `4` | The device is managed by Configuration Manager. <br/>(*Meets a requirement for exclusions to be tamper protected.*) |
120+
| `7` | `3` | The device is co-managed by Configuration Manager and Intune. <br/>(*This is not supported for exclusions to be tamper protected.*) |
120121
| A value other than `6` or `7` | (any value) | The device isn't managed by Intune only or Configuration Manager only. <br/>(*Exclusions aren't tamper protected*.) |
121122

122-
3. To confirm that tamper protection is deployed and that exclusions are tamper protected, check the `TPExclusions` registry key (located at `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features` or `HKLM\SOFTWARE\Microsoft\Windows Defender\Features`).
123+
4. To confirm that tamper protection is deployed and that exclusions are tamper protected, check the `TPExclusions` registry key (located at `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Features` or `HKLM\SOFTWARE\Microsoft\Windows Defender\Features`).
123124

124125
| `TPExclusions` | What the value means |
125126
|---|---|

defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ manager: deniseb
55
description: Use tamper protection to prevent malicious apps from changing important security settings.
66
ms.service: defender-endpoint
77
ms.localizationpriority: medium
8-
ms.date: 05/17/2024
8+
ms.date: 10/08/2024
99
audience: ITPro
1010
ms.topic: conceptual
1111
author: denisebmsft
@@ -55,7 +55,7 @@ When tamper protection is turned on, these tamper-protected settings can't be ch
5555
- Automatic actions are taken on detected threats.
5656
- Notifications are visible in the Windows Security app on Windows devices.
5757
- Archived files are scanned.
58-
- [Exclusions cannot be modified or added ](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions) (Applies to Intune or Configuration Manager)
58+
- [Exclusions cannot be modified or added ](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions) (Applies to devices managed by Intune only or by Configuration Manager only. Co-Managed devices are not supported)
5959

6060
*As of signature release `1.383.1159.0`, due to confusion around the default value for "Allow Scanning Network Files", tamper protection no longer locks this setting to its default value. In managed environments, the default value is `enabled`.*
6161

defender-office-365/attack-simulation-training-payloads.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -172,11 +172,11 @@ You can also create custom payloads that use QR codes as phishing links as descr
172172
3. On the **Select technique** page, the available options are the same as on the **Select technique** page in the new simulation wizard:
173173
- **Credential Harvest**<sup>\*</sup>
174174
- **Malware Attachment**
175-
- **Link in Attachment**
175+
- **Link in Attachment**<sup>\*</sup>
176176
- **Link to Malware**<sup>\*</sup>
177-
- **Drive-by URL**
177+
- **Drive-by URL**<sup>\*</sup>
178178
- **OAuth Consent Grant**<sup>\*</sup>
179-
- **How-to Guide**<sup>\*</sup>
179+
- **How-to Guide**
180180

181181
<sup>\*</sup> This social engineering technique allows you to use QR codes (currently in Preview).
182182

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 09/27/2024
11+
ms.date: 10/08/2024
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -45,14 +45,18 @@ For more information on what's new with other Microsoft Defender security produc
4545

4646
## September 2024
4747

48+
- With one click, SecOps personnel can take a quarantine release action directly from Explorer (Threat Explorer) or the Email entity page (no need to go to the Quarantine page in the Defender portal). For more information, see [Remediate malicious email delivered in Office 365](remediate-malicious-email-delivered-office-365.md).
4849
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for Mac v16.89 (24090815) or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
50+
- We're updating the end user experience for allow and block list management of their email messages. With one click, users can block email from unwanted senders and prevent those messages from appearing in their default quarantine view and in quarantine notifications. Users can also allow email from trusted and prevent future messages from those senders from being quarantined (if there are no admin overrides). Users also have visibility into any admin overrides that led to a quarantined email message. For more information, see [View quarantined email](quarantine-admin-manage-messages-files.md#view-quarantined-email).
4951

5052
## August 2024
5153

5254
- (Preview) You can now run [simulations](attack-simulation-training-simulations.md) with QR code payloads in [Attack simulation training](attack-simulation-training-get-started.md). You can track user responses and assign training to end users.
5355

5456
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for Microsoft 365 and Outlook 2021 now support the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
5557

58+
- We're rolling out new details into who or what was responsible for releasing a message from quarantine. These details are included in the email summary flyout that's accessible from the Quarantine page. For more information, see [View quarantined email](quarantine-admin-manage-messages-files.md#view-quarantined-email).
59+
5660
## July 2024
5761

5862
- **Tenant Allow/Block List in Microsoft 365 GCC, GCC High, DoD, and Office 365 operated by 21Vianet environments**: The [Tenant Allow/Block List](tenant-allow-block-list-about.md) is now available these environments. They are on parity with the WW commercial experiences.

0 commit comments

Comments
 (0)