You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-machines-security-baseline.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,8 @@ title: Increase compliance to the Microsoft Defender for Endpoint security basel
3
3
description: The Microsoft Defender for Endpoint security baseline sets security controls to provide optimal protection.
4
4
ms.service: defender-endpoint
5
5
ms.subservice: onboard
6
-
ms.author: deniseb
7
-
author: denisebmsft
6
+
ms.author: ewalsh
7
+
author: emmwalshh
8
8
ms.localizationpriority: medium
9
9
manager: deniseb
10
10
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
13
13
- tier3
14
14
ms.topic: conceptual
15
15
search.appverid: met150
16
-
ms.date: 12/18/2020
16
+
ms.date: 03/25/2025
17
17
---
18
18
19
19
# Increase compliance to the Microsoft Defender for Endpoint security baseline
@@ -70,7 +70,7 @@ To review specific devices, select **Configure security baseline** on the card.
70
70
71
71
## Review and assign the Microsoft Defender for Endpoint security baseline
72
72
73
-
Device configuration management monitors baseline compliance only of Windows 10 and Windows 11 devices that have been specifically assigned the Microsoft Defender for Endpoint security baseline. You can conveniently review the baseline and assign it to devices on Intune device management.
73
+
Device configuration management monitors baseline compliance only of Windows 10 and Windows 11 devices that have been assigned the Microsoft Defender for Endpoint security baseline. You can conveniently review the baseline and assign it to devices on Intune device management.
74
74
75
75
1. Select **Configure security baseline** on the **Security baseline** card to go to Intune device management. A similar overview of baseline compliance is displayed.
description: Endpoint Attack Notifications provides proactive hunting for the most important threats to your network.
5
5
ms.service: defender-endpoint
6
-
ms.author: vpattnaik
7
-
author: vpattnai
6
+
ms.author: ewalsh
7
+
author: emmwalshh
8
8
ms.localizationpriority: medium
9
9
manager: dolmont
10
10
audience: ITPro
@@ -17,7 +17,7 @@ ms.custom:
17
17
- cx-ean
18
18
ms.subservice: edr
19
19
search.appverid: met150
20
-
ms.date: 10/30/2024
20
+
ms.date: 03/25/2025
21
21
---
22
22
23
23
# Endpoint Attack Notifications
@@ -47,26 +47,26 @@ Endpoint Attack Notifications (previously referred to as Microsoft Threat Expert
47
47
48
48
## Apply for Endpoint Attack Notifications
49
49
50
-
If you're a Microsoft Defender for Endpoint customer, you can apply for Endpoint Attack Notifications. Go to **Settings**\>**Endpoints**\>**General**\>**Advanced features**\>**Endpoint Attack Notifications** to apply. Once accepted, you'll get the benefits of Endpoint Attack Notifications.
50
+
If you're a Microsoft Defender for Endpoint customer, you can apply for Endpoint Attack Notifications. Go to **Settings**\>**Endpoints**\>**General**\>**Advanced features**\>**Endpoint Attack Notifications** to apply. Once accepted, you get the benefits of Endpoint Attack Notifications.
51
51
52
52

53
53
54
54
## Receive Endpoint Attack notifications
55
55
56
-
Endpoint Attack Notifications are alerts that have been hand crafted by Microsoft's managed hunting service based on suspicious activity in your environment. They can be viewed through several mediums:
56
+
Endpoint Attack Notifications are alerts that are hand crafted by Microsoft's managed hunting service based on suspicious activity in your environment. They can be viewed through several mediums:
57
57
58
58
- The alerts queue in the Microsoft Defender portal
59
59
- Using the [API](api/get-alerts.md)
60
60
-[DeviceAlertEvents](/defender-xdr/advanced-hunting-migrate-from-mde#map-devicealertevents-table) table in Advanced hunting
61
61
- Your email if you [configure an email notifications](configure-vulnerability-email-notifications.md) rule
62
62
63
-
Endpoint Attack Notifications can be identified by:
63
+
Endpoint Attack Notifications are identified by:
64
64
65
65
- Have a tag named **Endpoint Attack Notification**
66
66
- Have a service source of **Microsoft Defender for Endpoint**\>**Microsoft Defender Experts**
67
67
68
68
> [!NOTE]
69
-
> If you have enrolled for Endpoint Attack Notifications but are not seeing any alerts from the service, it indicates that you have a strong security posture and are less prone to attacks.
69
+
> If you enrolled for Endpoint Attack Notifications but are not seeing any alerts from the service, it indicates that you have a strong security posture and are less prone to attacks.
0 commit comments