Skip to content

Commit 82da5da

Browse files
committed
Merge branch 'main' into QuarRB-chrisda
2 parents b73bfdd + 0c012e0 commit 82da5da

24 files changed

+274
-234
lines changed

defender-endpoint/investigate-alerts.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,10 @@ Expand entities to view details at a glance. Selecting an entity will switch the
4747
4848
:::image type="content" source="media/alert-story-tree.png" alt-text="an alert story with an alert in focus and some expanded cards" lightbox="media/alert-story-tree.png":::
4949

50+
## Investigate using the alert timeline
51+
52+
The alert timeline complements the existing 'process tree' view by offering users a comprehensive perspective on each alert. While the process tree provides a detailed breakdown of the alert's associated processes and activities, the alert timeline presents a condensed chronological view that facilitates rapid triage and decision-making. 
53+
5054
## Take action from the details pane
5155

5256
Once you've selected an entity of interest, the details pane will change to display information about the selected entity type, historic information when it's available, and offer controls to **take action** on this entity directly from the alert page.

defender-endpoint/mac-install-with-intune.md

Lines changed: 12 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 04/26/2024
17+
ms.date: 05/20/2024
1818
---
1919

2020
# Deploy Microsoft Defender for Endpoint on macOS with Microsoft Intune
@@ -316,31 +316,29 @@ Download [AutoUpdate2.mobileconfig](https://github.com/microsoft/mdatp-xplat/blo
316316

317317
### Step 9: Microsoft Defender for Endpoint configuration settings
318318

319-
In this step, we go over the "Preferences," which enables you to configure anti-malware and EDR policies using Microsoft Defender portal and Microsoft Intune.
319+
In this step, we go over *Preferences* that enables you to configure anti-malware and EDR policies using Microsoft Defender XDR portal ([https://security.microsoft.com](https://security.microsoft.com)) **or** Microsoft Intune ([https://intune.microsoft.com](https://intune.microsoft.com)).
320320

321-
#### Set policies using Microsoft Defender portal
321+
#### 9a. Set policies using Microsoft Defender portal
322322

323-
Go through [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure) before setting the security policies using Microsoft Defender.
323+
1. Go through [Configure Microsoft Defender for Endpoint in Intune](/mem/intune/protect/advanced-threat-protection-configure) before setting the security policies using Microsoft Defender for Endpoint Security Settings Management.
324324

325-
In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47):
326-
327-
1. Go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
328-
329-
1. Under **Select Platform**, select **macOS**.
325+
2. In the [Microsoft Defender portal](https://sip.security.microsoft.com/homepage?tid=72f988bf-86f1-41af-91ab-2d7cd011db47), go to **Configuration management** > **Endpoint security policies** > **Mac policies** > **Create new policy**.
330326

331-
1. Under **Select Template**, choose a template and select **Create Policy**.
327+
3. Under **Select Platform**, select **macOS**.
332328

333-
1. Enter the Name and Description of the policy.
329+
4. Under **Select Template**, choose a template and select **Create Policy**.
334330

335-
1. Select **Next**.
331+
5. Specify a name and description for the policy, and then select **Next**.
336332

337-
1. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
333+
6. On the **Assignments** tab, assign the profile to a group where the macOS devices and/or users are located, or **All Users** and **All devices**.
338334

339335
For more information about managing security settings, see:
340336

341337
- [Manage Microsoft Defender for Endpoint on devices with Microsoft Intune](/mem/intune/protect/mde-security-integration?pivots=mdssc-ga)
342338
- [Manage security settings for Windows, macOS, and Linux natively in Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617)
343339

340+
> [!IMPORTANT]
341+
> The policies set via Intune will take precedence over the Microsoft Defender for Endpoint Security Settings Management.
344342
345343
#### Set policies using Microsoft Intune
346344

@@ -389,7 +387,7 @@ To set Device Control for Microsoft Defender for Endpoint on macOS, follow the s
389387

390388
To set Purview's Data Loss Prevention (DLP) for endpoint on macOS, follow the steps in [Onboard and offboard macOS devices into Compliance solutions using Microsoft Intune](/purview/device-onboarding-offboarding-macos-intune-mde).
391389

392-
### Step 13: Check status of PList(.mobileconfig)
390+
### Step 13: Check status of PList (.mobileconfig)
393391

394392
After completing the profile configuration, you'll be able to review the status of the policies.
395393

0 commit comments

Comments
 (0)