Skip to content

Commit 835259b

Browse files
authored
Merge pull request #1304 from MicrosoftDocs/main
Publish main to live, Monday 10:30AM PDT, 09/09
2 parents 8b30ffc + 6423ba6 commit 835259b

File tree

3 files changed

+12
-4
lines changed

3 files changed

+12
-4
lines changed

defender-endpoint/respond-machine-alerts.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
ms.author: diannegali
66
author: diannegali
77
ms.localizationpriority: medium
8-
ms.date: 12/15/2023
8+
ms.date: 09/09/2024
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -266,11 +266,13 @@ When a device is being isolated, the following notification is displayed to info
266266
267267
## Contain devices from the network
268268

269-
When you have identified an unmanaged device that is compromised or potentially compromised, you might want to contain that device from the network. When you contain a device any Microsoft Defender for Endpoint onboarded device will block incoming and outgoing communication with that device. This action can help prevent neighboring devices from becoming compromised while the security operations analyst locates, identifies, and remediates the threat on the compromised device.
269+
When you have identified an unmanaged device that is compromised or potentially compromised, you might want to contain that device from the network to prevent the potential attack from moving laterally across the network. When you contain a device any Microsoft Defender for Endpoint onboarded device will block incoming and outgoing communication with that device. This action can help prevent neighboring devices from becoming compromised while the security operations analyst locates, identifies, and remediates the threat on the compromised device.
270270

271271
> [!NOTE]
272272
> Blocking incoming and outgoing communication with a 'contained' device is supported on onboarded Microsoft Defender for Endpoint Windows 10 and Windows Server 2019+ devices.
273273
274+
Once devices are contained, we recommend investigating and remediating the threat on the contained devices as soon as possible. After remediation, you should remove the devices from containment.
275+
274276
### How to contain a device
275277

276278
1. Go to the **Device inventory** page and select the device to contain.
@@ -283,6 +285,9 @@ When you have identified an unmanaged device that is compromised or potentially
283285

284286
:::image type="content" alt-text="Screenshot of the contain device menu item." source="/defender/media/defender-endpoint/contain_device_popup.png" lightbox="/defender/media/defender-endpoint/contain_device_popup.png":::
285287

288+
> [!IMPORTANT]
289+
> Containing a large number of devices might cause performance issues on Defender for Endpoint-onboarded devices. To prevent any issues, Microsoft recommends containing up to 100 devices at any given time.
290+
286291
### Contain a device from the device page
287292

288293
A device can also be contained from the device page by selecting **Contain device** from the action bar:

defender-office-365/attack-simulation-training-simulation-automations.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -578,6 +578,9 @@ What you see on the **Schedule details** page depends on whether you selected **
578578

579579
- **Automation end** section: Use **Select the date you want the automations to end** to select the end date for the simulations. You can select any future date of upto a year.
580580

581+
> [!TIP]
582+
> Only one simulation is launched in a day, so we recommend selecting at least as many days as you'd like the simulations to run.
583+
581584
- **Fixed** simulation schedule: The following settings are available:
582585
- **Automation start** section: Use **Select the date you want the simulations to start from** to select the start date for the simulations. You can select any future date of upto a year.
583586

defender-office-365/priority-accounts-security-recommendations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: chrisda
66
author: chrisda
77
manager: deniseb
88
audience: Admin
9-
ms.topic: conceptual
9+
ms.topic: solution-overview
1010
ms.localizationpriority: medium
1111
search.appverid:
1212
- MET150
@@ -112,7 +112,7 @@ After you secure and tag your priority users, you can use the available reports,
112112

113113
Training users with priority accounts can help save those users and your security operations team much time and frustration. Savvy users are less likely to open attachments or click links in questionable email messages, and they're more likely to avoid suspicious websites.
114114

115-
The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://www.belfercenter.org/CyberPlaybook) provides excellent guidance for establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks.
115+
The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://www.hks.harvard.edu/publications/cybersecurity-campaign-playbook) provides excellent guidance for establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks.
116116

117117
Microsoft 365 provides the following resources to help inform users in your organization:
118118

0 commit comments

Comments
 (0)