Skip to content

Commit 8479d55

Browse files
authored
Merge branch 'main' into docs-editor/safe-links-about-1761312461
2 parents bec6159 + a57ace0 commit 8479d55

File tree

3 files changed

+10
-9
lines changed

3 files changed

+10
-9
lines changed

defender-endpoint/mobile-resources-defender-endpoint.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Resources for Microsoft Defender for Endpoint for mobile devices
33
description: Learn about the configurations and privacy settings for all the features in Defender for Endpoint on mobile devices.
44
ms.service: defender-endpoint
55
ms.reviewer: priyankagill
6-
ms.author: bagol
7-
author: batamig
6+
ms.author: painbar
7+
author: paulinbar
88
ms.localizationpriority: medium
99
manager: bagol
1010
audience: ITPro
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: concept-article
1515
ms.subservice: ngp
1616
search.appverid: met150
17-
ms.date: 03/24/2025
17+
ms.date: 10/24/2025
1818
---
1919
# Resources for Microsoft Defender for Endpoint for mobile devices
2020

@@ -52,10 +52,11 @@ Microsoft Defender for Endpoint provides multiple capabilities on mobile devices
5252
|Anti-phishing (Defender warning overlooked)|Low | | |
5353
|Anti-malware|Medium | Information about malicious APKs including install source, storage location, time of install, etc.; [More information](android-privacy.md#app-information)||
5454
| ||||
55-
|Jailbreak|High | NA |NA |
55+
|Root Detection (Preview)|High|NA|NA|
56+
|Jailbreak Detection|High | NA |NA |
5657
|Rogue Wifi |Low | | |
57-
|Open Network Detection (Migrated from alert to event in the device timeline)|NA | | |
58-
|Suspicious Certificates Downloaded/Installed (Migrated from alert to event in the device timeline)|NA| | |
58+
|Open Network Detection (Migrated from alert to event in the device timeline)|NA (Event)| | |
59+
|Suspicious Certificates Downloaded/Installed (Migrated from alert to event in the device timeline)|NA (Event)| | |
5960

6061
[Complete privacy information for Android](android-privacy.md)
6162

defender-office-365/scc-permissions.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,7 @@ Managing permissions in Defender for Office 365 or Microsoft Purview gives users
8383
|**Data Estate Insights Readers**|Provides read-only access to all insights reports across platforms and providers.|Data Map Reader <br/><br/> Insights Reader|
8484
|**Data Governance**|Grants access to data governance roles within Microsoft Purview.|Data Governance Administrator|
8585
|**Data Investigator**|Perform searches on mailboxes, SharePoint sites, and OneDrive locations.|Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Data Investigation Management <br/><br/> Export <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Search And Purge|
86+
|**Data Security AI Admins**|Use this group to assign editing capabilities for Data Loss Prevention policies related to Copilot and viewing AI content in Data Security Posture Management. Review the role description for access details.|Data Security AI Admin|
8687
|**Data Security AI Content Viewers**|Use this group to assign read-only permissions to users in Data Security Posture Management for AI to view prompts and responses of interactions in AI apps.|Data Security AI Content Viewer|
8788
|**Data Security AI Viewers**|Use this group to assign read-only permissions to users for Data Security Posture Management for AI.|Data Security AI Viewer|
8889
|**Data Security Investigations Administrators**|Administrators for Data Security Investigations that can create and manage all investigations, processes, and settings.|Case Management <br/><br/> Compliance Search <br/><br/> Data Security Investigations Admin <br/><br/> Export <br/><br/> Preview <br/><br/> Review|
@@ -178,6 +179,7 @@ Roles that aren't assigned to the Organization Management role group by default
178179
|<sup>\*</sup>**Data Security Investigations Admin**|Used to create and manage investigations, processes, and settings in Data Security Investigations.|Data Security Investigations Administrators|
179180
|<sup>\*</sup>**Data Security Investigations Investigator**|Used to create and manage assigned investigations, processes, and settings in Data Security Investigations.|Data Security Investigations Investigators|
180181
|<sup>\*</sup>**Data Security Investigations Reviewer**|Used to review assigned investigations in Data Security Investigations.|Data Security Investigations Reviewers|
182+
|**Data Security AI Admin**|Role for editing Data Loss Prevention policies related to Copilot and viewing AI content in Data Security Posture Management. This role does not have access to read prompts and responses of AI interactions.|Data Security AI Admins|
181183
|**Data Security AI Content Viewer**|Role for read-only access to prompts and responses of AI interactions in Data Security Posture Management for AI.|Data Security AI Content Viewers|
182184
|**Data Security AI Viewer**|Role for read-only access to all pages in Data Security Posture Management for AI. This role does not have access to read prompts and responses of AI interactions.|Data Security AI Viewers|
183185
|**Data Security Viewer**|View access to Data Security Posture Management dashboard insights. Allows users to use Copilot for Security to view details.|Data Security Management|

defender-office-365/submissions-admin-review-user-reported-messages.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,7 @@ Admins can mark messages and notify users of review results only if the user [re
5757
> [!IMPORTANT]
5858
> <sup>\*</sup> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you should limit to emergency scenarios or when you can't use a different role.
5959
60-
- You need access to Exchange Online PowerShell. If your account doesn't have access to Exchange Online PowerShell, you get the following error: _Specify an email address in your domain_. For more information about enabling or disabling access to Exchange Online PowerShell, see the following articles:
61-
- [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell)
62-
- [Client Access Rules in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules) ([until October 2023](https://techcommunity.microsoft.com/blog/exchange/deprecation-of-client-access-rules-in-exchange-online/3638563))
60+
- You need access to Exchange Online PowerShell. If your account doesn't have access to Exchange Online PowerShell, you get the following error: _Specify an email address in your domain_. For more information about enabling or disabling access to Exchange Online PowerShell, see [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell).
6361

6462
## Notify users from within the portal
6563

0 commit comments

Comments
 (0)