You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .acrolinx-config.edn
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ For more information about the exception criteria and exception process, see [Mi
39
39
40
40
Select the total score link to review all feedback on clarity, consistency, tone, brand, terms, spelling, grammar, readability, and inclusive language. _You should fix all spelling errors regardless of your total score_. Fixing spelling errors helps maintain customer trust in overall content quality.
41
41
42
-
| Article | Total score<br>(Required: 80) | Words + phrases<br>(Brand, terms) | Correctness<br>(Spelling, grammar) | Clarity<br>(Readability) |
42
+
| Article | Total score<br>(Required: 80) | Terminology | Spelling and Grammar| Clarity<br>(Readability) |
Copy file name to clipboardExpand all lines: ATPDocs/index.yml
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -6,8 +6,7 @@ metadata:
6
6
title: Microsoft Defender for Identity documentation
7
7
description: Microsoft Defender for Identity cloud service helps protect your enterprise hybrid environments from multiple types of advanced targeted cyber attacks and insider threats.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ If you require more than 10 data sources, we recommend that you split the data s
46
46
To work with a network appliance that isn't listed, select **Other > Customer log format** or **Other (manual only)**. For more information, see [Working with the custom log parser](custom-log-parser.md).
47
47
48
48
>[!NOTE]
49
-
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings or your firewall/proxy.
49
+
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings on your firewall/proxy. For more information, see [Advanced log collector management](log-collector-advanced-management.md).
50
50
51
51
Repeat this process for each firewall and proxy whose logs can be used to detect traffic on your network.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/log-collector-advanced-management.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,9 +50,9 @@ You should be able to view the following contents:
50
50
- `ssl_update`
51
51
- `config.json`
52
52
53
-
### Customize certificate files
53
+
### Add certificate files
54
54
55
-
This procedure describes how to customize the certificate files used for secure connections to the cloud discovery Docker instance.
55
+
This procedure describes how to add the required certificate files used for secure connections to the cloud discovery Docker instance.
56
56
57
57
1. Open an FTP client and connect to the log collector host.
58
58
@@ -63,7 +63,7 @@ This procedure describes how to customize the certificate files used for secure
63
63
|**FTP**|- **pure-ftpd.pem**: Includes the key and certificate data |
64
64
|**Syslog**|- **ca.pem**: The certificate authority's certificate that was used to sign the client’s certificate. <br>- **server-key.pem** and **server-cert.pem**: The log collector's certificate and key <br><br>Syslog messages are sent over TLS to the log collector, which requires mutual TLS authentication, including authenticating both the client and server certificates. |
65
65
66
-
Filenames are mandatory. If any of the files are missing, the update fails.
66
+
Files are mandatory. If any of the filesfor the receiver type are missing, the update fails.
To secure the docker image and ensure that only one IP address is allowed to send the syslog messages to the log collector, create an IP table rule on the host machine to allow input traffic and drop the traffic coming over specific ports, such as TCP/601 or UDP/514, depending on the deployment.
163
163
164
-
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4`` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
164
+
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
> |FileCreatedAggregatedReport|DeviceFileEvents|{ProcessName} created {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
65
-
>|FileRenamedAggregatedReport|DeviceFileEvents|{ProcessName} renamed {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
66
-
> |FileModifiedAggregatedReport|DeviceFileEvents|{ProcessName} modified {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
64
+
> |FileCreatedAggregatedReport|DeviceFileEvents|{ProcessName} created {Occurrences} {FilePath} files|1. File path </br> 2. File extension </br> 3. Process name|
> |ProcessCreatedAggregatedReport|DeviceProcessEvents|{InitiatingProcessName} created {Occurrences} {ProcessName} processes|1. Initiating process command line </br> 2. Initiating process SHA1 </br> 3. Initiating process file path </br> 4. Process command line </br> 5. Process SHA1 </br> 6. Folder path|
68
68
> |ConnectionSuccessAggregatedReport|DeviceNetworkEvents|{InitiatingProcessName} established {Occurrences} connections with {RemoteIP}:{RemotePort}|1. Initiating process name </br> 2. Source IP </br> 3. Remote IP </br> 4. Remote port|
69
69
> |ConnectionFailedAggregatedReport|DeviceNetworkEvents|{InitiatingProcessName} failed to establish {Occurrences} connections with {RemoteIP:RemotePort}|1. Initiating process name </br> 2. Source IP </br> 3. Remote IP </br> 4. Remote port|
@@ -92,7 +92,7 @@ You can use the following KQL queries to gather specific information using aggre
92
92
93
93
The following query highlights noisy process activity, which can be correlated with malicious signals.
94
94
95
-
```KQL
95
+
```Kusto
96
96
DeviceProcessEvents
97
97
| where Timestamp > ago(1h)
98
98
| where ActionType == "ProcessCreatedAggregatedReport"
@@ -105,7 +105,7 @@ DeviceProcessEvents
105
105
106
106
The following query identifies repeated sign-in attempt failures.
107
107
108
-
```KQL
108
+
```Kusto
109
109
DeviceLogonEvents
110
110
| where Timestamp > ago(30d)
111
111
| where ActionType == "LogonFailedAggregatedReport"
@@ -119,7 +119,7 @@ DeviceLogonEvents
119
119
120
120
The following query identifies suspicious RDP connections, which might indicate malicious activity.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-faq.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,9 @@
2
2
title: macOS Device control policies frequently asked questions (FAQ)
3
3
description: Get answers to common questions about device control policies using JAMF or Intune.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: emmwalshh
6
+
ms.author: ewalsh
7
+
ms.reviewer: joshbregman
7
8
manager: deniseb
8
9
ms.localizationpriority: medium
9
10
audience: ITPro
@@ -39,7 +40,7 @@ Answer: Run _mdatp device-control policy preferences list_ to see all the iOS po
39
40
40
41
:::image type="content" source="media/macos-device-control-faq-enabled-default-enforcement.png" alt-text="Shows how to run mdatp device-control policy preferences list to see if a device is Device Control enabled. " lightbox="media/macos-device-control-faq-enabled-default-enforcement.png":::
41
42
42
-
### How do I know whether the policy has been delivered to the client machine?
43
+
### How do I know if the policy is delivered to the client machine?
43
44
44
45
Answer: Run _mdatp device-control policy rules list_ to see all the iOS policies on this machine:
Copy file name to clipboardExpand all lines: defender-endpoint/mac-device-control-intune.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,9 @@
2
2
title: Deploy and manage Device Control using Intune
3
3
description: Learn how to deploy and manage device control policies using Intune.
4
4
ms.service: defender-endpoint
5
-
author: YongRhee-MSFT
6
-
ms.author: yongrhee
5
+
author: emmwalshh
6
+
ms.author: ewalsh
7
+
ms.reviewer: joshbregman
7
8
manager: deniseb
8
9
ms.localizationpriority: medium
9
10
audience: ITPro
@@ -44,7 +45,7 @@ Before you get started with Removable Storage Access Control, you must confirm y
44
45
Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file with those values and put it under the Device Control node. Here's the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema and make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
45
46
46
47
> [!NOTE]
47
-
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48
+
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
0 commit comments