Skip to content

Commit 8a9b19f

Browse files
authored
Merge branch 'main' into diannegali-dataretention
2 parents 6c53d20 + 96ccba6 commit 8a9b19f

File tree

354 files changed

+4488
-3176
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

354 files changed

+4488
-3176
lines changed

.openpublishing.redirection.defender.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,21 @@
194194
"source_path": "defender-endpoint/collect-diagnostic-data-update-compliance.md",
195195
"redirect_url": "/defender-endpoint/collect-diagnostic-data",
196196
"redirect_document_id": false
197+
},
198+
{
199+
"source_path": "defender-endpoint/attack-simulations.md",
200+
"redirect_url": "/defender-endpoint/defender-endpoint-demonstrations",
201+
"redirect_document_id": true
202+
},
203+
{
204+
"source_path": "defender-endpoint/mssp-support.md",
205+
"redirect_url": "/defender-endpoint/configure-mssp-support",
206+
"redirect_document_id": true
207+
},
208+
{
209+
"source_path": "defender-endpoint/evaluate-mde.md",
210+
"redirect_url": "/defender-endpoint/evaluate-microsoft-defender-antivirus",
211+
"redirect_document_id": false
197212
}
198213
]
199214
}

defender-business/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
- name: Microsoft Defender for Business
22
href: index.yml
3-
items:
3+
items:
44
- name: Overview
55
items:
66
- name: What is Microsoft Defender for Business?
@@ -42,7 +42,7 @@
4242
- name: Step 5 - Onboard devices
4343
href: mdb-onboard-devices.md
4444
- name: Step 6 - Set up and review your security policies
45-
items:
45+
items:
4646
- name: Security policies and settings
4747
href: mdb-configure-security-settings.md
4848
- name: Next-generation protection
@@ -60,7 +60,7 @@
6060
- name: Change your endpoint security subscription
6161
href: mdb-manage-subscription.md
6262
- name: Monitor or manage devices
63-
items:
63+
items:
6464
- name: Get an overview of mobile threat defense
6565
href: mdb-mtd.md
6666
- name: View and manage devices
@@ -70,7 +70,7 @@
7070
- name: Offboard devices
7171
href: mdb-offboard-devices.md
7272
- name: View and respond to detected threats
73-
items:
73+
items:
7474
- name: Use your vulnerability management dashboard
7575
href: mdb-view-tvm-dashboard.md
7676
- name: View and manage incidents
@@ -92,7 +92,7 @@
9292
- name: Maintain your environment
9393
href: /Microsoft-365/business-premium/m365bp-mdb-maintain-environment?bc=%2defender-business%2Fbreadcrumb%2Ftoc.json&toc=%2Fdefender-business%2Ftoc.json
9494
- name: Reference information
95-
items:
95+
items:
9696
- name: Security, privacy, and compliance
9797
href: mdb-security-privacy-compliance.md
9898
- name: Top 10 ways to secure your business data
@@ -108,4 +108,4 @@
108108
- name: Microsoft 365 Business Premium
109109
href: /microsoft-365/business-premium/
110110
- name: Microsoft 365 Lighthouse
111-
href: /microsoft-365/lighthouse/m365-lighthouse-overview
111+
href: /microsoft-365/lighthouse/m365-lighthouse-overview

defender-business/index.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ metadata:
88
ms.service: defender-business
99
ms.topic: landing-page
1010
ms.date: 09/07/2023
11-
ms.collection:
11+
ms.collection:
1212
- SMB
1313
- m365-security
1414
- m365-initiative-defender-business
@@ -92,5 +92,3 @@ landingContent:
9292
url: mdb-faq.yml
9393
- text: Microsoft Security Intelligence
9494
url: https://www.microsoft.com/wdsi/threats
95-
96-

defender-business/mdb-add-users.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,22 @@ description: Add users and assign Defender for Business licenses to protect thei
44
search.appverid: MET150
55
author: siosulli
66
ms.author: siosulli
7-
manager: deniseb
7+
manager: deniseb
88
audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.date: 06/19/2024
13-
ms.collection:
13+
ms.collection:
1414
- m365-security
1515
- tier1
1616
ms.reviewer: efratka
17-
f1.keywords: NOCSH
17+
f1.keywords: NOCSH
1818
---
1919

2020
# Add users and assign licenses in Microsoft Defender for Business
2121

22-
As soon as you have signed up for Defender for Business, your first step is to add users and assign licenses. This article describes how to add users and assign licenses, and how to make sure multifactor authentication (MFA) is enabled.
22+
As soon as you have signed up for Defender for Business, your first step is to add users and assign licenses. This article describes how to add users and assign licenses, and how to make sure multifactor authentication (MFA) is enabled.
2323

2424
:::image type="content" source="media/mdb-setup-step2.png" alt-text="Visual depicting step 2 - add users and assign licenses in Defender for Business.":::
2525

@@ -35,7 +35,7 @@ As soon as you have signed up for Defender for Business, your first step is to a
3535
- **Domain** Choose the domain for the user's account. For example, if the user's username is `Pat`, and the domain is `contoso.com`, they'll sign in by using `[email protected]`.
3636
- **Password settings**: Choose whether to use the autogenerated password or to create your own strong password for the user. The user must change their password after 90 days. Or you can choose the option to **Require this user to change their password when they first sign in**. You can also choose whether you want to send the user's password in email when the user is added.
3737

38-
4. On the **Assign product licenses** page, select Defender for Business (or Microsoft 365 Business Premium). Then choose **Next**.
38+
4. On the **Assign product licenses** page, select Defender for Business (or Microsoft 365 Business Premium). Then choose **Next**.
3939

4040
If you don't have any licenses available, you can still add a user and buy additional licenses. For more information about adding users, see [Add users and assign licenses at the same time](/Microsoft-365/admin/add-users/add-users).
4141

@@ -57,7 +57,7 @@ One good way to make sure MFA is enabled for all users is by using [security def
5757

5858
:::image type="content" source="media/mdb-azuread-properties.png" alt-text="Screenshot showing Properties and Manage Security Defaults for Microsoft Entra ID." lightbox="media/mdb-azuread-properties.png":::
5959

60-
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
60+
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
6161

6262
> [!NOTE]
6363
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
@@ -71,4 +71,3 @@ One good way to make sure MFA is enabled for all users is by using [security def
7171
- [Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
7272

7373
- [Step 4: Set up email notifications for your security team](mdb-email-notifications.md).
74-

defender-business/mdb-asr.md

Lines changed: 17 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,28 @@
11
---
2-
title: Enable your attack surface reduction rules in Microsoft Defender for Business
3-
description: Get an overview of attack surface reduction capabilities, including attack surface reduction rules, in Microsoft Defender for Business
2+
title: Enable your attack surface reduction rules in Microsoft Defender for Business
3+
description: Get an overview of attack surface reduction capabilities, including attack surface reduction rules, in Microsoft Defender for Business
44
author: siosulli
55
ms.author: siosulli
6-
manager: deniseb
7-
ms.date: 06/07/2024
6+
manager: deniseb
7+
ms.date: 07/23/2024
88
ms.topic: conceptual
99
ms.service: defender-business
10-
ms.localizationpriority: medium
11-
ms.collection:
10+
ms.localizationpriority: medium
11+
ms.collection:
1212
- m365-security
1313
- tier1
14-
ms.reviewer: efratka
14+
ms.reviewer: efratka
1515
search.appverid: MET150
16-
f1.keywords: NOCSH
16+
f1.keywords: NOCSH
1717
audience: Admin
1818
---
1919

2020
# Enable your attack surface reduction rules in Microsoft Defender for Business
2121

22-
Your attack surfaces are all the places and ways that your organization's network and devices are vulnerable to cyberthreats and attacks. Unsecured devices, unrestricted access to any URL on a company device, and allowing any type of app or script to run on company devices are all examples of attack surfaces. They leave your company vulnerable to cyberattacks.
22+
Your attack surfaces are all the places and ways that your organization's network and devices are vulnerable to cyberthreats and attacks. Unsecured devices, unrestricted access to any URL on a company device, and allowing any type of app or script to run on company devices are all examples of attack surfaces. They leave your company vulnerable to cyberattacks.
2323

2424
To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities, including attack surface reduction rules. This article describes how to set up your attack surface reduction rules and describes attack surface reduction capabilities.
2525

26-
> [!NOTE]
27-
> Intune is not included in the standalone version of Defender for Business, but it can be added on.
28-
2926
## Standard protection ASR rules
3027

3128
There are lots of attack surface reduction rules available. You don't have to set them all up at once. And, you can set up some rules in audit mode just to see how they work for your organization, and change them to work in block mode later. That said, we recommend enabling the following standard protection rules as soon as possible:
@@ -48,7 +45,7 @@ These rules help protect your network and devices but shouldn't cause disruption
4845
3. Set up your policy as follows:
4946

5047
1. Specify a name and description, and then choose **Next**.
51-
48+
5249
2. For at least the following three rules, set each one to **Block**:
5350

5451
- **Block credential stealing from the Windows local security authority subsystem**
@@ -89,18 +86,17 @@ To learn more about attack surface reduction rules, see the following articles:
8986

9087
Attack surface reduction rules are available in Defender for Business. The following table summarizes attack surface reduction capabilities in Defender for Business. Notice how other capabilities, such as next-generation protection and web content filtering, work together with your attack surface reduction capabilities.
9188

92-
| Capability | How to set it up |
93-
|:---|:---|
94-
| **Attack surface reduction rules** <br/> Prevent specific actions that are commonly associated with malicious activity to run on Windows devices. | [Enable your standard protection attack surface reduction rules](#standard-protection-asr-rules) (section in this article). |
95-
| **Controlled folder access** <br/>Controlled folder access allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation. | [Set up controlled folder access policy in Microsoft Defender for Business](mdb-controlled-folder-access.md). |
96-
| **Network protection** <br/>Network protection prevents people from accessing dangerous domains through applications on their Windows and Mac devices. Network protection is also a key component of [Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md). | Network protection is already enabled by default when devices are onboarded to Defender for Business and [next-generation protection policies in Defender for Business](mdb-next-generation-protection.md) are applied. Your default policies are configured to use recommended security settings. |
97-
| **Web protection** <br/>Web protection integrates with web browsers and works with network protection to protect against web threats and unwanted content. Web protection includes web content filtering and web threat reports. | [Set up Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md). |
98-
| **Firewall protection** <br/>Firewall protection determines what network traffic is permitted to flow to or from your organization's devices. | Firewall protection is already enabled by default when devices are onboarded to Defender for Business and [firewall policies in Defender for Business](mdb-firewall.md) are applied. |
89+
|Capability|How to set it up|
90+
|---|---|
91+
|**Attack surface reduction rules** <br/> Prevent specific actions that are commonly associated with malicious activity to run on Windows devices.|[Enable your standard protection attack surface reduction rules](#standard-protection-asr-rules) (section in this article).|
92+
|**Controlled folder access** <br/>Controlled folder access allows only trusted apps to access protected folders on Windows devices. Think of this capability as ransomware mitigation.|[Set up controlled folder access policy in Microsoft Defender for Business](mdb-controlled-folder-access.md).|
93+
|**Network protection** <br/>Network protection prevents people from accessing dangerous domains through applications on their Windows and Mac devices. Network protection is also a key component of [Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md).|Network protection is already enabled by default when devices are onboarded to Defender for Business and [next-generation protection policies in Defender for Business](mdb-next-generation-protection.md) are applied. Your default policies are configured to use recommended security settings.|
94+
|**Web protection** <br/>Web protection integrates with web browsers and works with network protection to protect against web threats and unwanted content. Web protection includes web content filtering and web threat reports.|[Set up Web content filtering in Microsoft Defender for Business](mdb-web-content-filtering.md).|
95+
|**Firewall protection** <br/>Firewall protection determines what network traffic is permitted to flow to or from your organization's devices.|Firewall protection is already enabled by default when devices are onboarded to Defender for Business and [firewall policies in Defender for Business](mdb-firewall.md) are applied.|
9996

10097
## Next steps
10198

10299
- [Review settings for advanced features and the Microsoft Defender portal](mdb-portal-advanced-feature-settings.md).
103100
- [Use your vulnerability management dashboard](mdb-view-tvm-dashboard.md)
104101
- [View and manage incidents](mdb-view-manage-incidents.md)
105102
- [View reports](mdb-reports.md)
106-

defender-business/mdb-attack-disruption.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Automatic attack disruption in Microsoft Defender for Business
3-
description: Learn about automatic attack disruption in Microsoft Defender for Business
2+
title: Automatic attack disruption in Microsoft Defender for Business
3+
description: Learn about automatic attack disruption in Microsoft Defender for Business
44
author: siosulli
55
ms.author: siosulli
6-
manager: deniseb
6+
manager: deniseb
77
ms.date: 06/07/2024
88
ms.topic: conceptual
99
ms.service: defender-business
10-
ms.localizationpriority: medium
11-
ms.collection:
10+
ms.localizationpriority: medium
11+
ms.collection:
1212
- m365-security
1313
- tier1
14-
ms.reviewer: efratka
14+
ms.reviewer: efratka
1515
search.appverid: MET150
16-
f1.keywords: NOCSH
16+
f1.keywords: NOCSH
1717
audience: Admin
1818
---
1919

@@ -29,18 +29,19 @@ Automatic attack disruption is designed to:
2929

3030
- Contain advanced attacks that are in progress;
3131
- Limit the impact and progression of attacks on your business assets (like devices); and
32-
- Provide more time for your IT/security team to remediate an attack fully.
32+
- Provide more time for your IT/security team to remediate an attack fully.
3333

3434
Automatic attack disruption uses insights from Microsoft security researchers and advanced AI models to counteract the complexities of advanced attacks. It limits a threat actor's progress early on and dramatically reduces the overall impact of an attack, from associated costs to loss of productivity. See some examples at the [Microsoft Security Blog](https://aka.ms/ContainUserSecBlog).
3535

36-
With automatic attack disruption, as soon as a human-operated attack is detected on a device, steps are taken immediately to contain the affected device and user accounts on the device. An incident is created in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). There, your IT/security team can view details about the risk and containment status of compromised assets during and after the process. An **Incident** page provides details about the attack and up-to-date status of affected assets.
36+
With automatic attack disruption, as soon as a human-operated attack is detected on a device, steps are taken immediately to contain the affected device and user accounts on the device. An incident is created in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). There, your IT/security team can view details about the risk and containment status of compromised assets during and after the process. An **Incident** page provides details about the attack and up-to-date status of affected assets.
3737

3838
Automated response actions include:
3939

4040
- Containing a device by blocking incoming/outgoing communication
4141
- Containing a user account by disconnecting current user connections at the device level
4242

4343
> [!IMPORTANT]
44+
>
4445
> - To view information about a detected advanced attack, you must have an appropriate role, such as Security Reader or Security Administrator assigned.
4546
> - To take remediation actions, release a contained device/user, or re-enable a user account, you must have the Security Administrator role assigned.
4647
> - See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
@@ -62,7 +63,7 @@ Automated response actions include:
6263

6364
Disrupted incidents include a tag for `Attack Disruption` and the specific threat type identified (such as ransomware). If your IT/security team receives [incident email notifications](mdb-email-notifications.md), these tags also appear in the emails.
6465

65-
When an incident is disrupted, highlighted text appears below the incident title. Contained devices or user accounts are listed with a label that indicates their status.
66+
When an incident is disrupted, highlighted text appears below the incident title. Contained devices or user accounts are listed with a label that indicates their status.
6667

6768
## Track attack disruption actions in the Action center
6869

@@ -78,6 +79,6 @@ For more information, see [Review remediation actions in the Action center](mdb-
7879

7980
## How to get automatic attack disruption
8081

81-
Automatic attack disruption is built into Defender for Business; you don't have to explicitly turn on these capabilities. It's important to [onboard all your organization's devices](mdb-onboard-devices.md) (computers, phones, and tablets) to Defender for Business so that they're protected as soon as possible.
82+
Automatic attack disruption is built into Defender for Business; you don't have to explicitly turn on these capabilities. It's important to [onboard all your organization's devices](mdb-onboard-devices.md) (computers, phones, and tablets) to Defender for Business so that they're protected as soon as possible.
8283

83-
Additionally, sign up to receive [preview features](/defender-xdr/preview) so that you get the latest and greatest capabilities as soon as they're available.
84+
Additionally, sign up to receive [preview features](/defender-xdr/preview) so that you get the latest and greatest capabilities as soon as they're available.

0 commit comments

Comments
 (0)