Skip to content

Commit 8b139bd

Browse files
committed
2 parents b1388f7 + 8559999 commit 8b139bd

File tree

59 files changed

+120
-99
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+120
-99
lines changed

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -199,6 +199,11 @@
199199
"source_path": "defender-endpoint/attack-simulations.md",
200200
"redirect_url": "/defender-endpoint/defender-endpoint-demonstrations",
201201
"redirect_document_id": true
202+
},
203+
{
204+
"source_path": "defender-endpoint/mssp-support.md",
205+
"redirect_url": "/defender-endpoint/configure-mssp-support",
206+
"redirect_document_id": true
202207
}
203208
]
204209
}

defender-business/mdb-asr.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of attack surface reduction capabilities, including
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 06/07/2024
7+
ms.date: 07/23/2024
88
ms.topic: conceptual
99
ms.service: defender-business
1010
ms.localizationpriority: medium
@@ -23,9 +23,6 @@ Your attack surfaces are all the places and ways that your organization's networ
2323

2424
To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities, including attack surface reduction rules. This article describes how to set up your attack surface reduction rules and describes attack surface reduction capabilities.
2525

26-
> [!NOTE]
27-
> Intune is not included in the standalone version of Defender for Business, but it can be added on.
28-
2926
## Standard protection ASR rules
3027

3128
There are lots of attack surface reduction rules available. You don't have to set them all up at once. And, you can set up some rules in audit mode just to see how they work for your organization, and change them to work in block mode later. That said, we recommend enabling the following standard protection rules as soon as possible:

defender-business/mdb-mtd.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of mobile threat defense in Defender for Business.
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 06/19/2024
7+
ms.date: 07/23/2024
88
ms.topic: conceptual
99
ms.service: defender-business
1010
ms.localizationpriority: medium
@@ -37,17 +37,17 @@ The following table summarizes the capabilities that are included in mobile thre
3737
| **Microsoft Defender Vulnerability Management**<br/>Vulnerability assessment of onboarded mobile devices. Includes vulnerability assessments for operating systems and apps for Android and iOS. <br/>See [Use your vulnerability management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md). | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | See note 1 (below) |
3838
| **Network Protection** <br/>Protection against rogue Wi-Fi related threats and rogue certificates. <br/>Network protection is turned on by default with [next-generation protection](mdb-next-generation-protection.md). <br/>As part of mobile threat defense, network protection also includes the ability to allow root certification authority and private root certification authority certificates in Intune. It also establishes trust with endpoints. | See note 2 (below) | See note 2 (below) |
3939
| **Unified alerting** <br/>Alerts from all platforms are listed in the unified Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). In the navigation pane, choose **Incidents**). <br/>See [View and manage incidents in Microsoft Defender for Business](mdb-view-manage-incidents.md) | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
40-
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
40+
| **Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>- Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
4141
| **Privacy controls** <br/>Configure privacy in threat reports by controlling the data sent by Defender for Business. Privacy controls are available for admin and end users, and for both enrolled and unenrolled devices. | Requires Intune | Requires Intune |
4242
| **Integration with Microsoft Tunnel** <br/>Integration with [Microsoft Tunnel](/mem/intune/protect/microsoft-tunnel-overview), a VPN gateway solution for Intune. | Requires Intune VPN Tunnel <br/>(see note 3 below) | Requires Intune VPN Tunnel <br/>(see note 3 below) |
4343

4444
> [!NOTE]
45-
> 1. Intune is required for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
45+
> 1. Intune is used for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
4646
>
47-
> 2. Intune is required to configure or manage an allow list of root certification authority and private root certification authority certificates.
47+
> 1. Use Intune to configure or manage an allow list of root certification authority and private root certification authority certificates.
4848
>
4949
> 3. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
50-
>
50+
5151

5252
## How to get mobile threat defense capabilities
5353

defender-endpoint/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1401,8 +1401,6 @@
14011401
href: api/exposed-apis-create-app-partners.md
14021402
- name: Fetch alerts from customer tenant
14031403
href: api/fetch-alerts-mssp.md
1404-
- name: Managed security service provider opportunity
1405-
href: mssp-support.md
14061404
- name: Partner integration scenarios
14071405
items:
14081406
- name: Technical partner opportunities

defender-endpoint/access-mssp-portal.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: Access the Microsoft Defender XDR MSSP customer portal
33
description: Access the Microsoft Defender XDR MSSP customer portal
44
ms.service: defender-endpoint
5+
ms.subservice: onboard
56
ms.author: siosulli
67
author: siosulli
78
ms.localizationpriority: medium

defender-endpoint/api-microsoft-flow.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: How to use Power Automate Connector to set up a Flow for events
33
ms.reviewer:
44
description: Use Microsoft Defender for Endpoint Flow connector to create a flow that will be triggered anytime a new event occurs on your tenant.
55
ms.service: defender-endpoint
6+
ms.subservice: reference
67
ms.author: siosulli
78
author: siosulli
89
ms.localizationpriority: medium

defender-endpoint/application-deployment-via-mecm.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Migrating servers from Microsoft Monitoring Agent to the unified solution
33
description: Learn how to migrate down-level servers from Microsoft Monitoring Agent to the new unified solution step-by-step from this article.
44
search.appverid: met150
55
ms.service: defender-endpoint
6+
ms.subservice: onboard
67
author: siosulli
78
ms.author: siosulli
89
ms.localizationpriority: medium

defender-endpoint/azure-server-integration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Integration with Microsoft Defender for Cloud
33
description: Learn about Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud
44
search.appverid: met150
55
ms.service: defender-endpoint
6+
ms.subservice: onboard
67
author: siosulli
78
ms.author: siosulli
89
ms.localizationpriority: medium

defender-endpoint/conditional-access.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Enable Conditional Access to better protect users, devices, and data
33
description: Enable Conditional Access to prevent applications from running if a device is considered at risk and an application is determined to be non-compliant.
44
search.appverid: met150
55
ms.service: defender-endpoint
6+
ms.subservice: onboard
67
ms.author: siosulli
78
author: siosulli
89
ms.localizationpriority: medium

defender-endpoint/configure-device-discovery.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
title: Configure device discovery
33
description: Learn how to configure device discovery in Microsoft Defender XDR using basic or standard discovery
44
ms.service: defender-endpoint
5+
ms.subservice: onboard
56
f1.keywords:
67
- NOCSH
78
ms.author: siosulli

0 commit comments

Comments
 (0)