You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/anomaly-detection-policy.md
-7Lines changed: 0 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,13 +25,6 @@ Anomalies are detected by scanning user activity. The risk is evaluated by looki
25
25
26
26
Based on the policy results, security alerts are triggered. Defender for Cloud Apps looks at every user session on your cloud and alerts you when something happens that is different from the baseline of your organization or from the user's regular activity.
27
27
28
-
In addition to native Defender for Cloud Apps alerts, you'll also get the following detection alerts based on information received from Microsoft Entra ID Protection:
29
-
30
-
* Leaked credentials: Triggered when a user's valid credentials have been leaked. For more information, see [Microsoft Entra ID's Leaked credentials detection](/azure/active-directory/identity-protection/concept-identity-protection-risks#user-risk).
31
-
* Risky sign-in: Combines a number of Microsoft Entra ID Protection sign-in detections into a single detection. For more information, see [Microsoft Entra ID's Sign-in risk detections](/azure/active-directory/identity-protection/concept-identity-protection-risks#sign-in-risk).
32
-
33
-
These policies appear on the Defender for Cloud Apps policies page and can be enabled or disabled.
34
-
35
28
> [!IMPORTANT]
36
29
> Starting June 2025, Microsoft Defender for Cloud Apps began transitioning anomaly detection policies to a dynamic threat detection model. This model automatically adapts detection logic to the evolving threat landscape, keeping detections current without manual configuration or policy updates. As part of these improvements to overall security, and to provide more accurate and timely alerts, several legacy policies have been disabled:
Copy file name to clipboardExpand all lines: defender-endpoint/minimum-requirements.md
+31-43Lines changed: 31 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,13 +52,7 @@ For detailed licensing information, see the [Product Terms site](https://www.mic
52
52
53
53
## Browser requirements
54
54
55
-
Access to Defender for Endpoint is done through a browser. The following browsers are supported:
56
-
57
-
- Microsoft Edge
58
-
- Google Chrome
59
-
60
-
> [!NOTE]
61
-
> Although other browsers might work, the mentioned browsers are the ones supported.
55
+
Access Microsoft Defender for Endpoint and other [Microsoft Defender XDR](/defender-xdr/) experiences in the Microsoft Defender portal using Microsoft Edge, Internet Explorer 11, or any HTML 5 compliant web browser.
62
56
63
57
## Hardware and software requirements
64
58
@@ -69,36 +63,29 @@ Devices on your network must be running one of the operating systems listed in t
69
63
> [!IMPORTANT]
70
64
> You may continue to use Microsoft Windows after OS support ends; however, it will no longer receive quality updates, new or updated features, or security updates for the operating system itself. However, devices protected by Microsoft Defender for Endpoint will continue to receive regular product updates through existing channels, keeping detection and protection capabilities current.
71
65
72
-
- Windows 11 Enterprise
73
-
- Windows 11 IoT Enterprise
74
-
- Windows 11 Education
75
-
- Windows 11 Pro
76
-
- Windows 11 Pro Education
77
-
-[Windows 10 and 11 on Arm](/windows/arm/overview)
- Windows 365 running one of the previously listed operating systems/versions
95
-
96
-
The following operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
97
-
98
-
- Windows 8.1 Enterprise
99
-
- Windows 8.1 Pro
100
-
- Windows 7 SP1 Enterprise
101
-
- Windows 7 SP1 Pro
75
+
- Windows Server Semi-Annual Channel, version 1803 and above
76
+
77
+
- Windows Server 2019 and later (including Core installation type)
78
+
79
+
-[Windows 365](/windows-365/) Cloud PCs and supported [Azure (Windows) Virtual Desktop](/azure/virtual-desktop/) machines running one of the previously listed operating systems/versions
80
+
81
+
-[Azure Local](/azure/azure-local) Nodes running Azure Stack HCI OS, version 23H2 and above
82
+
83
+
The following Windows operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
84
+
85
+
- Windows 7 SP1 Pro, Enterprise
86
+
87
+
- Windows 8.1 Pro, Enterprise
88
+
102
89
- Windows Server 2008 R2 SP1
103
90
104
91
> [!NOTE]
@@ -115,16 +102,16 @@ To add anti-malware protection to these older operating systems, you can use [Sy
115
102
-[iOS](microsoft-defender-endpoint-ios.md)
116
103
117
104
> [!NOTE]
118
-
> - Make sure to confirm that the Linux distributions and versions of Android, iOS, and macOS are compatible with Defender for Endpoint.
119
-
> - Although Windows 10 IoT Enterprise is a supported OS in Microsoft Defender for Endpoint and enables OEMs/ODMs to distribute it as part of their product or solution, customers should follow the OEM/ODM's guidance around host-based installed software and supportability.
120
-
> - Endpoints running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) aren't supported.
121
-
> - Virtual Machines running Windows 10 Enterprise 2016 LTSB can encounter performance issues when used on non-Microsoft virtualization platforms.
122
-
> - For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later.
123
-
> -[Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) don't include server licenses. To onboard servers to those plans, you need another license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
124
-
> - If your organization is a small or medium-sized business, see [Microsoft Defender for Business requirements](/defender-business/mdb-requirements).
125
-
> - Windows 11 24H2 Home devices that are upgraded to a supported edition might require you to run the following command before onboarding: `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`
105
+
- Make sure to confirm that the Linux distributions and versions of Android, iOS, and macOS are compatible with Defender for Endpoint.
106
+
- Although Windows 10 IoT Enterprise is a supported OS in Microsoft Defender for Endpoint and enables OEMs/ODMs to distribute it as part of their product or solution, customers should follow the OEM/ODM's guidance around host-based installed software and supportability.
107
+
- Endpoints running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) aren't supported.
108
+
- Virtual Machines running Windows 10 Enterprise 2016 LTSB can encounter performance issues when used on non-Microsoft virtualization platforms.
109
+
- For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later.
110
+
-[Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) don't include server licenses. To onboard servers to those plans, you need another license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
111
+
- If your organization is a small or medium-sized business, see [Microsoft Defender for Business requirements](/defender-business/mdb-requirements).
112
+
> - Windows 11 24H2 Home devices that have been upgraded to a supported edition might require you to run the following command before onboarding: `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`
126
113
> For more information about edition upgrades and features, see ([Windows features](/windows-hardware/manufacture/desktop/windows-features?view=windows-11&preserve-view=true))
127
-
114
+
>
128
115
### Hardware requirements
129
116
130
117
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
@@ -177,6 +164,7 @@ If you're running a non-Microsoft anti-malware client and use Mobile Device Mana
177
164
## Related articles
178
165
179
166
-[Set up Microsoft Defender for Endpoint deployment](production-deployment.md)
167
+
180
168
-[Onboard devices](onboard-configure.md)
181
169
182
170
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments