Skip to content

Commit 8d562fb

Browse files
Merge pull request #4461 from MicrosoftDocs/main
[AutoPublish] main to live - 07/10 01:35 PDT | 07/10 14:05 IST
2 parents 086e092 + 75e130d commit 8d562fb

File tree

2 files changed

+31
-50
lines changed

2 files changed

+31
-50
lines changed

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,6 @@ Anomalies are detected by scanning user activity. The risk is evaluated by looki
2525

2626
Based on the policy results, security alerts are triggered. Defender for Cloud Apps looks at every user session on your cloud and alerts you when something happens that is different from the baseline of your organization or from the user's regular activity.
2727

28-
In addition to native Defender for Cloud Apps alerts, you'll also get the following detection alerts based on information received from Microsoft Entra ID Protection:
29-
30-
* Leaked credentials: Triggered when a user's valid credentials have been leaked. For more information, see [Microsoft Entra ID's Leaked credentials detection](/azure/active-directory/identity-protection/concept-identity-protection-risks#user-risk).
31-
* Risky sign-in: Combines a number of Microsoft Entra ID Protection sign-in detections into a single detection. For more information, see [Microsoft Entra ID's Sign-in risk detections](/azure/active-directory/identity-protection/concept-identity-protection-risks#sign-in-risk).
32-
33-
These policies appear on the Defender for Cloud Apps policies page and can be enabled or disabled.
34-
3528
> [!IMPORTANT]
3629
> Starting June 2025, Microsoft Defender for Cloud Apps began transitioning anomaly detection policies to a dynamic threat detection model. This model automatically adapts detection logic to the evolving threat landscape, keeping detections current without manual configuration or policy updates. As part of these improvements to overall security, and to provide more accurate and timely alerts, several legacy policies have been disabled:
3730
>

defender-endpoint/minimum-requirements.md

Lines changed: 31 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,7 @@ For detailed licensing information, see the [Product Terms site](https://www.mic
5252

5353
## Browser requirements
5454

55-
Access to Defender for Endpoint is done through a browser. The following browsers are supported:
56-
57-
- Microsoft Edge
58-
- Google Chrome
59-
60-
> [!NOTE]
61-
> Although other browsers might work, the mentioned browsers are the ones supported.
55+
Access Microsoft Defender for Endpoint and other [Microsoft Defender XDR](/defender-xdr/) experiences in the Microsoft Defender portal using Microsoft Edge, Internet Explorer 11, or any HTML 5 compliant web browser.
6256

6357
## Hardware and software requirements
6458

@@ -69,36 +63,29 @@ Devices on your network must be running one of the operating systems listed in t
6963
> [!IMPORTANT]
7064
> You may continue to use Microsoft Windows after OS support ends; however, it will no longer receive quality updates, new or updated features, or security updates for the operating system itself. However, devices protected by Microsoft Defender for Endpoint will continue to receive regular product updates through existing channels, keeping detection and protection capabilities current.
7165
72-
- Windows 11 Enterprise
73-
- Windows 11 IoT Enterprise
74-
- Windows 11 Education
75-
- Windows 11 Pro
76-
- Windows 11 Pro Education
77-
- [Windows 10 and 11 on Arm](/windows/arm/overview)
78-
- Windows 10 Enterprise
79-
- [Windows 10 Enterprise LTSC 2016 (or later)](/windows/whats-new/ltsc/)
80-
- Windows 10 IoT Enterprise (including LTSC)
81-
- Windows 10 Education
82-
- Windows 10 Pro
83-
- Windows 10 Pro Education
66+
- Windows 10 and 11 Enterprise, IoT Enterprise, Education, Pro, Pro Education including [Windows on Arm](/windows/arm/overview)
67+
68+
- [Windows Enterprise LTSC 2016 (and later)](/windows/whats-new/ltsc/)
69+
70+
- [Windows Enterprise multi-session](/azure/virtual-desktop/windows-multisession-faq)
71+
8472
- Windows Server
8573
- Windows Server 2012 R2
8674
- Windows Server 2016
87-
- Windows Server, version 1803 or later
88-
- Windows Server 2019 and later
89-
- Windows Server 2019 core edition
90-
- Windows Server 2022
91-
- Windows Server 2022 core edition
92-
- Windows Server 2025
93-
- Azure Virtual Desktop
94-
- Windows 365 running one of the previously listed operating systems/versions
95-
96-
The following operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
97-
98-
- Windows 8.1 Enterprise
99-
- Windows 8.1 Pro
100-
- Windows 7 SP1 Enterprise
101-
- Windows 7 SP1 Pro
75+
- Windows Server Semi-Annual Channel, version 1803 and above
76+
77+
- Windows Server 2019 and later (including Core installation type)
78+
79+
- [Windows 365](/windows-365/) Cloud PCs and supported [Azure (Windows) Virtual Desktop](/azure/virtual-desktop/) machines running one of the previously listed operating systems/versions
80+
81+
- [Azure Local](/azure/azure-local) Nodes running Azure Stack HCI OS, version 23H2 and above
82+
83+
The following Windows operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
84+
85+
- Windows 7 SP1 Pro, Enterprise
86+
87+
- Windows 8.1 Pro, Enterprise
88+
10289
- Windows Server 2008 R2 SP1
10390

10491
> [!NOTE]
@@ -115,16 +102,16 @@ To add anti-malware protection to these older operating systems, you can use [Sy
115102
- [iOS](microsoft-defender-endpoint-ios.md)
116103

117104
> [!NOTE]
118-
> - Make sure to confirm that the Linux distributions and versions of Android, iOS, and macOS are compatible with Defender for Endpoint.
119-
> - Although Windows 10 IoT Enterprise is a supported OS in Microsoft Defender for Endpoint and enables OEMs/ODMs to distribute it as part of their product or solution, customers should follow the OEM/ODM's guidance around host-based installed software and supportability.
120-
> - Endpoints running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) aren't supported.
121-
> - Virtual Machines running Windows 10 Enterprise 2016 LTSB can encounter performance issues when used on non-Microsoft virtualization platforms.
122-
> - For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later.
123-
> - [Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) don't include server licenses. To onboard servers to those plans, you need another license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
124-
> - If your organization is a small or medium-sized business, see [Microsoft Defender for Business requirements](/defender-business/mdb-requirements).
125-
> - Windows 11 24H2 Home devices that are upgraded to a supported edition might require you to run the following command before onboarding: `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`
105+
- Make sure to confirm that the Linux distributions and versions of Android, iOS, and macOS are compatible with Defender for Endpoint.
106+
- Although Windows 10 IoT Enterprise is a supported OS in Microsoft Defender for Endpoint and enables OEMs/ODMs to distribute it as part of their product or solution, customers should follow the OEM/ODM's guidance around host-based installed software and supportability.
107+
- Endpoints running mobile versions of Windows (such as Windows CE and Windows 10 Mobile) aren't supported.
108+
- Virtual Machines running Windows 10 Enterprise 2016 LTSB can encounter performance issues when used on non-Microsoft virtualization platforms.
109+
- For virtual environments, we recommend using Windows 10 Enterprise LTSC 2019 or later.
110+
- [Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md) don't include server licenses. To onboard servers to those plans, you need another license, such as Microsoft Defender for Servers Plan 1 or Plan 2 (as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering). To learn more. see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
111+
- If your organization is a small or medium-sized business, see [Microsoft Defender for Business requirements](/defender-business/mdb-requirements).
112+
> - Windows 11 24H2 Home devices that have been upgraded to a supported edition might require you to run the following command before onboarding: `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`
126113
> For more information about edition upgrades and features, see ([Windows features](/windows-hardware/manufacture/desktop/windows-features?view=windows-11&preserve-view=true))
127-
114+
>
128115
### Hardware requirements
129116

130117
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
@@ -177,6 +164,7 @@ If you're running a non-Microsoft anti-malware client and use Mobile Device Mana
177164
## Related articles
178165

179166
- [Set up Microsoft Defender for Endpoint deployment](production-deployment.md)
167+
180168
- [Onboard devices](onboard-configure.md)
181169

182170
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)