Skip to content

Commit 921c1c1

Browse files
authored
Merge branch 'main' into diannegali-updateincident
2 parents 2375083 + d0ecd0d commit 921c1c1

15 files changed

+236
-20
lines changed

defender-endpoint/android-intune.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Learn how to deploy Defender for Endpoint on Android on Microsoft Intune Company
3838
3939
## Deploy on Device Administrator enrolled devices
4040

41-
Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024. For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
41+
4242

4343
Learn how to deploy Defender for Endpoint on Android with Microsoft Intune Company Portal - Device Administrator enrolled devices.
4444

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -27,18 +27,19 @@ ms.date: 11/15/2024
2727

2828
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
2929

30-
**Ending support for Device Administrator enrolled devices**
31-
32-
Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33-
34-
**For devices with access to GMS**
35-
36-
After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways: 
37-
38-
- Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39-
- Intune and Defender for Endpoint technical support will no longer support these devices.
30+
> [!IMPORTANT]
31+
> **Ending support for Device Administrator enrolled devices**
32+
> Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33+
>
34+
> **For devices with access to GMS**
35+
>
36+
> After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways:
37+
>
38+
> - Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39+
> - Intune and Defender for Endpoint technical support will no longer support these devices.
40+
>
41+
> For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
4042
41-
For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
4243

4344
**Aug-2024 (version: 1.0.6812.0101)**
4445

defender-endpoint/controlled-folders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 11/06/2024
6+
ms.date: 11/19/2024
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -40,7 +40,7 @@ search.appverid: met150
4040
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
4141

4242
> [!NOTE]
43-
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](indicator-certificates.md).
43+
> Scripting engines like PowerShell are not trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
4444
4545
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
4646

defender-for-iot/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,12 +44,16 @@
4444
href: device-discovery.md
4545
- name: Discover and manage devices
4646
href: manage-devices-inventory.md
47+
- name: Review security initiatives
48+
items:
49+
- name: Review security initiatives
50+
href: review-security-initiatives.md
4751
- name: Prioritize and remediate vulnerabilities
4852
items:
4953
- name: Overview
5054
href: discover-vulnerabilities-overview.md
5155
- name: Prioritize and remediate vulnerabilities
52-
href: prioritize-vulnerabilities.md
56+
href: prioritize-vulnerabilities.md
5357
- name: Investigate and remediate threats
5458
items:
5559
- name: Investigate incidents and alerts
80.4 KB
Loading
95 KB
Loading
46.2 KB
Loading
40.4 KB
Loading
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: Review security initiatives with Microsoft Defender for IoT in the Defender portal
3+
description: This article describes how to review security initiatives with Microsoft Defender for IoT in the Defender portal.
4+
ms.service: defender-for-iot
5+
author: limwainstein
6+
ms.author: lwainstein
7+
ms.localizationpriority: medium
8+
ms.date: 11/17/2024
9+
ms.topic: how-to
10+
---
11+
12+
# Review security initiatives
13+
14+
[Security initiatives](/security-exposure-management/exposure-insights-overview#security-initiatives) offer a focused, metric-driven way of tracking exposure in specific security areas using security initiatives.
15+
16+
Microsoft Defender for IoT in the Defender portal allows you to review Microsoft Security Exposure Management security initiatives dedicated to OT and enterprise IoT device protection.
17+
18+
In this article, you learn how to review security initiatives so that your security teams can prioritize, discover, and validate OT-related security findings across your sites.
19+
20+
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
21+
22+
## OT Security initiative
23+
24+
The **OT Security** initiative improves your OT site security posture by monitoring and protecting OT environments in the organization, and employing network layer monitoring. This initiative identifies devices and ensures that systems are working correctly, and data is protected.
25+
26+
Your security teams can use the **OT Security** initiative to:
27+
28+
- Identify unprotected devices.
29+
- Harden posture across sites through vulnerability assessments, with actionable guidance to help remediate at-risk devices.
30+
31+
## Enterprise IoT Security initiative
32+
33+
The **Enterprise IoT Security** initiative allows you to identify unmanaged IoT devices and enhance your organization's security. With continuous monitoring, vulnerability assessments, and tailored recommendations specifically designed for enterprise IoT devices, you gain comprehensive visibility into the risks posed by these devices. This initiative not only helps you understand the potential threats but also strengthens your organization's resilience in mitigating them.
34+
35+
Review the full [security initiatives catalog](/security-exposure-management/initiatives-list).
36+
37+
## Prerequisites
38+
39+
- Review the Defender for IoT [prerequisites](prerequisites.md).
40+
- Review the [prerequisites for the **OT Security** initiative](#prerequisites-for-ot-security-initiative).
41+
42+
### Prerequisites for OT Security initiative
43+
44+
When you view the **OT security** initiative, if you haven't yet onboarded Defender for IoT and set up sites, the **More data is required to support this initiative** section is displayed.
45+
46+
:::image type="content" source="media/review-security-initiatives/more-data-required.png" alt-text="Screenshot showing the **More data is required to support this initiative** section in Microsoft Defender for IoT in the Microsoft Defender portal.":::
47+
48+
If the **More data is required to support this initiative** section is displayed:
49+
50+
1. Review the **Unprotected OT devices** metric to understand the impact on your network. For example, the **Unprotected OT devices** metric shows 24 affected assets.
51+
52+
:::image type="content" source="media/review-security-initiatives/unprotected-ot-devices.png" alt-text="Screenshot showing the Unprotected OT devices metric **Overview** tab in Microsoft Defender for IoT in the Microsoft Defender portal.":::
53+
54+
1. Select **Get started with Microsoft Defender for IoT** and follow the procedure to [onboard Defender for IoT in the Defender portal](get-started.md).
55+
56+
1. Select **create new sites** to [set up sites](set-up-sites.md).
57+
58+
## Review initiatives
59+
60+
1. Follow the procedure to [open the Initiatives page and review an initiative](/security-exposure-management/initiatives#view-initiatives-page).
61+
1. For the **OT Security** initiative, if you haven't yet onboarded Defender for IoT and set up sites, the **More data is required to support this initiative** section is displayed. In this case, see the [prerequisites for the OT Security initiative](#prerequisites-for-ot-security-initiative).
62+
63+
1. Review the data in the initiative page, including the initiative score, top metrics, and more (learn more about [initiatives](/security-exposure-management/exposure-insights-overview)). For example, this **OT Security** initiative page shows an initiative score of 83%, and shows that 61.9% of the detected OT devices are protected.
64+
65+
:::image type="content" source="media/review-security-initiatives/ot-security-initiative.png" alt-text="Screenshot showing the OT Security initiative in Microsoft Defender for IoT in the Microsoft Defender portal." lightbox="media/review-security-initiatives/ot-security-initiative.png":::
66+
67+
1. Select the metric from the **Top metrics** area in the initiative page or from the **Related metrics** area in the small overview.
68+
- Review the **Overview** tab to drill down into additional security data and recommendations, including the weight of the metrics, affected assets, and score impact. For example, the **Unprotected OT devices** metric shows 24 affected assets, and 3.81 score impact.
69+
70+
:::image type="content" source="media/review-security-initiatives/unprotected-ot-devices.png" alt-text="Screenshot showing the Unprotected OT devices metric **Overview** tab in Microsoft Defender for IoT in the Microsoft Defender portal.":::
71+
72+
- Review the recommendations in the **Security recommendations** tab. For example, for the **Site-linked devices using insecure protocols** metric, you're recommended to disable the Telnet administration protocol, and remove the SNMP V1 and SNMP V2 administration protocols.
73+
74+
:::image type="content" source="media/review-security-initiatives/security-recommendations.png" alt-text="Screenshot showing the **Security recommendations** tab for a metric in Microsoft Defender for IoT in the Microsoft Defender portal.":::
75+
76+
Learn more about [working with metrics](/security-exposure-management/exposure-insights-overview#working-with-metrics).
77+
78+
## Next steps
79+
80+
[Learn about vulnerabilities](discover-vulnerabilities-overview.md) or proceed to [investigate and remediate vulnerabilities](prioritize-vulnerabilities.md).

defender-for-iot/whats-new.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,25 @@ This article describes features available in Microsoft Defender for IoT in the D
1616

1717
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
1818

19+
## November 2024
20+
21+
|Service area |Updates |
22+
|---------|---------|
23+
| **OT networks** | - [Secure site-linked devices in Microsoft Security Exposure Management Initiatives page](#secure-site-linked-devices-in-microsoft-security-exposure-management-initiatives-page) |
24+
25+
### Secure site-linked devices in Microsoft Security Exposure Management Initiatives page
26+
27+
You can now review the new **OT Security** initiative in the Microsoft Security Exposure Management **Initiatives** page. This new initiative provides a metric-driven way of tracking exposure about unmanaged OT devices.
28+
29+
:::image type="content" source="media/review-security-initiatives/ot-security-initiative.png" alt-text="Screenshot showing the OT Security initiative in Microsoft Defender for IoT in the Microsoft Defender portal." lightbox="media/review-security-initiatives/ot-security-initiative.png":::
30+
31+
This new initiative serves as a powerful tool to improve your OT site security posture. The initiative aims to monitor and safeguard OT environments within the organization by employing network layer monitoring. This initiative identifies devices and ensures that systems are working correctly, and data is protected.
32+
33+
For more information, see:
34+
35+
- [Review security initiatives](review-security-initiatives.md)
36+
- [Microsoft Security Exposure Management release notes](/security-exposure-management/whats-new#ot-security-initiative).
37+
1938
## September 2024
2039

2140
|Service area |Updates |
@@ -24,7 +43,7 @@ This article describes features available in Microsoft Defender for IoT in the D
2443

2544
### Review unmanaged enterprise IoT devices in Microsoft Security Exposure Management Initiatives page
2645

27-
You can now review the new Enterprise IoT Security initiative in the Microsoft Security Exposure Management Initiatives page. This new initiative provides a metric-driven way of tracking exposure about unmanaged enterprise IoT devices.
46+
You can now review the new **Enterprise IoT Security** initiative in the Microsoft Security Exposure Management **Initiatives** page. This new initiative provides a metric-driven way of tracking exposure about unmanaged enterprise IoT devices.
2847

2948
For more information, see the [Microsoft Security Exposure Management release notes](/security-exposure-management/whats-new#new-enterprise-iot-security-initiative).
3049

0 commit comments

Comments
 (0)