Skip to content

Commit 988b9b1

Browse files
authored
Merge pull request #3495 from MicrosoftDocs/main
[AutoPublish] main to live - 04/16 10:31 PDT | 04/16 23:01 IST
2 parents e9899c1 + cd6ad4c commit 988b9b1

13 files changed

+57
-83
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,11 @@
134134
"source_path": "defender-endpoint/configure-server-endpoints.md",
135135
"redirect_url": "/defender-endpoint/onboard-windows-server-2012r2-2016",
136136
"redirect_document_id": true
137+
},
138+
{
139+
"source_path": "defender-endpoint/onboard-windows-client.md",
140+
"redirect_url": "/defender-endpoint/onboard-client",
141+
"redirect_document_id": true
137142
}
138143
]
139144
}

defender-endpoint/TOC.yml

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,10 +138,9 @@
138138
href: migrate-devices-streamlined.md
139139

140140
- name: Onboard client devices
141-
href: onboard-client.md
142141
items:
143-
- name: Onboarding Windows client overview
144-
href: onboard-windows-client.md
142+
- name: Onboard client devices running Windows or macOS
143+
href: onboard-client.md
145144
- name: Defender for Endpoint plug-in for WSL
146145
href: mde-plugin-wsl.md
147146
- name: Onboard Windows devices to Defender for Endpoint using Intune

defender-endpoint/cloud-protection-microsoft-antivirus-sample-submission.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: mkaminska, yongrhee
99
manager: deniseb
1010
ms.subservice: ngp
1111
ms.topic: conceptual
12-
ms.date: 04/07/2025
12+
ms.date: 04/16/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -128,7 +128,7 @@ There are two more scenarios where Defender for Endpoint might request a file sa
128128

129129
| Scenario | Description |
130130
|:---|:---|
131-
|Manual file sample collection in the Microsoft Defender portal | When onboarding devices to Defender for Endpoint, you can configure settings for [endpoint detection and response (EDR)](overview-endpoint-detection-response.md). For example, there's a setting to enable sample collections from the device, which can easily be confused with the sample submission settings described in this article. <br/><br/>The EDR setting controls file sample collection from devices when requested through the Microsoft Defender portal, and is subject to the roles and permissions already established. This setting can allow or block file collection from the endpoint for features such as deep analysis in the Microsoft Defender portal. If this setting isn't configured, the default is to enable sample collection. <br/><br/>Learn about Defender for Endpoint configuration settings, see: [Onboarding tools and methods for Windows 10 devices in Defender for Endpoint](onboard-windows-client.md) |
131+
|Manual file sample collection in the Microsoft Defender portal | When onboarding devices to Defender for Endpoint, you can configure settings for [endpoint detection and response (EDR)](overview-endpoint-detection-response.md). For example, there's a setting to enable sample collections from the device, which can easily be confused with the sample submission settings described in this article. <br/><br/>The EDR setting controls file sample collection from devices when requested through the Microsoft Defender portal, and is subject to the roles and permissions already established. This setting can allow or block file collection from the endpoint for features such as deep analysis in the Microsoft Defender portal. If this setting isn't configured, the default is to enable sample collection. <br/><br/>Learn about Defender for Endpoint configuration settings, see [Onboard Windows and Mac client devices to Microsoft Defender for Endpoint](onboard-client.md) |
132132
| Automated investigation and response content analysis | When [automated investigations](automated-investigations.md) are running on devices (when configured to run automatically in response to an alert or manually run), files that are identified as suspicious can be collected from the endpoints for further inspection. If necessary, the file content analysis feature for automated investigations can be disabled in the Microsoft Defender portal. <br/><br/> The file extension names can also be modified to add or remove extensions for other file types that are automatically submitted during an automated investigation. <br/><br/> To learn more, see [Manage automation file uploads](manage-automation-file-uploads.md). |
133133

134134

defender-endpoint/configure-device-connectivity.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.reviewer: pahuijbr
1515
search.appverid: MET150
1616
audience: ITPro
17-
ms.date: 03/12/2025
17+
ms.date: 04/16/2025
1818
---
1919

2020
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -194,7 +194,7 @@ Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and
194194
3. For new devices (not onboarded to Defender for Endpoint) supported under this method, follow onboarding steps from previous sections using the updated onboarded package with your preferred deployment method:
195195

196196
- [Onboard to Microsoft Defender for Endpoint](onboarding.md)
197-
- [Onboard Windows client](onboard-windows-client.md)
197+
- [Onboard client devices running Windows or macOS](onboard-client.md)
198198
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
199199
- [Run a detection test on a device to verify it has been properly onboarded to Microsoft Defender for Endpoint](run-detection-test.md)
200200

defender-endpoint/configure-endpoints-script.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
ms.subservice: onboard
18-
ms.date: 03/26/2025
18+
ms.date: 04/16/2025
1919
---
2020

2121
# Onboard Windows devices using a local script
@@ -32,7 +32,7 @@ ms.date: 03/26/2025
3232
You can also manually onboard individual devices to Defender for Endpoint. You might want to onboard some devices when you're testing the service before you commit to onboarding all devices in your network.
3333

3434
> [!IMPORTANT]
35-
> The script described in this article is recommended for manually onboarding devices to Defender for Endpoint. It should only be used on a limited number of devices. If you're deploying to a production environment, see [other deployment options](onboard-windows-client.md), such as Intune, Group Policy, or Configuration Manager.
35+
> The script described in this article is recommended for manually onboarding devices to Defender for Endpoint. It should only be used on a limited number of devices. If you're deploying to a production environment, see [other deployment options](onboard-client.md), such as Intune, Group Policy, or Configuration Manager.
3636
3737
Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
3838

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ Virtual desktop infrastructure (VDI) is an IT infrastructure concept that lets e
4343
Like any other system in an IT environment, VDI devices should have an endpoint detection and response (EDR) and antivirus solution to protect against advanced threats and attacks.
4444

4545
> [!NOTE]
46-
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information, see [Onboarding Windows client](onboard-windows-client.md).
46+
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information, see [Onboarding Windows client](onboard-client.md).
4747
4848
## Onboarding non-persistent virtual desktop infrastructure (VDI) devices
4949

defender-endpoint/configure-proxy-internet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ For devices running Windows 7, Windows 8.1, Windows Server 2008 R2, and servers
182182

183183
- [Disconnected environments, proxies, and Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/disconnected-environments-proxies-and-microsoft-defender-for/ba-p/3710502)
184184
- [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md)
185-
- [Onboard Windows devices](onboard-windows-client.md)
185+
- [Onboard client devices running Windows or macOS](onboard-client.md)
186186
- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
187187
- [Onboard devices without Internet access to Microsoft Defender for Endpoint](configure-environment.md)
188188

0 commit comments

Comments
 (0)