Skip to content

Commit 98dfcb8

Browse files
authored
Merge branch 'public' into fix-malformed-note-alert-in-microsoft-defender-offline
2 parents b3391ca + 877388e commit 98dfcb8

22 files changed

+614
-473
lines changed

defender-endpoint/TOC.yml

Lines changed: 396 additions & 428 deletions
Large diffs are not rendered by default.

defender-endpoint/mac-whatsnew.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,9 +41,9 @@ Apple fixed an issue on macOS [Ventura upgrade](https://developer.apple.com/docu
4141

4242
In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device controls ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS less than 14.3.1.
4343

44-
**Sonoma support**
44+
**Sequoia support**
4545

46-
Microsoft Defender supports macOS Sonoma (14.0) in the current Defender release.
46+
Microsoft Defender supports macOS Sequoia (15) in the current Defender release.
4747

4848
**macOS Deprecation**
4949

Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
---
2+
title: Use safe deployment practices to safeguard your environment
3+
description: Plan, implement, adopt, and manage safe deployment practices to safeguard and manage your environment
4+
keywords: mde safe deployment practices
5+
author: siosulli
6+
ms.author: siosulli
7+
manager: deniseb
8+
ms.date: 09/16/2024
9+
ms.topic: conceptual
10+
ms.service: defender-endpoint
11+
ms.subservice: ngp
12+
ms.localizationpriority: high
13+
ms.custom: get-started
14+
ms.collection:
15+
- tier1
16+
- highpri
17+
---
18+
19+
# Use safe deployment practices to safeguard and manage your environment
20+
21+
Microsoft follows safe deployment practices (SDP) to minimize the risk of security updates having an unexpected impact. This article describes Microsoft Defender for Endpoint’s approach to SDP and what customers can do to manage their own roll-out processes to add an extra layer of control.
22+
23+
Microsoft Defender for Endpoint ships updates externally only after all the certification and validation tests are completed across multiple iterations of internal devices.
24+
25+
Defender for Endpoint applies SDP to two distinct update mechanisms:
26+
27+
- Software and driver updates that are updated monthly (can potentially update kernel-mode components).
28+
- Security intelligence and detection logic updates that can be updated multiple times a day (updates only apply to user-mode components).
29+
30+
## Monthly SDP software and driver updates
31+
32+
Defender for Endpoint releases monthly software and driver updates that add new functionality, improve existing features, and resolve bugs.
33+
34+
Defender for Endpoint’s kernel drivers capture system-wide signals like process execution, file creation, and network activity. These drivers are updated through Windows Update, over a gradual and staged deployment process after spending weeks in stabilization and testing. The deployment evaluation monitors key metrics like reliability, performance, battery, application compatibility, and more across hardware and software configurations.
35+
36+
The process for rolling out software and driver updates for Defender for Endpoint is shown in this image:
37+
38+
:::image type="content" alt-text="process for rolling out software and driver updates for Defender for Endpoint" source="/defender/media/defender-endpoint/mde-software-driver-updates.png" lightbox="/defender/media/defender-endpoint/mde-software-driver-updates.png":::
39+
40+
### Microsoft SDP for monthly updates
41+
42+
All code and content changes go through engineering release gates along with extensive validations and stability testing. After the certification and validation process, Microsoft ships the updates through multiple groups of devices known as stabilization rings. The first stabilization ring targets Microsoft’s hundreds of thousands of employees and millions of internal devices. This helps ensure Microsoft discovers and addresses issues first, before customers.
43+
44+
Within each ring, Microsoft closely monitors quality signals such as product behavior and performance, false positives, as well as functional and reliability issues, before proceeding to roll out the update to a broader set of devices.
45+
46+
Once internal testing is successfully completed, Microsoft then releases the updates externally in a staggered manner to ensure stability. During this time, Microsoft continuously monitors the rollout to ensure a quick response and remote resolution of any issues by reverting or reissuing update packages.
47+
48+
### Customer SDP for monthly updates
49+
50+
In addition to Microsoft’s safe deployment practices, organizations can also manage monthly updates with their own safe deployment practices through various controls:
51+
52+
- [Create a custom gradual rollout process for Microsoft Defender updates](configure-updates.md) to control the delivery of agent updates to their devices. Customers can control the rings that are assigned to their device group and when each ring receives updates. For example, place lower-valued assets in earlier rings and higher-valued assets in later rings.
53+
- Apply patch management software and practices for security component updates that can also arrive in the form of monthly Latest Cumulative Updates (LCUs).
54+
- Use [rollback controls](microsoft-defender-antivirus-updates.md#how-to-roll-back-an-update) or automated rollback options to revert or reset components to a last known good state.
55+
56+
> [!NOTE]
57+
> Caution is advised when rolling back an update across a large group of devices.
58+
59+
## Daily SDP security intelligence and detection logic updates
60+
61+
Microsoft releases security intelligence updates that once installed on devices supplement the real-time local and cloud-based machine learning models, behavior analysis, and heuristics that enable Defender for Endpoint to neutralize the latest known cyberthreats.
62+
63+
Given the high frequency at which these updates need to be delivered to protect customers, it’s not possible to deploy them through the same deployment process. Therefore, Defender for Endpoint doesn't include kernel changes in intelligence updates. Instead, daily updates are only delivered to components that run in the user mode of the operating system. This approach helps mitigate the risk of these more frequent updates from impacting the broader operating system and, in the unlikely event of an error, limits the risk of significant negative effects like system crashes and ensures devices can be automatically recovered.
64+
65+
### Microsoft SDP for daily updates
66+
67+
Similar to the process for software and driver updates, Microsoft ships security intelligence updates after extensive testing and rolls them out starting with internal devices, early access customers, and then releases them externally in a controlled, gradual manner. Microsoft continually monitors telemetry and can mitigate issues through the cloud in minutes.
68+
69+
### Customer SDP for daily updates
70+
71+
Customers can also manage security intelligence updates with their own safe deployment policies through various measures:
72+
73+
- Stage updates through [corporate networks](microsoft-defender-antivirus-ring-deployment-group-policy-network-share.md#setting-up-the-pilot-environment) or software management solutions.
74+
- Apply updates at a lower frequency for critical systems. Daily releases can be applied at a lower frequency for certain device groups, including servers critical to running your infrastructure.
75+
- Use [rollback controls](microsoft-defender-antivirus-updates.md#how-to-roll-back-an-update) to revert or reset components to a last known good state.
76+
77+
## Related articles
78+
79+
- [microsoft-defender-antivirus-ring-deployment](microsoft-defender-antivirus-ring-deployment.md)
80+
- [manage-protection-updates-microsoft-defender-antivirus](manage-protection-updates-microsoft-defender-antivirus.md)
81+
- [microsoft-defender-antivirus-updates](microsoft-defender-antivirus-updates.md)
82+
- [mac-updates](mac-updates.md)
83+
- [linux-support-offline-security-intelligence-update](linux-support-offline-security-intelligence-update.md)

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,22 @@ All our updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### August-2024 (Platform: 4.18.24080.9 | Engine: 1.1.24080.9)
102+
103+
- Security intelligence update version: **1.419.1.0**
104+
- Release date: **September 17, 2024** (Engine and Platform)
105+
- Platform: **4.18.24080.9**
106+
- Engine: **1.1.24080.9**
107+
- Support phase: **Security and Critical Updates**
108+
109+
### What's new
110+
111+
- Added a new parameter to get-mppreference cmdlet (ControlledFolderAccessDefaultProtectedFolders) to show default protected folders for Controlled Folder Access (CFA).
112+
- Fixed an issue with Device Control regarding printer security checks.
113+
- Resolved an issue with platform rollback after an upgrade from Windows 10 to 11.
114+
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
115+
- Removed support for Windows RT devices, for example, Surface RT, that use 32-bit ARM processors and have reached their end-of-servicing date.
116+
101117
### July-2024 (Platform: 4.18.24070.5 | Engine: 1.1.24070.3)
102118

103119
- Security intelligence update version: **1.417.14.0**

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ There are several methods and deployment tools that you can use to install and c
7171

7272
The three most recent major releases of macOS are supported.
7373

74-
- 14 (Sonoma), 13 (Ventura), 12 (Monterey)
74+
- 15 (Sequoia), 14 (Sonoma), 13 (Ventura), 12 (Monterey)
7575

7676
> [!IMPORTANT]
7777
> On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).

defender-for-iot/device-discovery.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,15 +43,15 @@ The key device discovery capabilities are:
4343

4444
|Capability|Description|
4545
|---|---|
46-
|OT device management|[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.<br>- Add organization-specific information to emphasize your organization preferences.|
46+
|OT device management|[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Discover your organization Building Management Systems (BMS) devices such as **Motion detector**, **Fire Alarm**, and **Elevators**.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.<br>- Add organization-specific information to emphasize your organization preferences.|
4747
|Device protection with risk-based approach|Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling.|
4848
|Device alignment with physical sites|Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views).|
4949
|Device groups|Allows different teams in your organization to monitor and manage relevant assets only. Learn more about [creating a device group](/defender-endpoint/machine-groups#create-a-device-group).|
5050
|Device criticality|Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview).|
5151

5252
## Supported devices
5353

54-
Defender for IoT's device inventory supports the following device classes:
54+
Defender for IoT's device inventory supports the following device categories:
5555

5656
|Devices|Example|
5757
|---|---|
@@ -60,10 +60,12 @@ Defender for IoT's device inventory supports the following device classes:
6060
|**Health care**|Glucose meters, monitors|
6161
|**Transportation / Utilities**|Turnstiles, people counters, motion sensors, fire and safety systems, intercoms|
6262
|**Energy and resources**|DCS controllers, PLCs, historian devices, HMIs|
63-
|**Endpoint devices**|Workstations, servers, or mobile devices|
64-
|**Enterprise**|Smart devices, printers, communication devices, or audio/video devices|
6563
|**Retail**|Barcode scanners, humidity sensor, punch clocks|
6664

65+
For Enterprise device discovery information, see [Enterprise device discovery](/defender-for-iot/enterprise-iot).
66+
67+
For Endpoint device discovery information, see [Endpoint device discovery](/defender-endpoint/device-discovery).
68+
6769
### Identified, unique devices
6870

6971
Defender for IoT can discover all devices, of any type, across all environments. Devices are listed in the Defender for IoT **Device inventory** pages based on a unique IP and MAC address coupling.
@@ -72,8 +74,8 @@ Defender for IoT identifies single and unique devices as follows:
7274

7375
|Type |Description |
7476
|---------|---------|
75-
|**Identified as individual devices** | Devices identified as *individual* devices include:<br>**IT, OT, or IoT devices with one or more NICs**, including network infrastructure devices such as switches and routers<br><br>**Note**: A device with modules or backplane components, such as racks or slots, is counted as a single device, including all modules or backplane components.|
76-
|**Not identified as individual devices** | The following items *aren't* considered as individual devices, and do not count against your license:<br><br>- **Public internet IP addresses** <br>- **Multi-cast groups**<br>- **Broadcast groups**<br>- **Inactive devices**<br><br> Network-monitored devices are marked as *inactive* when there's no network activity detected within a specified time:<br><br> - **OT networks**: No network activity detected for more than 60 days<br> - **Enterprise IoT networks**: No network activity detected for more than 30 days<br><br>**Note**: Endpoints already managed by Defender for Endpoint are not considered as separate devices by Defender for IoT. |
77+
|**Identified as individual devices** | Devices identified as *individual* devices include:<br>**OT or BMS unmanaged devices with one or more NICs**, including network infrastructure devices such as switches and routers<br><br>**Note**: A device with modules or backplane components, such as racks or slots, is counted as a single device, including all modules or backplane components.|
78+
|**Not identified as individual devices** | The following items *aren't* considered as individual devices, and don't count against your license:<br><br>- **Public internet IP addresses** <br>- **Multi-cast groups**<br>- **Broadcast groups**<br>- **Inactive devices**<br><br> Network-monitored devices are marked as *inactive* when there's no network activity detected within a specified time:<br><br> - **OT networks**: No network activity detected for more than 60 days<br><br>**Note**: Endpoints already managed by Defender for Endpoint aren't considered as separate devices by Defender for IoT. |
7779

7880
## Next steps
7981

defender-for-iot/enterprise-iot-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ In this article you'll learn how to add enterprise IoT to your Microsoft Defende
2121

2222
## Prerequisites
2323

24-
Make sure that you have:
24+
Before you start, you need:
2525

2626
- IoT devices in your network, visible in the Microsoft Defender portal **Device inventory**
2727

defender-for-iot/license-overview.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,32 +9,32 @@ ms.date: 08/01/2024
99
ms.topic: overview
1010
---
1111

12-
# How the site-based license model works
12+
# The site-based license model
1313

14-
The site-based license model offers a simplified approach to licensing by providing coverage for entire sites rather than individual devices. Customers can purchase annual licenses for their operational sites where Operational Technology (OT) devices are deployed, and receive security coverage for all devices within the site.
14+
Our site-based license model streamlines your licensing needs by covering entire sites instead of individual devices. With this model, you can purchase annual licenses for your operational sites where Operational Technology (OT) devices are deployed. This ensures comprehensive security coverage for all devices within each site.
1515

1616
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
1717

18-
## What defines a site?
18+
## Sites in Defender for IoT
1919

2020
A site refers to a logical grouping of devices within your organization. It represents a specific physical location, such as a manufacturing facility, campus, office building, hospital, rig, or any other relevant site.
2121

22-
## What are the different OT site-based licenses?
22+
## OT site-based licenses
2323

2424
Licenses come in five different sizes, based on the number of devices at the site. The licenses range from the smallest tier that covers up to 100 devices per site, to the largest tier, which secures up to 5000 devices per site. For more information, see [license sizing details](https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-iot-pricing#xfb84a030eec341cb84a6165f393e928a).
2525

2626
The size of a site is determined by the maximum number of devices per site. Billing is based on the license tier, regardless of the number of devices actually discovered.
2727

28-
## What if I need to change the number of devices for a site after making a purchase? 
28+
## Adjust the number of devices for a site
2929

30-
Once a license is purchased, the number of devices cannot be adjusted until the renewal period. During the annual license renewal, you change to a different license tier for a site based on your updated discovered device count.
30+
Once a license is purchased, the number of devices can only be adjusted at the renewal period. During the annual license renewal, you can change to a different license tier for a site based on your updated discovered device count.
3131

32-
## How to choose a license and assess the number of devices on-site?
32+
## Assess the number of devices at a site
3333

3434
There are two methods for assessing the number of devices at your site. You could either utilize your OT network monitoring tools to detect and count the devices per site, or use previous knowledge of the number of devices at the site and update the license during the annual license renewal if needed.
3535

3636
> [!Note]
37-
> All types of devices, both OT and IT, identified on your site should be included in the license. This includes endpoints managed by Microsoft Defender for Endpoint and devices detected by the Microsoft Defender for IoT sensors.
37+
> The license should cover all types of devices identified on your site, including both OT and IT devices. This includes endpoints managed by Microsoft Defender for Endpoint.
3838
3939
## Next steps
4040

defender-for-iot/prerequisites.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Before you start, you need:
2525

2626
For more information, see [Buy or remove licenses for a Microsoft business subscription](/microsoft-365/commerce/licenses/buy-licenses) and [About admin roles in the Microsoft 365 admin center](/microsoft-365/admin/add-users/about-admin-roles).
2727

28-
- A Microsoft 365 E5/ Defender for Endpoint Plan 2/ E5 security license.
28+
- A Microsoft 365 E5 or E5 security license or a Defender for Endpoint P2 license.
2929

3030
- Microsoft Defender for Endpoint agents deployed in your environment. For more information, see [onboard Microsoft Defender for Endpoint](/defender-endpoint/onboarding).
3131

defender-for-iot/whats-new.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,20 @@ This article describes features available in Microsoft Defender for IoT in the D
1616

1717
[!INCLUDE [defender-iot-preview](../includes//defender-for-iot-defender-public-preview.md)]
1818

19+
## September 2024
20+
21+
|Service area |Updates |
22+
|---------|---------|
23+
| **OT networks** | - [New Device Category Added – Building Management Systems (BMS)](#new-device-category-added--building-management-systems-bms) |
24+
25+
### New Device Category Added – Building Management Systems (BMS)
26+
27+
A new BMS device category has been added to the MDIoT license aiming to improve BMS device discovery and security. The BMS category includes a subset of Smart Facility and Surveillance devices (previously under the IoT category) such as fire alarms, humidity sensors, security radars, etc. These devices now require an Microsoft Defender for IoT site-based license for full protection.
28+
29+
Cameras devices will remain under the IoT category.
30+
31+
For more information, see [overview of device discovery](device-discovery.md).
32+
1933
## July 2024
2034

2135
|Service area |Updates |

0 commit comments

Comments
 (0)