Skip to content

Commit 992dca3

Browse files
authored
Merge pull request #1388 from MicrosoftDocs/main
pushing updates live
2 parents 9b43439 + f441afa commit 992dca3

File tree

6 files changed

+32
-9
lines changed

6 files changed

+32
-9
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dansimp
66
ms.author: dansimp
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 08/27/2024
9+
ms.date: 09/19/2024
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -37,10 +37,10 @@ For more information on Microsoft Defender for Endpoint on other operating syste
3737

3838
**Known issues**
3939

40-
Apple fixed an issue on macOS [Ventura upgrade](https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes), and [Sonoma upgrade](https://developer.apple.com/forums/thread/737824#773449022) with the latest OS update. The issue impacts Microsoft Defender for Endpoint security extensions, and might result in losing Full Disk Access Authorization, impacting its ability to function properly.
41-
42-
In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device controls ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS less than 14.3.1.
43-
40+
> [!NOTE]
41+
> - Apple fixed an issue on macOS [Ventura upgrade](https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes), and [Sonoma upgrade](https://developer.apple.com/forums/thread/737824#773449022) with the latest OS update. The issue impacts Microsoft Defender for Endpoint security extensions, and might result in losing Full Disk Access Authorization, impacting its ability to function properly.
42+
> - In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device controls ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS less than 14.3.1.
43+
> - In both macOS Sonoma and Sequoia builds, Network Protection capabilities may be impacted due to changes in Apple's internal networking structure resulting in crashes of the network extension (NetExt). This will result in intermittent network connectivity issues for end users. We are recommending that customers who have Network Protection enabled in their organization refrain from upgrading to Sonoma / Seqouia builds at this time.
4444
**Sequoia support**
4545

4646
Microsoft Defender supports macOS Sequoia (15) in the current Defender release.
@@ -1022,11 +1022,9 @@ Live Response for macOS is now available for all Mac devices onboarded to Defend
10221022

10231023
> [!CAUTION]
10241024
> macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.
1025-
>
1026-
> The mechanism for granting this consent depends on how you deployed Microsoft Defender for Endpoint:
1027-
>
1025+
> > The mechanism for granting this consent depends on how you deployed Microsoft Defender for Endpoint:
10281026
> - For manual deployments, see the updated instructions in the [Manual deployment topic](mac-install-manually.md#allow-full-disk-access).
1029-
> - For managed deployments, see the updated instructions in the [JAMF-based deployment](mac-install-with-jamf.md) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics.
1027+
- For managed deployments, see the updated instructions in the [JAMF-based deployment](mac-install-with-jamf.md) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics.
10301028

10311029
- Performance improvements & bug fixes
10321030

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
author: limwainstein
3+
ms.author: lwainstein
4+
ms.date: 06/24/2024
5+
ms.topic: include
6+
ms.service: microsoft-defender-iot
7+
---
8+
9+
>[!NOTE]
10+
>
11+
>Currently, devices discovered in the Defender XDR portal aren't synchronized with Azure, and therefore the list of devices discovered could be different in each portal.
12+
>

defender-for-iot/manage-devices-inventory.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ To customize the device inventory views:
4040
- [Use filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views)
4141
- [Use columns](/defender-endpoint/machines-view-overview#use-columns-to-customize-the-device-inventory-views)
4242

43+
[!INCLUDE [defender-iot-site-association](includes/site-association.md)]
44+
4345
## Manage OT devices
4446

4547
- [Explore the device inventory](/defender-endpoint/machines-view-overview#explore-the-device-inventory) including search, export to CSV, and more.

defender-for-iot/set-up-sites.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ In this stage, you configure Defender for IoT to associate OT devices to the sit
6969

7070
1. Select **Next** to review the site details.
7171

72+
[!INCLUDE [defender-iot-site-association](includes/site-association.md)]
73+
7274
## Review site details
7375

7476
Review that information for the site you want to create:

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ Current asset types are:
4040
| Network Admin Device | Device | Medium | Critical devices used to configure, manage, and monitor the network assets within the organization are vital for network administration and are at high risk of cyber threats. They require top-level security to prevent unauthorized access. |
4141
| VMware ESXi | Device | High | The VMware ESXi hypervisor is essential for running and managing virtual machines within your infrastructure. As a bare-metal hypervisor, it's providing the foundation for creating and managing virtual resources. |
4242
| VMware vCenter | Device | High | The VMware vCenter Server is crucial for managing virtual environments. It provides centralized management of virtual machines and ESXi hosts. If it fails, it could disrupt the administration and control of your virtual infrastructure, including provisioning, migration, load balancing of virtual machines, and datacenter automation. However, as there are often redundant vCenter Servers and High Availability configurations, the immediate halt of all operations might not occur. Its failure could still cause significant inconvenience and potential performance issues |
43+
| Hyper-V Server | Device | High | The Hyper-V hypervisor is essential for running and managing virtual machines within your infrastructure, serving as the core platform for their creation and management. If the Hyper-V host fails, it can lead to the unavailability of hosted virtual machines, potentially causing downtime and disrupting business operations. Moreover, it can result in significant performance degradation and operational challenges. Ensuring the reliability and stability of Hyper-V hosts is therefore critical for maintaining seamless operations in a virtual environment. |
4344

4445
##### Identity
4546

exposure-management/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,14 @@ Security Exposure Management is currently in public preview.
2727
2828
## September 2024
2929

30+
### New predefined classifications
31+
32+
The following predefined classification rule was added to the critical assets list:
33+
34+
| Classification | Description |
35+
| ------------------------------------------------------------ | ------------------------------------------------------------ |
36+
| **Hyper-V Server** | This rule applies to devices identified as Hyper-V servers within a domain. These servers are essential for running and managing virtual machines within your infrastructure, serving as the core platform for their creation and management. |
37+
3038
### Enhanced visibility for scoped users
3139

3240
This change now allows users who have been granted access to only some of the organization's devices to see the list of affected assets in metrics, recommendations, events, and initiative history within their specific scope.

0 commit comments

Comments
 (0)