Skip to content

Commit 9e4e236

Browse files
authored
Merge branch 'main' into deniseb-281044
2 parents 37aad15 + c6fdb75 commit 9e4e236

38 files changed

+374
-91
lines changed

defender-endpoint/android-configure-mam.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-android
1515
ms.topic: conceptual
1616
ms.subservice: android
17-
ms.date: 07/25/2024
17+
ms.date: 08/08/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -124,14 +124,14 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
124124

125125
1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
126126

127-
2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
127+
2. Select **Continue**. A screen is presented which recommends downloading and setting up of the Microsoft Defender: Antivirus (Mobile) app.
128128

129129
3. Select **Download**. You'll be redirected to the app store (Google play).
130130

131-
4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen.
132-
133-
:::image type="content" source="media/download-mde.png" alt-text="The illustrative pages that contain the procedure of downloading MDE and launching back the app-onboarding screen." lightbox="media/download-mde.png":::
131+
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
134132

133+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134+
135135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136136

137137
6. Select **Continue** to log into the managed application.

defender-endpoint/api/get-all-recommendations.md

Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -100,34 +100,36 @@ Here is an example of the response.
100100
"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Recommendations",
101101
"value": [
102102
{
103-
"id": "va-_-microsoft-_-windows_10" "va-_-microsoft-_-windows_11",
104-
"productName": "windows_10" "Windows_11",
105-
"recommendationName": "Update Windows 10" "Update Windows 11",
106-
"weaknesses": 397,
103+
"id": "va-_-microsoft-_-edge_chromium-based",
104+
"productName": "edge_chromium-based",
105+
"recommendationName": "Update Microsoft Edge Chromium-based to version 127.0.2651.74",
106+
"weaknesses": 762,
107107
"vendor": "microsoft",
108-
"recommendedVersion": "",
108+
"recommendedVersion": "127.0.2651.74",
109+
"recommendedVendor": "",
110+
"recommendedProgram": "",
109111
"recommendationCategory": "Application",
110112
"subCategory": "",
111113
"severityScore": 0,
112114
"publicExploit": true,
113115
"activeAlert": false,
114116
"associatedThreats": [
115-
"3098b8ef-23b1-46b3-aed4-499e1928f9ed",
116-
"40c189d5-0330-4654-a816-e48c2b7f9c4b",
117-
"4b0c9702-9b6c-4ca2-9d02-1556869f56f8",
118-
"e8fc2121-3cf3-4dd2-9ea0-87d7e1d2b29d",
119-
"94b6e94b-0c1d-4817-ac06-c3b8639be3ab"
117+
"71d9120e-7eea-4058-889a-1a60bbf7e312"
120118
],
121119
"remediationType": "Update",
122120
"status": "Active",
123121
"configScoreImpact": 0,
124-
"exposureImpact": 7.674418604651163,
125-
"totalMachineCount": 37,
126-
"exposedMachinesCount": 7,
122+
"exposureImpact": 1.1744086343876479,
123+
"totalMachineCount": 261,
124+
"exposedMachinesCount": 193,
127125
"nonProductivityImpactedAssets": 0,
128-
"relatedComponent": "Windows 10" "Windows 11"
126+
"relatedComponent": "Edge Chromium-based",
127+
"hasUnpatchableCve": false,
128+
"tags": [
129+
"internetFacing"
130+
],
131+
"exposedCriticalDevices": 116
129132
}
130-
...
131133
]
132134
}
133135
```

defender-endpoint/api/get-all-vulnerabilities.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -94,21 +94,24 @@ Here is an example of the response.
9494
"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Vulnerabilities",
9595
"value": [
9696
{
97-
"id": "CVE-2019-0608",
98-
"name": "CVE-2019-0608",
99-
"description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.",
100-
"severity": "Medium",
101-
"cvssV3": 4.3,
97+
"id": "CVE-2024-7256",
98+
"name": "CVE-2024-7256",
99+
"description": "Summary: Google Chrome is vulnerable to a security bypass due to insufficient data validation in Dawn. An attacker can exploit this vulnerability by tricking a user into visiting a malicious website, allowing them to bypass security restrictions. Impact: If successfully exploited, this vulnerability could allow a remote attacker to bypass security restrictions in Google Chrome. Remediation: Apply the latest patches and updates provided by the respective vendors. Generated by AI",
100+
"severity": "High",
101+
"cvssV3": 8,
102102
"cvssVector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
103-
"exposedMachines": 4,
104-
"publishedOn": "2019-10-08T00:00:00Z",
105-
"updatedOn": "2019-12-16T16:20:00Z",
103+
"exposedMachines": 23,
104+
"publishedOn": "2024-07-30T00:00:00Z",
105+
"updatedOn": "2024-07-31T00:00:00Z",
106+
"firstDetected": "2024-07-31T01:55:47Z",
106107
"publicExploit": false,
107108
"exploitVerified": false,
108109
"exploitInKit": false,
109110
"exploitTypes": [],
110111
"exploitUris": [],
111-
"CveSupportability": "supported"
112+
"cveSupportability": "Supported",
113+
"tags": [],
114+
"epss": 0.632
112115
}
113116
]
114117

defender-endpoint/api/get-recommendation-by-id.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,11 @@ Here's an example of the response.
102102
"totalMachineCount": 6,
103103
"exposedMachinesCount": 5,
104104
"nonProductivityImpactedAssets": 0,
105-
"relatedComponent": "Chrome"
105+
"relatedComponent": "Chrome",
106+
"tags": [
107+
"internetFacing"
108+
],
109+
"exposedCriticalDevices": 116
106110
}
107111
```
108112

defender-endpoint/api/recommendation.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,5 +80,7 @@ Want to experience Defender for Endpoint? [Sign up for a free trial.](https://si
8080
|exposedMachinesCount|Long|Number of installed devices that are exposed to vulnerabilities|
8181
|nonProductivityImpactedAssets|Long|Number of devices that aren't affected|
8282
|relatedComponent|String|Related software component|
83-
|
83+
|exposedCriticalDevices|Numeric|The sum of critical devices in all levels of criticality except “not critical" for a particular recommendation|
84+
85+
8486
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/vulnerability.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,5 +64,7 @@ exploitInKit|Boolean|Exploit is part of an exploit kit
6464
exploitTypes|String collection|Exploit affect. Possible values are: **Local privilege escalation**, **Denial of service**, or **Local**
6565
exploitUris|String collection|Exploit source URLs
6666
CveSupportability| String collection| Possible values are: **Supported**, **Not Supported**, or **SupportedInPremium**
67+
EPSS|Numeric| Represents the probability that a vulnerability will be exploited. This probability is expressed as a number between 0 and 1 (0%-100%) according to the EPSS model.
68+
6769

6870
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/edr-detection.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/06/2024
18+
ms.date: 08/15/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -76,7 +76,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
7676

7777
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
7878

79-
<!---
8079
### macOS
8180

8281
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,7 +128,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129128

130129
Look at the alert details and the device timeline, and perform the regular investigation steps.
131130

132-
--->
133131

134132
## Next steps
135133

defender-endpoint/endpoint-attack-notifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 09/23/2022
17+
ms.date: 08/15/2024
1818
---
1919

2020
# Endpoint Attack Notifications
@@ -31,7 +31,7 @@ ms.date: 09/23/2022
3131
> This covers threat hunting on your Microsoft Defender for Endpoint service. However, if you're interested to explore the service beyond your current license, and proactively hunt threats not just on endpoints but also across Office 365, cloud applications, and identity, refer to [Microsoft Defender Experts for Hunting](/defender-xdr/defender-experts-for-hunting).
3232
3333
> [!NOTE]
34-
> Customers who signed up for Experts on Demand prior to sunset will have access to Ask Defender Experts until the expiration of their current contract.
34+
> The intake of new customers to the Endpoint Attack Notifications service is currently on pause. For customers interested in a managed service, sign up the [Defender Experts service request form](https://aka.ms/IWantDefenderExperts).
3535
3636
Endpoint Attack Notifications (previously referred to as Microsoft Threat Experts - Targeted Attack Notification) provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyber-espionage. These notifications show up as a new alert. The managed hunting service includes:
3737

defender-endpoint/internet-facing-devices.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier2
1414
ms.topic: conceptual
1515
search.appverid: met150
16-
ms.date: 07/10/2023
16+
ms.date: 07/31/2024
1717
---
1818

1919
# Internet-facing devices
@@ -64,6 +64,10 @@ You can use filters to focus in on internet-facing devices and investigate the r
6464

6565
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-filter.png" alt-text="Screenshot of the internet-facing filter" lightbox="/defender/media/defender-endpoint/internet-facing-filter.png":::
6666

67+
The internet-facing device tag also appears in Microsoft Defender Vulnerability Management. This allows you to filter for internet-facing devices from the [weaknesses](/defender-vulnerability-management/tvm-weaknesses) and the [security recommendations](/defender-vulnerability-management/tvm-security-recommendation) pages in the Microsoft Defender portal.
68+
69+
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-weaknesses.png" alt-text="Screenshot of the internet-facing weaknesses" lightbox="/defender/media/defender-endpoint/internet-facing-weaknesses.png":::
70+
6771
> [!NOTE]
6872
> If no new events for a device occur for 48 hours, the Internet-facing tag is removed and it will no longer be visible in the Microsoft Defender portal.
6973

defender-endpoint/mac-preferences.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: how-to
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/29/2024
17+
ms.date: 08/15/2024
1818
---
1919

2020
# Set preferences for Microsoft Defender for Endpoint on macOS
@@ -681,7 +681,7 @@ The following configuration profile (or, in case of JAMF, a property list that c
681681
<key>PayloadOrganization</key>
682682
<string>Microsoft</string>
683683
<key>PayloadIdentifier</key>
684-
<string>com.microsoft.wdav</string>
684+
<string>
685685
<key>PayloadDisplayName</key>
686686
<string>Microsoft Defender for Endpoint settings</string>
687687
<key>PayloadDescription</key>
@@ -704,7 +704,7 @@ The following configuration profile (or, in case of JAMF, a property list that c
704704
<key>PayloadOrganization</key>
705705
<string>Microsoft</string>
706706
<key>PayloadIdentifier</key>
707-
<string>com.microsoft.wdav</string>
707+
<string>
708708
<key>PayloadDisplayName</key>
709709
<string>Microsoft Defender for Endpoint configuration settings</string>
710710
<key>PayloadDescription</key>

0 commit comments

Comments
 (0)