Skip to content

Commit a216c80

Browse files
authored
Merge branch 'main' into patch-21
2 parents 53b8dfa + 1b98056 commit a216c80

35 files changed

+278
-196
lines changed

ATPDocs/deploy/test-connectivity.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,9 @@ After preparing the server that you're going to use for your Microsoft Defender
1414

1515
For more information, see [Required ports](../prerequisites.md#ports).
1616

17+
> [!NOTE]
18+
> To get the name and other important details about your Defender for Identity workspace, see the [About page](../settings-about.md) in the [Microsoft Defender XDR](https://security.microsoft.com/) portal.
19+
1720
## Test connectivity using a browser
1821

1922
1. Open a browser. If you're using a proxy, make sure that your browser uses the same proxy settings being used by the sensor.

CloudAppSecurityDocs/cas-compliance-trust.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Defender for Cloud Apps operates in the Microsoft Azure data centers in the foll
3131
|**Customers whose tenants are provisioned in the European Union or the United Kingdom** | Either the European Union and/or the United Kingdom |
3232
|**Customers whose tenants are provisioned in any other region** | The United States and/or a data center in the region that's nearest to the location of where the customer's Microsoft Entra tenant has been provisioned |
3333

34-
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions:
34+
In addition to the locations above, the App Governance features within Defender for Cloud Apps operate in the Microsoft Azure data centers in the following geographical regions listed below. Customer with App Governance enabled will have data stored within the data storage location the customer provisions in above, and in a second data storage location as described below:
3535

3636
|Customer provisioning location |Data storage location |
3737
|---------|---------|
@@ -65,7 +65,7 @@ Defender for Cloud Apps shares data, including customer data, among the followin
6565
- Microsoft Defender for Cloud
6666
- Microsoft Sentinel
6767
- Microsoft Defender for Endpoint
68-
- Microsoft Security Exposure Management (Preview)
68+
- Microsoft Security Exposure Management
6969
- Microsoft Purview
7070
- Microsoft Entra ID Protection
7171

defender-endpoint/android-whatsnew.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 01/03/2025
18+
ms.date: 01/06/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -40,7 +40,7 @@ Recommendation cards prominently display any active alerts, ensuring you stay in
4040

4141
The following screenshot is an example of what the user sees in their dashboard:
4242

43-
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing what the user sees on the device.":::
43+
:::image type="content" source="media/android-whatsnew/android-dashboard-screen.png" alt-text="Screenshot showing the user's dashboard in the Microsoft Defender app.":::
4444

4545
**Recommendation cards for alerts**
4646

@@ -59,10 +59,10 @@ The current enterprise dashboard experience now features a tile view for your se
5959

6060
| Tile | Description |
6161
|---|---|
62-
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: | **Network protection** <br/>Your security team can see whether a connection is secured or unsecured. |
63-
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: | **Web protection** <br/>Your security team can see whether web protection is enabled on a user's device. |
64-
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: | **App security** <br/>Your security team can see whether any threats were found in apps installed on a user's device. |
65-
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: | **Global secure access** <br/>Your security team can see current connection status. |
62+
| :::image type="content" source="media/android-whatsnew/android-tile-networkprotection.png" alt-text="Screenshot showing the network protection tile for security administrators."::: | **Network protection** <br/>The user can see whether a connection is secured or unsecured. |
63+
| :::image type="content" source="media/android-whatsnew/android-tile-webprotection.png" alt-text="Screenshot of a tile that shows whether web protection is enabled on a device."::: | **Web protection** <br/>The user can see whether web protection is enabled on a user's device. |
64+
| :::image type="content" source="media/android-whatsnew/android-tile-appsecurity.png" alt-text="Screenshot showing the app security tile."::: | **App security** <br/>The user can see whether any threats were found in apps installed on a user's device. |
65+
| :::image type="content" source="media/android-whatsnew/android-tile-globalsecureaccess.png" alt-text="Screenshot showing Global Secure Access status."::: | **Global secure access** <br/>The user can see current connection status. |
6666

6767
## Android low-touch onboarding is now GA
6868

@@ -125,7 +125,7 @@ Read the announcement [Tech Community Blog: Defender for Endpoint is now availab
125125

126126
## Privacy controls
127127

128-
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls(MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
128+
Microsoft Defender for Endpoint on Android enables privacy controls for both administrators and end users, and includes controls for enrolled (MDM) and unenrolled (MAM) devices. Administrators can configure the privacy in the alert report while End Users can configure the information shared to their organization. For more information, see [privacy controls (MDM)](android-configure.md#privacy-controls) and [privacy controls (MAM)](android-configure-mam.md#configure-privacy-controls).
129129

130130
## Optional permissions and the ability to disable web protection
131131

defender-endpoint/api/get-assessment-secure-config.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 06/04/2021
18+
ms.date: 01/06/2025
1919
---
2020

2121
# Export secure configuration assessment per device
@@ -245,18 +245,18 @@ GET /api/machines/SecureConfigurationsAssessmentExport
245245
### 2.5 Properties
246246

247247
> [!NOTE]
248-
>
249-
> - The files are gzip compressed & in multiline Json format.
250-
> - The download URLs are only valid for 3 hours; otherwise you can use the parameter.
248+
> - The files are GZIP compressed & in multiline JSON format.
249+
> - The download URLs are only valid for 1 hour; otherwise you can use the parameter.
251250
> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region in which your data resides.
252251
252+
253253
<br>
254254

255255
****
256256

257257
Property (ID)|Data type|Description|Example of a returned value
258258
---|---|---|---
259-
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
259+
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|["Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
260260
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
261261
|
262262

defender-endpoint/network-devices.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/02/2025
1818
---
1919

2020
# Network device discovery and vulnerability management
@@ -85,7 +85,6 @@ Your first step is to select a device that performs the authenticated network sc
8585

8686
8. To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
8787

88-
- login.windows.net
8988
- \*.security.microsoft.com
9089
- login.microsoftonline.com
9190
- \*.blob.core.windows.net/networkscannerstable/\*

0 commit comments

Comments
 (0)