Skip to content

Commit a2cf513

Browse files
Merge branch 'main' into AbbyMSFT-patch-3
2 parents 315572f + 0cc0f72 commit a2cf513

File tree

66 files changed

+1319
-132
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+1319
-132
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,6 @@
2020
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",
2121
"redirect_document_id": false
2222
},
23-
{
24-
"source_path": "defender-endpoint/linux-install-with-activator.md",
25-
"redirect_url": "/defender-endpoint/linux-custom-location-installation",
26-
"redirect_document_id": false
27-
},
2823
{
2924
"source_path": "defender-endpoint/preview.md",
3025
"redirect_url": "/defender-xdr/preview",
@@ -155,6 +150,11 @@
155150
"redirect_url": "/defender-endpoint/onboard-server",
156151
"redirect_document_id": false
157152
},
153+
{
154+
"source_path": "defender-endpoint/linux-install-with-activator.md",
155+
"redirect_url": "/defender-endpoint/linux-install-with-defender-deployment-tool",
156+
"redirect_document_id": false
157+
},
158158
{
159159
"source_path": "defender-endpoint/mde-linux-arm.md",
160160
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",

defender-endpoint/TOC.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,8 @@
135135
href: streamlined-device-connectivity-urls-gov.md
136136
- name: Onboard client devices
137137
items:
138+
- name: Onboard Windows devices using the Defender deployment tool
139+
href: defender-deployment-tool-windows.md
138140
- name: Onboard client devices running Windows or macOS
139141
href: onboard-client.md
140142
- name: Defender for Endpoint plug-in for WSL
@@ -174,6 +176,7 @@
174176
href: mde-linux-deployment-on-sap.md
175177
- name: Use custom detection rules to protect SAPXPG
176178
href: mde-sap-custom-detection-rules.md
179+
177180
- name: Defender for Endpoint on macOS
178181
items:
179182
- name: Deploy Defender for Endpoint on macOS
@@ -267,6 +270,8 @@
267270
items:
268271
- name: Enabling deployment to a custom location
269272
href: linux-custom-location-installation.md
273+
- name: Deployment tool based deployment
274+
href: linux-install-with-defender-deployment-tool.md
270275
- name: Installer script based deployment
271276
href: linux-installer-script.md
272277
- name: Ansible based deployment
@@ -1068,6 +1073,10 @@
10681073
href: respond-machine-alerts.md#contain-devices-from-the-network
10691074
- name: Contain user from the network
10701075
href: respond-machine-alerts.md#contain-user-from-the-network
1076+
- name: Automatically apply GPO hardening (predictive shielding)
1077+
href: respond-machine-alerts.md#gpo-hardening
1078+
- name: Automatically apply Safeboot hardening (predictive shielding)
1079+
href: respond-machine-alerts.md#safeboot-hardening
10711080
- name: Consult a threat expert
10721081
href: respond-machine-alerts.md#consult-a-threat-expert
10731082
- name: Check activity details in Action center

defender-endpoint/configure-endpoints-gp.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Onboard Windows Servers to Microsoft Defender for Endpoint via Group Policy
33
description: Use Group Policy to deploy the configuration package on Windows devices so that they're onboarded to the service.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier1
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
15-
ms.date: 10/13/2025
15+
ms.date: 11/17/2025
1616
ms.subservice: onboard
1717
search.appverid: met150
1818
appliesto:
@@ -23,6 +23,8 @@ appliesto:
2323

2424
# Onboard Windows devices using Group Policy
2525

26+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
27+
2628
## Prerequisites
2729

2830
- To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.

defender-endpoint/configure-endpoints-mdm.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Onboard Windows devices to Defender for Endpoint using Intune
33
description: Use Microsoft Intune to deploy the configuration package on devices so that they're onboarded to the Defender for Endpoint service.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -14,14 +14,15 @@ ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 10/31/2024
17+
ms.date: 11/17/2025
1818
appliesto:
1919
- Microsoft Defender for Endpoint Plan 1
2020
- Microsoft Defender for Endpoint Plan 2
2121

2222
---
2323
# Onboard Windows devices to Defender for Endpoint using Intune
2424

25+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
2526

2627
You can use mobile device management (MDM) solutions to configure Windows 10 devices. Defender for Endpoint supports MDMs by providing OMA-URIs to create policies to manage devices.
2728

defender-endpoint/configure-endpoints-sccm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,13 @@ ms.collection:
1212
- tier1
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
15-
ms.date: 10/27/2025
15+
ms.date: 11/17/2025
1616
ms.subservice: onboard
1717
search.appverid: met150
1818
---
1919

2020
# Onboard Windows devices using Configuration Manager
2121

22-
2322
You can use Configuration Manager to onboard endpoints to the Microsoft Defender for Endpoint service.
2423

2524
There are several options you can use to onboard devices using Configuration Manager:
@@ -32,6 +31,7 @@ There are several options you can use to onboard devices using Configuration Man
3231
3332
You can create a detection rule on a Configuration Manager application to continuously check if a device has been onboarded. An application is a different type of object than a package and program. If a device is not yet onboarded (due to pending OOBE completion or any other reason), Configuration Manager reattempts to onboard the device until the rule detects the status change. For more information, see [Configure Detection Methods in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg682159\(v=technet.10\)#step-4-configure-detection-methods-to-indicate-the-presence-of-the-deployment-type).
3433

34+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
3535

3636
## Prerequisites
3737

defender-endpoint/configure-endpoints-script.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Onboard Windows Servers using a local script
33
description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: bagol
7-
author: batamig
6+
ms.author: painbar
7+
author: paulinbar
88
ms.reviewer: pahuijbr
99
ms.localizationpriority: medium
1010
manager: bagol
@@ -15,22 +15,23 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: install-set-up-deploy
1717
ms.subservice: onboard
18-
ms.date: 04/16/2025
18+
ms.date: 11/17/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
2222

2323
---
2424
# Onboard Windows devices using a local script
2525

26-
2726
You can also manually onboard individual devices to Defender for Endpoint. You might want to onboard some devices when you're testing the service before you commit to onboarding all devices in your network.
2827

2928
> [!IMPORTANT]
3029
> The script described in this article is recommended for manually onboarding devices to Defender for Endpoint. It should only be used on a limited number of devices. If you're deploying to a production environment, see [other deployment options](onboard-client.md), such as Intune, Group Policy, or Configuration Manager.
3130
3231
Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
3332

33+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
34+
3435
## Onboard devices
3536

3637
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Onboard non-persistent virtual desktop infrastructure (VDI) devices
33
description: Deploy the configuration package on virtual desktop infrastructure (VDI) device so that they're onboarded to Microsoft Defender for Endpoint service.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: bagol
7-
author: batamig
6+
ms.author: painbar
7+
author: paulinbar
88
ms.reviewer: pahuijbr; yonghree
99
ms.localizationpriority: medium
1010
manager: bagol
@@ -14,18 +14,15 @@ ms.collection:
1414
- tier2
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: install-set-up-deploy
17-
ms.date: 03/11/2025
17+
ms.date: 11/17/2025
1818
ms.subservice: onboard
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
2222

2323
---
24-
# Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR
25-
26-
27-
2824

25+
# Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR
2926

3027
Virtual desktop infrastructure (VDI) is an IT infrastructure concept that lets end users access enterprise virtual desktops instances from almost any device (such as your personal computer, smartphone, or tablet), eliminating the need for organization to provide users with physical machines. Using VDI devices reduces costs, as IT departments are no longer responsible for managing, repairing, and replacing physical endpoints. Authorized users can access the same company servers, files, apps, and services from any approved device through a secure desktop client or browser.
3128

@@ -34,6 +31,8 @@ Like any other system in an IT environment, VDI devices should have an endpoint
3431
> [!NOTE]
3532
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information, see [Onboarding Windows client](onboard-client.md).
3633
34+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
35+
3736
## Onboarding non-persistent virtual desktop infrastructure (VDI) devices
3837

3938
Defender for Endpoint supports non-persistent VDI session onboarding. There might be associated challenges when onboarding VDI instances. The following are typical challenges for this scenario:

0 commit comments

Comments
 (0)