Skip to content

Commit a9ae945

Browse files
Merge pull request #3797 from MicrosoftDocs/main
[AutoPublish] main to live - 05/15 15:32 PDT | 05/16 04:02 IST
2 parents b45d87f + 8eb73e6 commit a9ae945

File tree

5 files changed

+8
-18
lines changed

5 files changed

+8
-18
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 05/13/2025
6+
ms.date: 05/15/2025
77
ms.topic: conceptual
88
author: emmwalshh
99
ms.author: ewalsh
@@ -192,7 +192,7 @@ Use the following procedure to enable network protection on domain-joined comput
192192

193193
| Windows Server version | Commands |
194194
|---|---|
195-
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
195+
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
196196
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
197197

198198
> [!IMPORTANT]

defender-endpoint/gov.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,7 @@ These are the known gaps:
158158
|Microsoft Secure Score|![Yes](media/svg/check-yes.svg)<br/>See note following this table|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
159159
|Microsoft Threat Experts|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
160160
|Microsoft Defender for Endpoint Security Configuration Management|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
161+
|Microsoft Defender for IoT enterprise IoT security|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
161162

162163
> [!NOTE]
163164
> While Microsoft Secure Score is available for GCC, GCC High and DoD customers, there are some security recommendations that aren't available.

defender-office-365/anti-spam-protection-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ These settings aren't configured in the default anti-spam policy by default, or
145145

146146
² For **High confidence phishing**, the **Move message to Junk Email folder** action is effectively deprecated. Although you might be able to select the **Move message to Junk Email folder** action, high confidence phishing messages are always quarantined (equivalent to selecting **Quarantine message**).
147147

148-
³ You can use this value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments.
148+
³ You can use this value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments only (not in Exchange Online).
149149

150150
⁴ If the spam filtering verdict quarantines messages by default (**Quarantine message** is already selected when you get to the page), the default quarantine policy name is shown in the **Select quarantine policy** box. If you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. For more information about the quarantine policies that are used by default for spam filter verdicts, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
151151

defender-xdr/configure-attack-disruption.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: ITPro
99
ms.topic: how-to
1010
ms.service: defender-xdr
1111
ms.localizationpriority: medium
12-
ms.date: 04/25/2025
12+
ms.date: 05/15/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -45,6 +45,7 @@ The following are prerequisites for configuring automatic attack disruption in M
4545
The Minimum Sense Agent version required for the **Contain User** action to work is v10.8470. You can identify the Sense Agent version on a device by running the following PowerShell command:
4646

4747
> Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Advanced Threat Protection\' -Name "InstallLocation"
48+
> Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status' -Name "MsSenseDllVersion"
4849
4950
#### Automation setting for your organizations devices
5051

defender-xdr/usgov.md

Lines changed: 2 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,6 @@ Microsoft Defender XDR for US Government customers requires one of the following
3333

3434
### Desktop licensing
3535

36-
<br />
37-
3836
****
3937

4038
|GCC|GCC High|DoD|
@@ -48,64 +46,54 @@ Microsoft Defender XDR for US Government customers requires one of the following
4846
|Microsoft Defender for Identity - GCC|Microsoft Defender for Identity for GCC High|Microsoft Defender for Identity for DOD|
4947
|Microsoft Defender for Office 365 (Plan 2) GCC|Microsoft Defender for Office 365 (Plan 2) for GCC High|Microsoft Defender for Office 365 (Plan 2) for DOD|
5048
|Windows 10 Enterprise E5 GCC|Windows 10 Enterprise E5 for GCC High|Windows 10 Enterprise E5 for DOD|
51-
|
5249

5350
### Server licensing
5451

55-
<br />
56-
5752
****
5853

5954
|GCC|GCC High|DoD|
6055
|---|---|---|
6156
|Microsoft Defender for Endpoint Server GCC|Microsoft Defender for Endpoint Server for GCC High|Microsoft Defender for Endpoint Server for DOD|
6257
|Microsoft Defender for servers|Microsoft Defender for servers - Government|Microsoft Defender for servers - Government|
63-
|
6458

6559
## Portal URLs
6660

6761
The following are the Microsoft Defender portal URLs for US Government customers:
6862

69-
<br />
70-
7163
****
7264

7365
|Customer type|Portal URL|
7466
|---|---|
7567
|GCC|<https://security.microsoft.com>|
7668
|GCC High|[https://security.microsoft.us](https://security.microsoft.us)|
7769
|DoD|[https://security.apps.mil](https://security.apps.mil)|
78-
|
70+
7971
> [!NOTE]
8072
> If you are a GCC customer and in the process of moving from Microsoft Defender for Endpoint commercial to GCC, use https://transition.security.microsoft.com to access your Microsoft Defender for Endpoint commercial data.
8173
8274
## API
8375

8476
Instead of the public URIs listed in our [API documentation](api-overview.md), you'll need to use the following URIs:
8577

86-
<br />
87-
8878
****
8979

9080
|Endpoint type|GCC|GCC High & DoD|
9181
|---|---|---|
9282
|Login|`https://login.microsoftonline.com`|`https://login.microsoftonline.us`|
9383
|Microsoft Defender XDR API|`https://api-gcc.security.microsoft.us`|`https://api-gov.security.microsoft.us`|
94-
|
9584

9685
## Feature parity with commercial
9786

9887
Microsoft Defender XDR for US Government customers doesn't have complete parity with the commercial offering. While our goal is to deliver all commercial features and functionality to our US Government customers, there are some capabilities not yet available we want to highlight.
9988

10089
These are the known gaps:
10190

102-
<br />
103-
10491
****
10592

10693
|Feature name|GCC|GCC High|DoD|
10794
|---|:---:|:---:|:---:|
10895
|Microsoft Threat Experts|![No](/defender-endpoint/media/svg/check-no.svg) On engineering backlog|![No](/defender-endpoint/media/svg/check-no.svg) On engineering backlog|![No](/defender-endpoint/media/svg/check-no.svg) On engineering backlog|
96+
|Microsoft Defender for IoT enterprise IoT security|![No](/defender-endpoint/media/svg/check-no.svg)|![No](/defender-endpoint/media/svg/check-no.svg)|![No](/defender-endpoint/media/svg/check-no.svg)|
10997

11098
For detailed list of Event Streaming API tables, see [Microsoft Defender XDR streaming event types supported in Event Streaming API](supported-event-types.md).
11199

0 commit comments

Comments
 (0)