Skip to content

Commit abe1f71

Browse files
authored
Merge branch 'main' into patch-6
2 parents d24adac + 66ddaa8 commit abe1f71

File tree

8 files changed

+30
-25
lines changed

8 files changed

+30
-25
lines changed

defender-endpoint/mobile-resources-defender-endpoint.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Resources for Microsoft Defender for Endpoint for mobile devices
33
description: Learn about the configurations and privacy settings for all the features in Defender for Endpoint on mobile devices.
44
ms.service: defender-endpoint
55
ms.reviewer: priyankagill
6-
ms.author: bagol
7-
author: batamig
6+
ms.author: painbar
7+
author: paulinbar
88
ms.localizationpriority: medium
99
manager: bagol
1010
audience: ITPro
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: concept-article
1515
ms.subservice: ngp
1616
search.appverid: met150
17-
ms.date: 03/24/2025
17+
ms.date: 10/24/2025
1818
---
1919
# Resources for Microsoft Defender for Endpoint for mobile devices
2020

@@ -52,10 +52,11 @@ Microsoft Defender for Endpoint provides multiple capabilities on mobile devices
5252
|Anti-phishing (Defender warning overlooked)|Low | | |
5353
|Anti-malware|Medium | Information about malicious APKs including install source, storage location, time of install, etc.; [More information](android-privacy.md#app-information)||
5454
| ||||
55-
|Jailbreak|High | NA |NA |
55+
|Root Detection (Preview)|High|NA|NA|
56+
|Jailbreak Detection|High | NA |NA |
5657
|Rogue Wifi |Low | | |
57-
|Open Network Detection (Migrated from alert to event in the device timeline)|NA | | |
58-
|Suspicious Certificates Downloaded/Installed (Migrated from alert to event in the device timeline)|NA| | |
58+
|Open Network Detection (Migrated from alert to event in the device timeline)|NA (Event)| | |
59+
|Suspicious Certificates Downloaded/Installed (Migrated from alert to event in the device timeline)|NA (Event)| | |
5960

6061
[Complete privacy information for Android](android-privacy.md)
6162

defender-endpoint/mtd.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
---
1+
---
22
title: Microsoft Defender for Endpoint - Mobile Threat Defense
33
ms.reviewer: tdoucette, sunasing, denishdonga
44
description: Overview of Mobile Threat Defense in Microsoft Defender for Endpoint
55
ms.service: defender-endpoint
66
ms.subservice: onboard
7-
ms.author: bagol
8-
author: batamig
7+
ms.author: painbar
8+
author: paulinbar
99
ms.localizationpriority: medium
10-
ms.date: 04/08/2025
10+
ms.date: 10/24/2025
1111
manager: bagol
1212
audience: ITPro
1313
ms.collection:
@@ -38,6 +38,7 @@ Microsoft Defender for Endpoint on Android and iOS provides the below key capabi
3838
|Web Protection|Anti-phishing, blocking unsafe network connections, and support for custom indicators for URLs and domains. (File and IP indicators aren't currently supported.)|
3939
|Malware Protection (Android-only)|Scanning for malicious apps and APK Files.|
4040
|Jailbreak Detection (iOS-only)|Detection of jailbroken devices.|
41+
|Root Detection (Android - Preview)|Detection of rooted devices.|
4142
|Microsoft Defender Vulnerability Management (MDVM) |Vulnerability assessment of onboarded mobile devices. Includes OS and Apps vulnerabilities assessment for both Android and iOS. Visit this [page](/defender-vulnerability-management/defender-vulnerability-management) to learn more about Microsoft Defender Vulnerability Management in Microsoft Defender for Endpoint.|
4243
|Network Protection | Protection against rogue Wi-Fi related threats and rogue certificates; ability to add to the "allow" list the root CA and private root CA certificates in Intune; establish trust with endpoints.|
4344
|Unified alerting|Alerts from all platforms in the unified Microsoft Defender portal.|
-53.2 KB
Loading

defender-office-365/outbound-spam-protection-about.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,9 @@ This article describes the controls and notifications that are designed to help
4040
4141
## What admins can do to control outbound spam
4242

43+
> [!NOTE]
44+
> If messages are blocked or marked as spam, admins can review the issue in the **Exchange admin center (EAC)** using **Message trace** or delivery reports. For investigation and resolution guidance, see [Troubleshoot outbound email issues in Exchange Online](/troubleshoot/exchange/email-delivery/ndr/non-delivery-reports-in-exchange-online)
45+
4346
- **Use built-in notifications**: When a user exceeds [sending limits of the service](/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options) or [outbound spam policies](outbound-spam-policies-configure.md) and is restricted from sending email, the default alert policy named **User restricted from sending email** sends email notifications to members of the **TenantAdmins** group (**Global Administrator** members). To configure who else receives these notifications, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users). Also, the default alert policies named **Email sending limit exceeded** and **Suspicious email sending patterns detected** send email notifications to members of the **TenantAdmins** group (**Global Administrator** members). For more information about alert policies, see [Alert policies in the Microsoft Defender portal](alert-policies-defender-portal.md).
4447

4548
- **Review spam complaints from non-Microsoft email providers**: Many email services like Outlook.com, Yahoo, and AOL provide a feedback loop where we review our messages that are identified as spam by their users. To learn more about sender support for Outlook.com, go to the [Microsoft Sender Support and Blocklist Removal Tool](https://sendersupport.olc.protection.outlook.com/pm/services.aspx).

defender-office-365/safe-links-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
f1_keywords:
1111
- '197503'
12-
ms.date: 09/16/2025
12+
ms.date: 10/24/2025
1313
ms.localizationpriority: medium
1414
ms.collection:
1515
- Strat_O365_IP
@@ -79,7 +79,7 @@ The following table describes scenarios for Safe Links in Microsoft 365 and Offi
7979
|Chris's Microsoft 365 E5 organization has no Safe Links policies configured. Chris receives an email from an external sender that contains a URL to a malicious website that he ultimately clicks.|Chris is protected by Safe Links. <br><br> The **Built-in protection** preset security policy provides Safe Links protection to all recipients (users who aren't defined in the Standard or Strict preset security policies or in custom Safe Links policies). For more information, see [Preset security policies](preset-security-policies.md).|
8080
|In Pat's organization, admins have created a Safe Links policy that applies Pat, but Safe Links protection for Office apps is turned off. Pat opens a Word document and clicks a URL in the file.|Pat isn't protected by Safe Links. <br><br> Although Pat is included in an active Safe Links policy, Safe Links protection for Office apps is turned off in that policy, so the protection can't be applied.|
8181
|Jamie and Julia both work for contoso.com. A long time ago, admins configured Safe Links policies that apply to both of Jamie and Julia. Jamie sends an email to Julia, not knowing that the email contains a malicious URL.|Julia is protected by Safe Links **if** the Safe Links policy that applies to her is configured to apply to messages between internal recipients. For more information, see the [Safe Links settings for email messages](#safe-links-settings-for-email-messages) section later in this article.|
82-
|Jim's IT department configured SafeLinks to not rewrite URLs, and to check via API only. Jim receives an email about an urgent crypto opportunity within BroMail - an 'aternative' email client that doesn't use 'woke' APIs, and clicks the link. The link was legitimate on delivery, but was later weaponized.|Jim is phished. BroMail doesn't support the SafeLinks API. Because the link wasn't malicious on delivery, SafeLinks didn't detect it.|
82+
|Jim's IT department configured SafeLinks to not rewrite URLs, and to check via API only. Jim clicks a link in an alternative email client that doesn't support the SafeLinks API. The link was legitimate on delivery, but was later weaponized.|Jim is phished. Because the link wasn't malicious on delivery, SafeLinks didn't detect it.|
8383

8484
## Recipient filters in Safe Links policies
8585

defender-office-365/scc-permissions.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,7 @@ Managing permissions in Defender for Office 365 or Microsoft Purview gives users
8383
|**Data Estate Insights Readers**|Provides read-only access to all insights reports across platforms and providers.|Data Map Reader <br/><br/> Insights Reader|
8484
|**Data Governance**|Grants access to data governance roles within Microsoft Purview.|Data Governance Administrator|
8585
|**Data Investigator**|Perform searches on mailboxes, SharePoint sites, and OneDrive locations.|Communication <br/><br/> Compliance Search <br/><br/> Custodian <br/><br/> Data Investigation Management <br/><br/> Export <br/><br/> Preview <br/><br/> Review <br/><br/> RMS Decrypt <br/><br/> Search And Purge|
86+
|**Data Security AI Admins**|Use this group to assign editing capabilities for Data Loss Prevention policies related to Copilot and viewing AI content in Data Security Posture Management. Review the role description for access details.|Data Security AI Admin|
8687
|**Data Security AI Content Viewers**|Use this group to assign read-only permissions to users in Data Security Posture Management for AI to view prompts and responses of interactions in AI apps.|Data Security AI Content Viewer|
8788
|**Data Security AI Viewers**|Use this group to assign read-only permissions to users for Data Security Posture Management for AI.|Data Security AI Viewer|
8889
|**Data Security Investigations Administrators**|Administrators for Data Security Investigations that can create and manage all investigations, processes, and settings.|Case Management <br/><br/> Compliance Search <br/><br/> Data Security Investigations Admin <br/><br/> Export <br/><br/> Preview <br/><br/> Review|
@@ -178,6 +179,7 @@ Roles that aren't assigned to the Organization Management role group by default
178179
|<sup>\*</sup>**Data Security Investigations Admin**|Used to create and manage investigations, processes, and settings in Data Security Investigations.|Data Security Investigations Administrators|
179180
|<sup>\*</sup>**Data Security Investigations Investigator**|Used to create and manage assigned investigations, processes, and settings in Data Security Investigations.|Data Security Investigations Investigators|
180181
|<sup>\*</sup>**Data Security Investigations Reviewer**|Used to review assigned investigations in Data Security Investigations.|Data Security Investigations Reviewers|
182+
|**Data Security AI Admin**|Role for editing Data Loss Prevention policies related to Copilot and viewing AI content in Data Security Posture Management. This role does not have access to read prompts and responses of AI interactions.|Data Security AI Admins|
181183
|**Data Security AI Content Viewer**|Role for read-only access to prompts and responses of AI interactions in Data Security Posture Management for AI.|Data Security AI Content Viewers|
182184
|**Data Security AI Viewer**|Role for read-only access to all pages in Data Security Posture Management for AI. This role does not have access to read prompts and responses of AI interactions.|Data Security AI Viewers|
183185
|**Data Security Viewer**|View access to Data Security Posture Management dashboard insights. Allows users to use Copilot for Security to view details.|Data Security Management|

defender-office-365/submissions-admin-review-user-reported-messages.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,7 @@ Admins can mark messages and notify users of review results only if the user [re
5757
> [!IMPORTANT]
5858
> <sup>\*</sup> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you should limit to emergency scenarios or when you can't use a different role.
5959
60-
- You need access to Exchange Online PowerShell. If your account doesn't have access to Exchange Online PowerShell, you get the following error: _Specify an email address in your domain_. For more information about enabling or disabling access to Exchange Online PowerShell, see the following articles:
61-
- [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell)
62-
- [Client Access Rules in Exchange Online](/exchange/clients-and-mobile-in-exchange-online/client-access-rules/client-access-rules) ([until October 2023](https://techcommunity.microsoft.com/blog/exchange/deprecation-of-client-access-rules-in-exchange-online/3638563))
60+
- You need access to Exchange Online PowerShell. If your account doesn't have access to Exchange Online PowerShell, you get the following error: _Specify an email address in your domain_. For more information about enabling or disabling access to Exchange Online PowerShell, see [Enable or disable access to Exchange Online PowerShell](/powershell/exchange/disable-access-to-exchange-online-powershell).
6361

6462
## Notify users from within the portal
6563

0 commit comments

Comments
 (0)