You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/dcs-inspection.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,9 @@ Microsoft Defender for Cloud Apps enables you to natively use the Microsoft Data
13
13
>[!NOTE]
14
14
> This feature is currently available in the US, Europe, Australia, India, Canada, Japan, and APAC.
15
15
16
+
>[!NOTE]
17
+
> To enable the Data Classification Service option in File Policies, the "Microsoft 365" App Connector is required.
18
+
16
19
## Enable content inspection with Data Classification Services
17
20
18
21
You can set the **Inspection method** to use the **Microsoft Data Classification Service** with no additional configuration required. This option is useful when creating a data leak prevention policy for your files in Microsoft Defender for Cloud Apps.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/includes/entra-conditional-access-policy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,9 +34,9 @@ For more information, see [Conditional Access policies](/azure/active-directory/
34
34
35
35
> [!NOTE]
36
36
> Microsoft Defender for Cloud Apps utilizes the application **Microsoft Defender for Cloud Apps - Session Controls** as part of the Conditional Access App Control service for user sign-in. This application is located within the 'Enterprise Applications' section of Entra ID.
37
-
To protect your SaaS applications with Session Controls, you must allow access to this application.
38
-
If you block access to this application through an Entra ID Conditional Access policy, end users won't be able to access the protected applications under session controls. <br>
39
-
>
37
+
To protect your SaaS applications with Session Controls, you must allow access to this application.
38
+
>
39
+
>If you have any Conditional Access policies that have **“Block Access”** selected in the **“Grant Access”** Control under a Microsoft Entra ID Conditional Access policy scoped to this app, end users will not be able to access the protected applications under session controls. <br><br>
40
40
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.<br>
41
41
>
42
42
>To ensure your location-based conditional access policies function correctly, include the **Microsoft Defender for Cloud Apps – Session Controls** application in those policies.
Copy file name to clipboardExpand all lines: defender-endpoint/api/get-assessment-software-vulnerabilities.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.topic: reference
15
15
ms.subservice: reference
16
16
ms.custom: api
17
17
search.appverid: met150
18
-
ms.date: 01/31/2025
18
+
ms.date: 02/11/2025
19
19
---
20
20
21
21
# Export software vulnerabilities assessment per device
@@ -395,7 +395,7 @@ Each returned record contains all the data from the full export software vulnera
395
395
|ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit|
396
396
|FirstSeenTimestamp|String|First time the CVE of this product was seen on the device.|2020-11-03 10:13:34.8476880|
397
397
|ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!|
398
-
|LastSeenTimestamp|String|Last time the CVE was seen on the device.|2020-11-03 10:13:34.8476880|
398
+
|LastSeenTimestamp|String|Last time the software was reported on the device.|2020-11-03 10:13:34.8476880|
399
399
|OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11|
400
400
|RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers|
401
401
|RecommendationReference|string|A reference to the recommendation ID related to this software.|va--microsoft--silverlight|
Copy file name to clipboardExpand all lines: defender-endpoint/configure-updates.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier2
16
16
ms.topic: conceptual
17
17
search.appverid: met150
18
-
ms.date: 01/12/2024
18
+
ms.date: 02/10/2025
19
19
---
20
20
21
21
# Create a custom gradual rollout process for Microsoft Defender updates
@@ -49,19 +49,17 @@ The following table lists the available group policy settings for configuring up
49
49
## Group Policy
50
50
51
51
> [!NOTE]
52
-
> An updated Defender ADMX template are published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
52
+
> An updated Defender ADMX template is published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
53
53
54
-
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints.
55
-
56
-
In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
54
+
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints. In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
57
55
58
56
1. On your Group Policy management machine, open the **Group Policy Management Console**, right-click the **Group Policy Object** (GPO) you want to configure and select **Edit**.
59
57
60
58
2. Using the Group Policy Management Editor go to **Computer configuration**.
61
59
62
60
3. Select **Administrative templates**.
63
61
64
-
4. Expand the tree to **Windows components > Microsoft Defender Antivirus**.
62
+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus**.
65
63
66
64
5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
Use `Set-MpPreference -PlatformUpdatesChannel Beta` to configure platform updates to arrive from the Beta Channel.
95
92
96
93
For more information on the parameters and how to configure them, see [Set-MpPreference](/powershell/module/defender/set-mppreference) (Microsoft Defender Antivirus).
97
94
95
+
## Registry
96
+
97
+
These settings can be confirmed in the registry under `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`:
98
+
99
+
-`EngineRing`
100
+
-`PlatformRing`
101
+
-`SignaturesRing`
102
+
98
103
> [!NOTE]
99
-
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts) for guidance on this topic.
104
+
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts).
100
105
101
106
> [!TIP]
102
107
> If you're looking for Antivirus related information for other platforms, see:
3. Scroll down, and then turn on **Enable EDR in block mode**.
85
+
1. Scroll down, and then turn on **Enable EDR in block mode**.
86
86
87
87
### Intune
88
88
89
89
To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP through Intune, and a comparison to on-premises](/troubleshoot/mem/intune/deploy-oma-uris-to-target-csp-via-intune).
90
90
91
91
For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp).
92
92
93
+
### Group Policy
94
+
95
+
You can use Group Policy to enable EDR in block mode.
96
+
97
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
98
+
99
+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
100
+
101
+
2. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
102
+
103
+
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Features**.
104
+
105
+
4. Double-click **Enable EDR in block mode** and set the option to **Enabled**.
106
+
107
+
5. Select **OK**.
108
+
93
109
## Requirements for EDR in block mode
94
110
95
111
The following table lists requirements for EDR in block mode:
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 12/30/2024
9
+
ms.date: 02/06/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -53,7 +53,7 @@ Understand the following prerequisites before you create indicators for files:
53
53
54
54
-[Behavior Monitoring is enabled](behavior-monitor.md)
55
55
56
-
-[Cloud-based protection is turned on](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
56
+
-[Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57
57
58
58
-[Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+5-3Lines changed: 5 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -317,9 +317,11 @@ Follow the steps below to create a compliance policy against jailbroken devices.
317
317
Defender for Endpoint on iOS enables admins to configure custom indicators on iOS devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
318
318
319
319
> [!NOTE]
320
-
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321
-
>
322
-
> For iOS, no alerts are generated on Microsoft Defender XDR when the URL or domain set in the indicator is accessed.
320
+
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321
+
>
322
+
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
323
+
>
324
+
> For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
0 commit comments