Skip to content

Commit afabbb8

Browse files
committed
Merge branch 'main' into maccruz-analyticslogs
2 parents 530c071 + 215ff41 commit afabbb8

14 files changed

+170
-138
lines changed

defender-endpoint/TOC.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1078,13 +1078,14 @@
10781078
href: information-protection-investigation.md
10791079

10801080
- name: Advanced hunting
1081-
href: /defender-xdr/advanced-hunting-overview
1081+
href: /defender-xdr/advanced-hunting-overview?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
10821082

1083-
- name: Threat analytics overview
1084-
href: /defender-xdr/threat-analytics
1083+
- name: Threat analytics
10851084
items:
1085+
- name: Overview
1086+
href: /defender-xdr/threat-analytics?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
10861087
- name: Read the analyst report
1087-
href: /defender-xdr/threat-analytics-analyst-reports
1088+
href: /defender-xdr/threat-analytics-analyst-reports?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
10881089

10891090
- name: EDR in block mode
10901091
href: edr-in-block-mode.md

defender-endpoint/api/get-browser-extensions-permission-info.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 06/01/2022
18+
ms.date: 03/05/2025
1919
---
2020

2121
# Get browser extensions permission information
@@ -24,10 +24,10 @@ ms.date: 06/01/2022
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](../microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](../microsoft-defender-endpoint.md)
29-
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management)
30-
- [Microsoft Defender XDR](/defender-xdr)
27+
- [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
28+
29+
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management-capabilities#vulnerability-management-capabilities-for-endpoints) (add-on for Defender for Endpoint Plan 2 or the standalone version)
30+
- [Microsoft Defender for Cloud Plan 2](/azure/defender-for-cloud/defender-for-cloud-introduction)
3131

3232
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us).
3333

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 02/26/2025
18+
ms.date: 03/05/2025
1919
search.appverid: met150
2020
---
2121

@@ -93,7 +93,7 @@ The following ASR rules DO NOT honor Microsoft Defender Antivirus exclusions:
9393
| [Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) |
9494

9595
> [!NOTE]
96-
> For information about configuring per-rule exclusions, see the section titled **Configure ASR rules per-rule exclusions** in the topic [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md).
96+
> For information about configuring per-rule exclusions, see the section titled **Configure ASR rules per-rule exclusions** in the article [Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md).
9797
9898
## ASR rules and Defender for Endpoint Indicators of Compromise (IOC)
9999

@@ -179,10 +179,10 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
179179

180180
For rules with the "Rule State" specified:
181181

182-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High"
183-
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
184-
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
185-
- Toast notifications occur in block mode only and for devices at cloud block level "High"
182+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices set at the cloud block level `High`.
183+
- Devices that are not set at the cloud block level `High` don't generate alerts for any `ASR Rule, Rule State` combinations.
184+
- EDR alerts are generated for ASR rules in the specified states, for devices set at the cloud block level `High+`.
185+
- Toast notifications occur in block mode only and for devices set at the cloud block level `High`.
186186

187187
| Rule name | Rule state | EDR alerts | Toast notifications |
188188
|---|---|---|---|
@@ -256,7 +256,7 @@ This rule prevents an application from writing a vulnerable signed driver to dis
256256
The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
257257

258258
> [!NOTE]
259-
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
259+
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune-alternative-2) for configuring custom rules.
260260
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
261261
> To have a driver examined, use this Web site to [Submit a driver for analysis](https://www.microsoft.com/en-us/wdsi/driversubmission).
262262

0 commit comments

Comments
 (0)