Skip to content

Commit b062304

Browse files
Merge branch 'main' into WI44-589-remove-dlp-policy-template
2 parents 4b24fdb + 74dc2d7 commit b062304

32 files changed

+186
-59
lines changed

defender-endpoint/android-whatsnew.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,29 +15,40 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 11/06/2025
18+
ms.date: 11/17/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint
2121

2222
---
2323

2424
# What's new in Microsoft Defender for Endpoint on Android
2525

26-
2726
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
2827

2928
### Releases for Defender for Endpoint on Android
3029

3130
#### November 2025
3231

32+
| Build| 1.0.8315.0101|
33+
| -------- | -------- |
34+
| Release Date | November 17, 2025 |
35+
36+
**What's New**
37+
38+
- Performance improvement and accessibility bug fixes
39+
40+
#### November 2025
41+
3342
| Build| 1.0.8303.0101|
3443
| -------- | -------- |
3544
| Release Date |November 4, 2025|
3645

3746
**What's New**
3847

3948
- An improved user feedback experience: See [Key changes - November 2025](./android-new-ux.md#key-changes---november-2025) for details.
40-
49+
50+
- Added landscape mode UI support for the Defender app.
51+
4152
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
4253

4354
#### October 2025

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,12 @@ The following procedures for enabling attack surface reduction rules include ins
168168

169169
1. Select **Next** on the three configuration panes, then select **Create** if you're creating a new policy or **Save** if you're editing an existing policy.
170170

171+
> [!NOTE]
172+
> In the latest Intune interface, **Configuration profiles** is located under **Devices > Configuration profiles**.
173+
> Earlier versions of Intune showed this under **Device configuration > Profiles**.
174+
> If you don't see "Configuration Profile" as written in older instructions, look for **Configuration profiles** under the Devices menu.
175+
176+
171177
#### Device Configuration Profiles (Alternative 1)
172178

173179
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.

defender-endpoint/evaluate-mdav-using-gp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -231,7 +231,7 @@ Assign the policies to the OU where the test machines are located.
231231

232232
#### Enable Tamper Protection
233233

234-
In the Microsoft XDR portal (security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
234+
In the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
235235

236236
For more information, see [How do I configure or manage tamper protection?](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
237237

defender-endpoint/ios-configure-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -430,7 +430,7 @@ Defender for Endpoint on iOS enables bulk tagging the mobile devices during onbo
430430
This configuration is available for both the enrolled (MDM) devices and unenrolled (MAM) devices. Admins can use the following steps to configure the Device tags.
431431

432432
> [!NOTE]
433-
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the XDR portal.
433+
> Configuring more than one device tags from Intune isn't supported as only one device tag reflects when configured. However, multiple device tags can be added manually in the Microsoft Defender portal.
434434
435435
### Configure device tags using MDM
436436

defender-endpoint/review-detected-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ appliesto:
3333

3434
In the Microsoft Defender portal, you can view and manage threat detections using the following steps:
3535

36-
1. Visit [Microsoft XDR portal](https://security.microsoft.com/) and sign-in.
36+
1. Visit the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com) and sign-in.
3737

3838
On the landing page, you see the **Devices with active malware** card with the following information:
3939

@@ -68,7 +68,7 @@ You can manage threat detections for any devices that are [enrolled in Microsoft
6868

6969
## FAQs
7070

71-
#### In the Microsoft XDR portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
71+
#### In the Microsoft Defender portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
7272

7373
To see when the malware was detected, you can take the following steps:
7474

defender-for-cloud-apps/app-governance-anomaly-detection-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For more information, see [App governance in Microsoft Defender for Cloud Apps](
2525

2626
### Finding App Governance Related Alerts
2727

28-
To locate alerts specifically related to App Governance, navigate to the XDR portal Alerts page. In the alerts list, use the "Service/detection sources" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
28+
To locate alerts specifically related to App Governance, navigate to the Microsoft Defender portal Alerts page. In the alerts list, use the "Service/detection sources" field to filter alerts. Set the value of this field to "App Governance" to view all alerts generated by App Governance.
2929

3030
### General Guidelines
3131

defender-for-cloud-apps/applications-inventory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Application inventory
33
ms.date: 03/20/2025
44
ms.topic: overview
55
ms.reviewer: anandd512
6-
description: The new Applications page located under Assets in Microsoft Defender XDR portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
6+
description: The new Applications page located under Assets in the Microsoft Defender portal provides a centralized location for users to view and manage SaaS and SaaS connected OAuth apps information across their environment, ensuring optimal visibility and a comprehensive experience
77
#customer intent: As a security administrator, I want to discover, monitor, and manage all SaaS and OAuth connected apps in my organization so that I can ensure security and compliance.
88
---
99
# Applications inventory

defender-for-cloud-apps/attack-paths.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Microsoft Defender for Cloud Apps defines a set of critical privilege OAuth perm
4949

5050
To view the full list of permissions, go to the [Microsoft Defender portal](https://security.microsoft.com) and navigate to Settings > Microsoft Defender XDR > Rules > Critical asset management.
5151

52-
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Defender XDR portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
52+
:::image type="content" source="media/saas-securty-initiative/screenshot-of-the-critical-asset-management-page.png" alt-text="Screenshot of the Critical asset management page in the Microsoft Defender portal." lightbox="media/saas-securty-initiative/Screenshot-of-the-critical-asset-management-page.png":::
5353

5454

5555
## Investigation user flow: View attack paths involving OAuth applications

defender-for-cloud-apps/discovery-docker-ubuntu-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ This procedure describes how to deploy your machine with Ubuntu. The deployment
165165
(echo db3a7c73eb7e91a0db53566c50bab7ed3a755607d90bb348c875825a7d1b2fce) | docker run --name MyLogCollector -p 21:21 -p 20000-20099:20000-20099 -e "PUBLICIP='192.168.1.1'" -e "PROXY=192.168.10.1:8080" -e "CONSOLE=mod244533.us.portal.cloudappsecurity.com" -e "COLLECTOR=MyLogCollector" --security-opt apparmor:unconfined --cap-add=SYS_ADMIN --restart unless-stopped -a stdin -i mcr.microsoft.com/mcas/logcollector starter
166166
```
167167
168-
1. To verify that the log collector is running properly, run the following command: `Docker logs <collector_name>`. You should get the results: **Finished successfully!**
168+
1. To verify that the log collector is running properly, run the following command: `docker logs <collector_name>`. You should get the results: **Finished successfully!**
169169
170170
## Configure network appliance on-premises settings
171171

defender-for-cloud-apps/ops-guide/ops-guide-ad-hoc.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ If you're experiencing issues with a cloud service, we recommend checking servic
2323

2424
## Run advanced hunting queries
2525

26-
**Where**: In the Microsoft Defender XDR Portal, select **Hunting > Advanced hunting** and query for Defender for Cloud Apps data.
26+
**Where**: In the Microsoft Defender portal at [https://security.microsoft.com](https://security.microsoft.com), select **Hunting > Advanced hunting** and query for Defender for Cloud Apps data.
2727

2828
**Persona**: SOC analysts
2929

@@ -90,7 +90,7 @@ AccountDisplayName,GroupName
9090

9191
## Review file quarantines
9292

93-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Files**. Query for items where **Quarantined** = **True**.
93+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Files**. Query for items where **Quarantined** = **True**.
9494

9595
**Persona**: Compliance administrators
9696

@@ -102,7 +102,7 @@ For more information, see [Understand how quarantine works](../use-case-admin-qu
102102

103103
## Review app risk scores
104104

105-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud app catalog**.
105+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud app catalog**.
106106

107107
**Persona**: Compliance administrators
108108

@@ -114,7 +114,7 @@ For more information, see [Find your cloud app and calculate risk scores](../ris
114114

115115
## Delete cloud discovery data
116116

117-
**Where**: In the Microsoft Defender XDR Portal, select **Settings > Cloud apps > Cloud Discovery > Delete Data**.
117+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Settings > Cloud apps > Cloud Discovery > Delete Data**.
118118

119119
**Persona**: Compliance administrators
120120

@@ -129,7 +129,7 @@ For more information, see [Deleting cloud discovery data](../discovered-apps.md#
129129

130130
## Generate a cloud discovery executive report
131131

132-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud discovery > Dashboard > Actions**
132+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud discovery > Dashboard > Actions**
133133

134134
**Persona**: Compliance administrators
135135

@@ -139,7 +139,7 @@ For more information, see [Generate cloud discovery executive report](../discove
139139

140140
## Generate a cloud discovery snapshot report
141141

142-
**Where**: In the Microsoft Defender XDR Portal, select **Cloud apps > Cloud discovery > Dashboard > Actions**
142+
**Where**: In the [Microsoft Defender portal](https://security.microsoft.com), select **Cloud apps > Cloud discovery > Dashboard > Actions**
143143

144144
**Persona**: Security and Compliance administrators
145145

0 commit comments

Comments
 (0)