Skip to content

Commit b203c0e

Browse files
committed
Merge branch 'main' into ASTQR-chrisda
2 parents 851b0fc + 1774132 commit b203c0e

17 files changed

+267
-30
lines changed

defender-endpoint/android-configure-mam.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-android
1515
ms.topic: conceptual
1616
ms.subservice: android
17-
ms.date: 07/25/2024
17+
ms.date: 08/08/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -124,14 +124,14 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
124124

125125
1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
126126

127-
2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
127+
2. Select **Continue**. A screen is presented which recommends downloading and setting up of the Microsoft Defender: Antivirus (Mobile) app.
128128

129129
3. Select **Download**. You'll be redirected to the app store (Google play).
130130

131-
4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen.
132-
133-
:::image type="content" source="media/download-mde.png" alt-text="The illustrative pages that contain the procedure of downloading MDE and launching back the app-onboarding screen." lightbox="media/download-mde.png":::
131+
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
134132

133+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134+
135135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136136

137137
6. Select **Continue** to log into the managed application.
411 KB
Loading

defender-office-365/safe-links-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Safe Links protection by Safe Links policies is available in the following locat
6161
>
6262
> Safe Links supports only HTTP(S) and FTP formats.
6363
>
64-
> Safe Links no longer wraps URLs pointing to SharePoint sites. SharePoint URLs are still processed by the Safe Links service. This change doesn't cause a degradation in the protection a tenant receives. It's intended to improve the performance of loading SharePoint URLs.
64+
> Safe Links no longer wraps URLs pointing to SharePoint Online sites. SharePoint URLs are still processed by the Safe Links service. This change doesn't cause a degradation in the protection a tenant receives. It's intended to improve the performance of loading SharePoint URLs.
6565
>
6666
> Using another service to wrap links before Defender for Office 365 might prevent Safe Links from process links, including wrapping, detonating, or otherwise validating the "maliciousness" of the link.
6767

defender-xdr/access-den-graph-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Accessing incident notifications and DENs using Graph security API
33
ms.reviewer:
44
description: The method to access Defender Experts Notifications using Graph security API
55
ms.service: defender-experts
6-
ms.subservice: dex-xdr
6+
ms.subservice: dex-hunting
77
ms.author: vpattnaik
88
author: vpattnai
99
ms.localizationpriority: medium
@@ -15,7 +15,7 @@ ms.collection:
1515
- essentials-overview
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 04/29/2024
18+
ms.date: 08/14/2024
1919
---
2020

2121
# Access incident notifications using Graph API

defender-xdr/before-you-begin-defender-experts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: Key infrastructure requirements before enrolling in the Microsoft Defende
33
ms.reviewer:
44
description: This section outlines the key infrastructure requirements you must meet and important information on data access and compliance
55
ms.service: defender-experts
6+
ms.subservice: dex-hunting
67
ms.author: vpattnaik
78
author: vpattnai
89
ms.localizationpriority: medium
@@ -14,7 +15,7 @@ ms.collection:
1415
- tier1
1516
ms.topic: conceptual
1617
search.appverid: met150
17-
ms.date: 06/19/2024
18+
ms.date: 08/14/2024
1819
---
1920

2021
# Before you begin using Defender Experts for Hunting

defender-xdr/deception-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,20 @@ title: Manage the deception capability in Microsoft Defender XDR
33
description: Detect human-operated attacks with lateral movement in the early stages using high confidence signals from the deception feature in Microsoft Defender XDR.
44
ms.service: defender-xdr
55
f1.keywords:
6-
- NOCSH
6+
- NOCSH
77
ms.author: diannegali
88
author: diannegali
99
ms.localizationpriority: medium
1010
manager: dansimp
1111
audience: ITPro
1212
ms.collection:
13-
- m365-security
14-
- tier1
13+
- m365-security
14+
- tier1
1515
ms.topic: conceptual
1616
search.appverid:
17-
- MOE150
18-
- MET150
19-
ms.date: 08/08/2024
17+
- MOE150
18+
- MET150
19+
ms.date: 08/14/2024
2020
---
2121

2222
# Manage the deception capability in Microsoft Defender XDR
@@ -79,7 +79,7 @@ There are two types of lures available in the deception feature:
7979
8080
You can specify decoys, lures, and the scope in a deception rule. See [Configure the deception feature](configure-deception.md) to learn more about how to create and modify deception rules.
8181

82-
When an attacker uses a decoy or a lure on any Defender for Endpoint-onboarded client, the deception capability triggers an alert that indicates possible attacker activity, regardless of whether deception was deployed on the client or not.
82+
When an attacker uses a decoy on any Defender for Endpoint-onboarded client, the deception capability triggers an alert that indicates possible attacker activity, regardless of whether deception was deployed on the client or not.
8383

8484
## Identify incidents and alerts activated by deception
8585

defender-xdr/defender-experts-for-hunting.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ title: What is Microsoft Defender Experts for Hunting offering
33
ms.reviewer:
44
description: Microsoft Defender Experts for Hunting is a proactive threat hunting service that goes beyond the endpoint to hunt across endpoints
55
ms.service: defender-experts
6+
ms.subservice: dex-hunting
67
ms.author: vpattnaik
78
author: vpattnai
89
ms.localizationpriority: medium

defender-xdr/defender-experts-report.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ ms.reviewer:
44
description: The Defender Experts for Hunting service publishes reports to help you understand all the threats the hunting service surfaced in your environment
55
search.appverid: met150
66
ms.service: defender-experts
7-
ms.subservice: dex-xdr
7+
ms.subservice: dex-hunting
88
f1.keywords:
99
- NOCSH
1010
ms.author: vpattnaik
@@ -17,7 +17,7 @@ ms.collection:
1717
- tier1
1818
- essentials-manage
1919
ms.topic: conceptual
20-
ms.date: 10/17/2023
20+
ms.date: 08/14/2023
2121
---
2222

2323
# Understand the Defender Experts for Hunting report in Microsoft Defender XDR

defender-xdr/experts-on-demand.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@ ms.reviewer:
44
description: Select Ask Defender Experts directly inside the Microsoft Defender security portal to get swift and accurate responses to all your threat hunting questions.
55
search.product: Windows 10
66
ms.service: defender-experts
7+
ms.subservice: dex-hunting
78
ms.mktglfcycl: deploy
89
ms.sitesec: library
910
ms.pagetype: security
@@ -18,7 +19,7 @@ ms.collection:
1819
- essentials-get-started
1920
ms.topic: conceptual
2021
search.appverid: met150
21-
ms.date: 04/18/2024
22+
ms.date: 08/14/2024
2223
---
2324

2425
# Collaborate with experts on demand

defender-xdr/microsoft-xdr-auditing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.collection:
1111
- m365-security
1212
- tier3
1313
ms.topic: overview
14-
ms.date: 07/23/2024
14+
ms.date: 08/14/2024
1515
search.appverid: met150
1616
---
1717

@@ -24,7 +24,7 @@ search.appverid: met150
2424
- [Microsoft Defender for Endpoint Plan 2](/defender-endpoint/microsoft-defender-endpoint)
2525
- [Microsoft Defender XDR](microsoft-365-defender.md)
2626

27-
The audit log can help you investigate specific activities across Microsoft 365 services. In the Microsoft Defender XDR portal, Microsoft Defender XDR and Microsoft Defender for Endpoint activities are audited. Some of the activities audited are:
27+
The audit log can help you investigate specific activities across Microsoft 365 services. In the Microsoft Defender portal, Microsoft Defender XDR and Microsoft Defender for Endpoint activities are audited. Some of the activities audited are:
2828

2929
- Changes to data retention settings
3030
- Changes to advanced features

0 commit comments

Comments
 (0)