You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/mdb-asr.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Get an overview of attack surface reduction capabilities, including
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 06/07/2024
7
+
ms.date: 07/23/2024
8
8
ms.topic: conceptual
9
9
ms.service: defender-business
10
10
ms.localizationpriority: medium
@@ -23,9 +23,6 @@ Your attack surfaces are all the places and ways that your organization's networ
23
23
24
24
To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities, including attack surface reduction rules. This article describes how to set up your attack surface reduction rules and describes attack surface reduction capabilities.
25
25
26
-
> [!NOTE]
27
-
> Intune is not included in the standalone version of Defender for Business, but it can be added on.
28
-
29
26
## Standard protection ASR rules
30
27
31
28
There are lots of attack surface reduction rules available. You don't have to set them all up at once. And, you can set up some rules in audit mode just to see how they work for your organization, and change them to work in block mode later. That said, we recommend enabling the following standard protection rules as soon as possible:
Copy file name to clipboardExpand all lines: defender-business/mdb-mtd.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Get an overview of mobile threat defense in Defender for Business.
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 06/19/2024
7
+
ms.date: 07/23/2024
8
8
ms.topic: conceptual
9
9
ms.service: defender-business
10
10
ms.localizationpriority: medium
@@ -37,17 +37,17 @@ The following table summarizes the capabilities that are included in mobile thre
37
37
|**Microsoft Defender Vulnerability Management**<br/>Vulnerability assessment of onboarded mobile devices. Includes vulnerability assessments for operating systems and apps for Android and iOS. <br/>See [Use your vulnerability management dashboard in Microsoft Defender for Business](mdb-view-tvm-dashboard.md). | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | See note 1 (below) |
38
38
|**Network Protection** <br/>Protection against rogue Wi-Fi related threats and rogue certificates. <br/>Network protection is turned on by default with [next-generation protection](mdb-next-generation-protection.md). <br/>As part of mobile threat defense, network protection also includes the ability to allow root certification authority and private root certification authority certificates in Intune. It also establishes trust with endpoints. | See note 2 (below) | See note 2 (below) |
39
39
|**Unified alerting** <br/>Alerts from all platforms are listed in the unified Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). In the navigation pane, choose **Incidents**). <br/>See [View and manage incidents in Microsoft Defender for Business](mdb-view-manage-incidents.md)| :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: | :::image type="content" source="/defender/media/d238e041-6854-4a78-9141-049224df0795.png" alt-text="Included checkmark."::: |
40
-
|**Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
40
+
|**Conditional Access** and **conditional launch** <br/>[Conditional Access](/mem/intune/protect/conditional-access) and [conditional launch](/mem/intune/apps/app-protection-policies-access-actions) block risky devices from accessing corporate resources.<br/>- Conditional Access policies require certain criteria to be met before a user can access company data on their mobile device. <br/>- Conditional launch policies enable your security team to block access or wipe devices that don't meet certain criteria.<br/>- Defender for Business risk signals can also be added to app protection policies. | Requires Intune | Requires Intune |
41
41
|**Privacy controls** <br/>Configure privacy in threat reports by controlling the data sent by Defender for Business. Privacy controls are available for admin and end users, and for both enrolled and unenrolled devices. | Requires Intune | Requires Intune |
42
42
|**Integration with Microsoft Tunnel** <br/>Integration with [Microsoft Tunnel](/mem/intune/protect/microsoft-tunnel-overview), a VPN gateway solution for Intune. | Requires Intune VPN Tunnel <br/>(see note 3 below) | Requires Intune VPN Tunnel <br/>(see note 3 below) |
43
43
44
44
> [!NOTE]
45
-
> 1. Intune is required for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
45
+
> 1. Intune is used for software/app vulnerabilities to be reported. Operating system vulnerabilities are included by default.
46
46
>
47
-
> 2. Intune is required to configure or manage an allow list of root certification authority and private root certification authority certificates.
47
+
> 1. Use Intune to configure or manage an allow list of root certification authority and private root certification authority certificates.
48
48
>
49
49
> 3. See [Prerequisites for the Microsoft Tunnel in Intune](/mem/intune/protect/microsoft-tunnel-prerequisites).
- View submissions: _"Security data basics (read)"_
46
+
45
47
For more information about how you can submit spam, phish, URLs, and email attachments to Microsoft, see [Use the Submissions page to submit suspected spam, phish, URLs, legitimate email getting blocked, and email attachments to Microsoft](/defender-office-365/submissions-admin).
46
48
47
49
## Submit a file or file hash to Microsoft from the Defender portal
@@ -54,7 +56,7 @@ For more information about how you can submit spam, phish, URLs, and email attac
54
56
55
57
:::image type="content" source="/defender/media/unified-admin-submission-new.png" alt-text="Screenshot showing how to add a new submission.":::
56
58
57
-
2. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
59
+
4. In the **Submit items to Microsoft for review** flyout that opens, select **Files** or **File hash** from the **Select the submission type** dropdown list.
58
60
59
61
- If you selected **Files**, configure the following options:
60
62
- Select **Browse files**. In the dialog that opens, find and select the file, and then select **Open**. Repeat this step as many times as necessary. To remove an entry from the flyout, select :::image type="icon" source="/defender/media/m365-cc-sc-close-icon.png" border="false"::: next to the entry.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure-mam.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- mde-android
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
-
ms.date: 01/13/2023
17
+
ms.date: 07/25/2024
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -138,7 +138,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
138
138
139
139
## Configure Web protection
140
140
141
-
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://endpoint.microsoft.com).
141
+
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://intune.microsoft.com).
142
142
143
143
Web protection helps to secure devices against web threats and protect users from phishing attacks. Note that anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 05/22/2024
18
+
ms.date: 07/25/2024
19
19
---
20
20
21
21
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -293,7 +293,7 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
293
293
294
294
### Set up Microsoft Defender in Personal Profile
295
295
296
-
Admins can go to the [Microsoft Endpoint Management admin center](https://endpoint.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
296
+
Admins can go to the [Microsoft Endpoint Management admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
297
297
298
298
1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
0 commit comments