Skip to content

Commit b9a3b16

Browse files
Merge pull request #4203 from MicrosoftDocs/main
[AutoPublish] main to live - 06/11 13:31 PDT | 06/12 02:01 IST
2 parents d7dd85b + 117954b commit b9a3b16

35 files changed

+39
-39
lines changed

defender-endpoint/configure-device-connectivity.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.reviewer: pahuijbr
1515
search.appverid: MET150
1616
audience: ITPro
17-
ms.date: 04/16/2025
17+
ms.date: 06/11/2025
1818
---
1919

2020
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -143,8 +143,8 @@ In order to stay up to date on IP ranges, it's recommended to refer to the follo
143143

144144
| Service tag name | Defender for Endpoint services included |
145145
|:---|:---|
146-
| MicrosoftDefenderForEndpoint | Cloud-delivered protection, malware sample submission storage, Auto-IR sample storage, Defender for Endpoint command and control. |
147-
| OneDsCollector | Defender for Endpoint cyber and diagnostic data <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and can include diagnostic data traffic for other Microsoft services. |
146+
| `MicrosoftDefenderForEndpoint` | Cloud-delivered protection, malware sample submission storage, Auto-IR sample storage, Defender for Endpoint command and control. |
147+
| `OneDsCollector` | Defender for Endpoint cyber and diagnostic data <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and can include diagnostic data traffic for other Microsoft services. |
148148

149149
The following table lists the current static IP ranges covered by the MicrosoftDefenderForEndpoint service tag. For latest list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
150150

defender-endpoint/configure-environment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier1
1515
ms.topic: how-to
1616
ms.subservice: onboard
17-
ms.date: 02/04/2025
17+
ms.date: 06/11/2025
1818
---
1919

2020
# STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service
@@ -31,7 +31,7 @@ Before you onboard devices to Defender for Endpoint, make sure your network is c
3131

3232
> [!NOTE]
3333
> - After May 8, 2024, you have the option to keep streamlined connectivity ([consolidated set of URLs](https://aka.ms/MDE-streamlined-urls)) as the default onboarding method, or downgrade to standard connectivity through (**Settings > Endpoints > Advanced Features**). For onboarding through Intune or Microsoft Defender for Cloud, you need to activate the relevant option. Devices already onboarded aren't reonboarded automatically. In such cases, create a new policy in Intune, where it's recommended to first assign the policy to a set of test devices to verify connectivity is successful, and then expand the audience. Devices in Defender for Cloud can be reonboarded using the relevant onboarding script, while newly onboarded devices automatically receive streamlined onboarding.
34-
> - The new *.endpoint.security.microsoft.com consolidated domain needs to be reachable for all devices, for current and future functionality, regardless whether you continue to use Standard connectivity.
34+
> - The new `*.endpoint.security.microsoft.com` consolidated domain needs to be reachable for all devices, for current and future functionality, regardless whether you continue to use Standard connectivity.
3535
> - New regions default to streamlined connectivity and can't downgrade to Standard. Read more at [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md).
3636
3737
## Enable access to Microsoft Defender for Endpoint service URLs in the proxy server

defender-endpoint/office-365-microsoft-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ms.date: 03/26/2025
2828
**Applies to:**
2929
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
3030
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
31-
- Microsoft Defender Antivirus
31+
- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)
3232
- Microsoft 365
3333

3434
**Platforms**

defender-office-365/app-guard-for-office-install.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: maccruz
66
author: schmurky
77
manager: deniseb
88
audience: ITPro
9-
ms.topic: conceptual
9+
ms.topic: install-set-up-deploy
1010
ms.localizationpriority: medium
1111
search.appverid:
1212
- MET150

defender-office-365/tenant-wide-setup-for-increased-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: bcarter
66
author: BrendaCarter
77
manager: deniseb
88
audience: ITPro
9-
ms.topic: conceptual
9+
ms.topic: install-set-up-deploy
1010
ms.localizationpriority: medium
1111
ms.collection:
1212
- Ent_O365

defender-vulnerability-management/tvm-block-vuln-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- Tier1
1414
ms.topic: how-to
1515
search.appverid: met150
16-
ms.date: 3/05/2024
16+
ms.date: 06/11/2024
1717
#customer intent: To learn how to block vulnerable applications with Microsoft Defender Vulnerability Management.
1818
---
1919

@@ -134,7 +134,7 @@ After you've unblocked an application, refresh the page to see it removed from t
134134

135135
## Users experience for blocked applications
136136

137-
When users try to access a blocked application, they receive a message informing them that the application was by their organization. This message is customizable.
137+
When users try to access a blocked application, they receive a message informing them that the application was blocked by their organization. This message is customizable.
138138

139139
For applications where the warn mitigation option was applied, users receive a message informing them that the application was blocked by their organization. The user can bypass the block for subsequent launches, by choosing "Allow". This allow action is only temporary, and the application is blocked again after a while.
140140

defender-xdr/advanced-hunting-microsoft-defender.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection:
1919
ms.custom:
2020
- cx-ti
2121
- cx-ah
22-
ms.topic: conceptual
22+
ms.topic: concept-article
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal

defender-xdr/alerts-incidents-correlation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- usx-security
1515
- tier1
1616
- sentinel-only
17-
ms.topic: conceptual
17+
ms.topic: concept-article
1818
search.appverid:
1919
- MOE150
2020
- MET150

defender-xdr/before-you-begin-xdr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- m365-security
1313
- tier1
1414
- essentials-compliance
15-
ms.topic: conceptual
15+
ms.topic: concept-article
1616
ms.custom:
1717
- cx-ti
1818
- cx-dex

defender-xdr/defender-experts-report.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
- m365-security
1919
- tier1
2020
- essentials-manage
21-
ms.topic: conceptual
21+
ms.topic: concept-article
2222
ms.date: 02/07/2025
2323
---
2424

0 commit comments

Comments
 (0)