Skip to content

Commit bcb5213

Browse files
committed
Merge branch 'main' into diannegali-integrationxdrdsi
2 parents 4a475ea + 3a955a1 commit bcb5213

File tree

136 files changed

+900
-1289
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

136 files changed

+900
-1289
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,17 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5-
5+
6+
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
7+
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
8+
# The workflow should not be configured to run after "deletion day" so that users can review the branches were deleted.
9+
# Recommendation: configure cron to run on days 1,15-31 where 1 is what's configured in 'DeleteOnDayOfMonth'. If 'DeleteOnDayOfMonth' is set to something else, update cron to run the two weeks leading up to it.
10+
611
on:
712
schedule:
8-
- cron: "0 9 1 * *"
13+
- cron: "0 9 1,15-31 * *"
914

10-
# workflow_dispatch:
15+
workflow_dispatch:
1116

1217

1318
jobs:

.openpublishing.redirection.defender-endpoint.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,26 @@
134134
"source_path": "defender-endpoint/configure-server-endpoints.md",
135135
"redirect_url": "/defender-endpoint/onboard-windows-server-2012r2-2016",
136136
"redirect_document_id": true
137+
},
138+
{
139+
"source_path": "defender-endpoint/onboard-windows-client.md",
140+
"redirect_url": "/defender-endpoint/onboard-client",
141+
"redirect_document_id": true
142+
},
143+
{
144+
"source_path": "defender-endpoint/onboard-windows-server.md",
145+
"redirect_url": "/defender-endpoint/onboard-server",
146+
"redirect_document_id": true
147+
},
148+
{
149+
"source_path": "defender-endpoint/onboard-windows-server-2012r2-2016.md",
150+
"redirect_url": "/defender-endpoint/onboard-server",
151+
"redirect_document_id": false
152+
},
153+
{
154+
"source_path": "defender-endpoint/mde-linux-arm.md",
155+
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",
156+
"redirect_document_id": false
137157
}
138158
]
139159
}
765 Bytes
Loading

CloudAppSecurityDocs/protect-atlassian.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,9 @@ ms.topic: how-to
88

99

1010

11-
Atlassian is an online collaborative and software development platform (including Confluence, Jira and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
11+
Atlassian is an online collaborative and software development platform (including Confluence, Jira, and Bitbucket). Along with the benefits of effective collaboration in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include posts, tasks, and files with potentially sensitive information, collaboration, and partnership details, and more. Preventing exposure of this data requires continuous monitoring to prevent any malicious actors or security-unaware insiders from exfiltrating sensitive information.
1212

13-
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities.
13+
Connecting Atlassian to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection for anomalous behavior. The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities.
1414

1515
Main threats include:
1616

@@ -68,7 +68,7 @@ For more information, see:
6868
This section provides instructions for connecting Microsoft Defender for Cloud Apps to your existing Atlassian products using the App Connector APIs. This connection gives you visibility into and control over your organization's Atlassian use.
6969

7070
>[!NOTE]
71-
>The connector will cover all users in your organization that use the Atlassian platform, and will show activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
71+
>The connector covers all users in your organization that use the Atlassian platform, and shows activities from Confluence, Jira, and specific Bitbucket activities. For more information about Atlassian activities, see [Atlassian audit log activities](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/#Auditlogging-Accessauditlogactivities).
7272
7373
### Prerequisites
7474

@@ -116,19 +116,17 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
116116
>[!NOTE]
117117
>
118118
> - The first connection can take up to four hours to get all users and their activities.
119-
> - The activities that will display are the activities that were generated from the moment the connector is connected.
119+
> - The activities displayed are the activities that were generated from the moment the connector is connected.
120120
> - Activities from the "Atlassian Access" audit log are fetched by Defender for Cloud apps. Other activities aren't fetched currently. See [Product Audit Logs](https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/).
121121
> - After the connector’s **Status** is marked as **Connected**, the connector is live and works.
122122
123123
### Revoke and renew API keys
124124

125125
1. Microsoft recommends using short lived keys or tokens for connecting apps as a security best practice.
126126
1. We recommend refreshing the Atlassian API key every 6 months as a best practice. To refresh the key, revoke the existing API key and generate a new key.
127-
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration and select **Revoke**.
127+
1. To revoke API key, navigate to **admin.atlassian.com** > **Settings** > **API keys**, determine the API key used for integration, and select **Revoke**.
128128
1. Recreate an API key in the Atlassian admin portal with the steps described above.
129-
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector:
130-
131-
![Edit connector.](media/atlassian-edit-connector.png)
129+
1. Afterwards, go to the **App Connectors** page in the Microsoft Defender Portal and edit the connector.
132130

133131
1. Enter the new generated new **API key** and select **Connect Atlassian**.
134132
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
@@ -148,13 +146,13 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
148146

149147
## Rate limits and limitations
150148

151-
- **Rate limits** include 1000 requests per minute (per API key/connector instance).
149+
- **Rate limits** include 1,000 requests per minute (per API key/connector instance).
152150

153151
For more information about the Atlassian API limitation, see [Atlassian admin REST APIs](https://developer.atlassian.com/cloud/admin/about/#about-the-cloud-admin-rest-apis).
154152

155153
- **Limitations** include:
156154

157-
- Activities will be shown in Defender for Cloud Apps only for users with a verified domain.
155+
- Activities are shown in Defender for Cloud Apps only for users with a verified domain.
158156

159157
- The API key has a maximum expiration period of one year. After one year, you'll need to create another API key from the Atlassian Admin portal and replace it for the old API Key in the Defender for Cloud Apps console.
160158

CloudAppSecurityDocs/protect-azure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88

99

1010

11-
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets may be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
11+
Azure is an IaaS provider that enables your organization to host and manage their entire workloads in the cloud. Along with the benefits of leveraging infrastructure in the cloud, your organization's most critical assets might be exposed to threats. Exposed assets include storage instances with potentially sensitive information, compute resources that operate some of your most critical applications, ports, and virtual private networks that enable access to your organization.
1212

1313
Connecting Azure to Defender for Cloud Apps helps you secure your assets and detect potential threats by monitoring administrative and sign-in activities, notifying on possible brute force attacks, malicious use of a privileged user account, and unusual deletions of VMs.
1414

@@ -74,7 +74,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
7474
1. In the Microsoft Defender Portal, select **Settings**. Then choose **Cloud Apps**. Under **Connected apps**, select **App Connectors**. Make sure the status of the connected App Connector is **Connected**.
7575

7676
> [!NOTE]
77-
> After connecting Azure, data will be pulled. You will see data from then onwards.
77+
> After connecting to Azure, data will be pulled. You'll see data from then onwards.
7878
7979
If you have any problems connecting the app, see [Troubleshooting App Connectors](troubleshooting-api-connectors-using-error-messages.md).
8080

defender-endpoint/TOC.yml

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -138,10 +138,9 @@
138138
href: migrate-devices-streamlined.md
139139

140140
- name: Onboard client devices
141-
href: onboard-client.md
142141
items:
143-
- name: Onboarding Windows client overview
144-
href: onboard-windows-client.md
142+
- name: Onboard client devices running Windows or macOS
143+
href: onboard-client.md
145144
- name: Defender for Endpoint plug-in for WSL
146145
href: mde-plugin-wsl.md
147146
- name: Onboard Windows devices to Defender for Endpoint using Intune
@@ -160,12 +159,9 @@
160159
href: onboard-downlevel.md
161160

162161
- name: Onboard server devices
163-
href: onboard-server.md
164162
items:
165-
- name: Onboard Windows Server version 1803, Windows Server 2019, and later
166-
href: onboard-windows-server.md
167-
- name: Onboard Windows Server 2012 R2 and Windows Server 2016
168-
href: onboard-windows-server-2012r2-2016.md
163+
- name: Onboard servers through Defender for Endpoint's experience
164+
href: onboard-server.md
169165
- name: Defender for Endpoint on Windows Server with SAP
170166
href: mde-sap-windows-server.md
171167
- name: Onboard Windows devices using Configuration Manager
@@ -279,8 +275,6 @@
279275
href: linux-install-manually.md
280276
- name: Direct onboarding with Defender for Cloud
281277
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
282-
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
283-
href: mde-linux-arm.md
284278
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
285279
href: mde-linux-deployment-on-sap.md
286280
- name: 3 - Configuration
@@ -556,6 +550,8 @@
556550
href: onboarding-endpoint-configuration-manager.md
557551
- name: Onboarding using Microsoft Intune
558552
href: onboarding-endpoint-manager.md
553+
- name: Deploy Microsoft Defender for Endpoint prerelease builds on Android devices
554+
href: mobile-pretest-android.md
559555

560556
- name: Migration guides
561557
items:

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 03/21/2025
18+
ms.date: 04/18/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -28,6 +28,17 @@ ms.date: 03/21/2025
2828

2929
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030

31+
#### Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks
32+
33+
April 2025
34+
35+
**Setup a secure environment to test prerelease builds of Defender for Endpoint on Android**. Learn the steps on how to set up your environment for prerelease testing of Defender for Endpoint on Android. These steps are for Android devices that are onboarded to Microsoft Defender for Endpoint through the following methods:
36+
37+
- Android Enterprise scenarios
38+
- Mobile Application Mangement (MAM) enrollment scenarios
39+
40+
For more information, see [Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks](mobile-pretest-android.md).
41+
3142
#### Defender for Endpoint on Android now supports Android 10 as the minimum version
3243

3344
February 2025

defender-endpoint/api/device-health-api-methods-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Retrieves a list of Microsoft Defender Antivirus device health details. This API
5050
Data that is collected using either `JSON response` or by using files is a snapshot of the current state. This data doesn't contain historical data. To collect historical data, you must save the data in your own data storage.
5151

5252
> [!IMPORTANT]
53-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
53+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2).
5454
>
5555
> For information about using the **Device health and antivirus compliance** reporting tool in the Microsoft Defender portal, see: [Device health and antivirus report in Microsoft Defender for Endpoint](../device-health-reports.md).
5656

defender-endpoint/api/device-health-export-antivirus-health-report-api.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Data that is collected using either '_JSON response_ or _via files_' is the curr
4848

4949
> [!IMPORTANT]
5050
>
51-
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
51+
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](../onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2).
5252
5353
> [!NOTE]
5454
>

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ The following table lists the supported operating systems for rules that are cur
111111

112112
> [!NOTE]
113113
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114-
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](onboard-windows-server-2012r2-2016.md#functionality-in-the-modern-unified-solution).
114+
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2).
115115
116116
| Rule name| Windows 10 and 11 | Windows Server version 1803, 2019, and later | Windows Server 2016 and 2012 R2 |
117117
|---|---|---|---|
@@ -136,7 +136,7 @@ The following table lists the supported operating systems for rules that are cur
136136
| [Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y <br> version 1803 or later | Y | Y |
137137

138138
> [!NOTE]
139-
> - For Windows Server 2012 R2 and Windows Server 2016, see [Onboard Windows Server 2012 R2 and Windows Server 2016 to Microsoft Defender for Endpoint](onboard-windows-server-2012r2-2016.md).
139+
> - For Windows Server 2012 R2 and Windows Server 2016, see [Onboard Windows Server 2016 and Windows Server 2012 R2](onboard-server.md#onboard-windows-server-2016-and-windows-server-2012-r2).
140140
> - If you're using Configuration Manager, the minimum required version of Microsoft Endpoint Configuration Manager is version 2111.
141141
> - For Windows client devices, "version 1809 or later" and "version 1903 (build 18362)" apply to Windows 10 only.
142142

0 commit comments

Comments
 (0)