Skip to content

Commit bcdffd0

Browse files
authored
Merge branch 'main' into docs-editor/ios-configure-features-1738920537
2 parents 749430d + 13d7059 commit bcdffd0

37 files changed

+465
-319
lines changed

ATADocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,13 @@
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
4949
"searchScope": ["ATA"],
5050
"contributors_to_exclude": [
51-
"beccarobins"
51+
"beccarobins",
52+
"rjagiewich",
53+
"claydetels19",
54+
"garycentric",
55+
"padmagit77",
56+
"aditisrivastava07",
57+
"Ruchika-mittal01"
5258
]
5359
},
5460
"markdownEngineName": "markdig"

CloudAppSecurityDocs/dcs-inspection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ Microsoft Defender for Cloud Apps enables you to natively use the Microsoft Data
1313
>[!NOTE]
1414
> This feature is currently available in the US, Europe, Australia, India, Canada, Japan, and APAC.
1515
16+
>[!NOTE]
17+
> To enable the Data Classification Service option in File Policies, the "Microsoft 365" App Connector is required.
18+
1619
## Enable content inspection with Data Classification Services
1720

1821
You can set the **Inspection method** to use the **Microsoft Data Classification Service** with no additional configuration required. This option is useful when creating a data leak prevention policy for your files in Microsoft Defender for Cloud Apps.

CloudAppSecurityDocs/docfx.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,13 @@
4444
"ms.service": "defender-for-cloud-apps",
4545
"ms.suite": "ems",
4646
"contributors_to_exclude": [
47-
"beccarobins"
47+
"beccarobins",
48+
"rjagiewich",
49+
"claydetels19",
50+
"garycentric",
51+
"padmagit77",
52+
"aditisrivastava07",
53+
"Ruchika-mittal01"
4854
]
4955
},
5056
"fileMetadata": {},

CloudAppSecurityDocs/includes/entra-conditional-access-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ For more information, see [Conditional Access policies](/azure/active-directory/
3434

3535
> [!NOTE]
3636
> Microsoft Defender for Cloud Apps utilizes the application **Microsoft Defender for Cloud Apps - Session Controls** as part of the Conditional Access App Control service for user sign-in. This application is located within the 'Enterprise Applications' section of Entra ID.
37-
To protect your SaaS applications with Session Controls, you must allow access to this application.
38-
If you block access to this application through an Entra ID Conditional Access policy, end users won't be able to access the protected applications under session controls. <br>
39-
>
37+
To protect your SaaS applications with Session Controls, you must allow access to this application.
38+
>
39+
>If you have any Conditional Access policies that have **“Block Access”** selected in the **“Grant Access”** Control under a Microsoft Entra ID Conditional Access policy scoped to this app, end users will not be able to access the protected applications under session controls. <br><br>
4040
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.<br>
4141
>
4242
>To ensure your location-based conditional access policies function correctly, include the **Microsoft Defender for Cloud Apps – Session Controls** application in those policies.

CloudAppSecurityDocs/network-requirements.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ dev.virtualearth.net
4646
flow.microsoft.com
4747
static2.sharepointonline.com
4848
*.blob.core.windows.net
49+
discoveryresources-cdn-prod.cloudappsecurity.com
50+
discoveryresources-cdn-gov.cloudappsecurity.com
51+
4952
```
5053

5154
Additionally, the following items should be allowed, depending on which data center you use:

defender-business/docfx.json

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,16 +51,19 @@
5151
"searchScope": ["Microsoft Defender Business"],
5252
"contributors_to_exclude": [
5353
"dstrome",
54-
"shdyas",
54+
"shydas",
5555
"rjagiewich",
56-
"American-Dipper",
56+
"American-Dipper",
5757
"claydetels19",
5858
"jborsecnik",
59-
"v-stchambers",
59+
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
6262
"alekyaj",
63-
"beccarobins"
63+
"beccarobins",
64+
"padmagit77",
65+
"aditisrivastava07",
66+
"Ruchika-mittal01"
6467
]
6568
},
6669
"fileMetadata": {},

defender-endpoint/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -259,16 +259,18 @@
259259
items:
260260
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
261261
href: mde-linux-arm.md
262-
- name: Puppet based deployment
263-
href: linux-install-with-puppet.md
262+
- name: Installer script
263+
href: linux-installer-script.md
264264
- name: Ansible based deployment
265265
href: linux-install-with-ansible.md
266266
- name: Chef based deployment
267267
href: linux-deploy-defender-for-endpoint-with-chef.md
268-
- name: Manual deployment
269-
href: linux-install-manually.md
268+
- name: Puppet based deployment
269+
href: linux-install-with-puppet.md
270270
- name: Saltstack-based deployment
271271
href: linux-install-with-saltack.md
272+
- name: Manual deployment
273+
href: linux-install-manually.md
272274
- name: Advanced deployment for Defender for Endpoint on Linux
273275
href: comprehensive-guidance-on-linux-deployment.md
274276
- name: Deployment guidance for Defender for Endpoint on Linux for SAP

defender-endpoint/configure-updates.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 01/12/2024
18+
ms.date: 02/10/2025
1919
---
2020

2121
# Create a custom gradual rollout process for Microsoft Defender updates
@@ -49,19 +49,17 @@ The following table lists the available group policy settings for configuring up
4949
## Group Policy
5050

5151
> [!NOTE]
52-
> An updated Defender ADMX template are published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
52+
> An updated Defender ADMX template is published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
5353
54-
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints.
55-
56-
In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
54+
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints. In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
5755

5856
1. On your Group Policy management machine, open the **Group Policy Management Console**, right-click the **Group Policy Object** (GPO) you want to configure and select **Edit**.
5957

6058
2. Using the Group Policy Management Editor go to **Computer configuration**.
6159

6260
3. Select **Administrative templates**.
6361

64-
4. Expand the tree to **Windows components > Microsoft Defender Antivirus**.
62+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus**.
6563

6664
5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
6765

@@ -88,15 +86,22 @@ Set-MpPreference
8886
-DisableGradualRelease 1|0
8987
-DefinitionUpdatesChannel Staged|Broad|NotConfigured
9088
```
91-
9289
Example:
9390

9491
Use `Set-MpPreference -PlatformUpdatesChannel Beta` to configure platform updates to arrive from the Beta Channel.
9592

9693
For more information on the parameters and how to configure them, see [Set-MpPreference](/powershell/module/defender/set-mppreference) (Microsoft Defender Antivirus).
9794

95+
## Registry
96+
97+
These settings can be confirmed in the registry under `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`:
98+
99+
- `EngineRing`
100+
- `PlatformRing`
101+
- `SignaturesRing`
102+
98103
> [!NOTE]
99-
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts) for guidance on this topic.
104+
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts).
100105
101106
> [!TIP]
102107
> If you're looking for Antivirus related information for other platforms, see:

defender-endpoint/docfx.json

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,14 +53,17 @@
5353
"dstrome",
5454
"shdyas",
5555
"rjagiewich",
56-
"American-Dipper",
5756
"claydetels19",
57+
"American-Dipper",
5858
"jborsecnik",
5959
"v-stchambers",
60-
"Stacyrch140",
60+
"Stacyrch140",
6161
"garycentric",
6262
"alekyaj",
63-
"beccarobins"
63+
"beccarobins",
64+
"padmagit77",
65+
"aditisrivastava07",
66+
"Ruchika-mittal01"
6467
]
6568
},
6669
"fileMetadata": {},

defender-endpoint/edr-in-block-mode.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom:
1414
- next-gen
1515
- mde-edr
1616
- admindeeplinkDEFENDER
17-
ms.date: 06/25/2024
17+
ms.date: 02/10/2025
1818
ms.collection:
1919
- m365-security
2020
- tier2
@@ -80,16 +80,32 @@ When EDR in block mode is turned on, and a malicious artifact is detected, Defen
8080

8181
1. Go to the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)) and sign in.
8282

83-
2. Choose **Settings** \> **Endpoints** \> **General** \> **Advanced features**.
83+
1. Choose **Settings** > **Endpoints** > **General** > **Advanced features**.
8484

85-
3. Scroll down, and then turn on **Enable EDR in block mode**.
85+
1. Scroll down, and then turn on **Enable EDR in block mode**.
8686

8787
### Intune
8888

8989
To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP through Intune, and a comparison to on-premises](/troubleshoot/mem/intune/deploy-oma-uris-to-target-csp-via-intune).
9090

9191
For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp).
9292

93+
### Group Policy
94+
95+
You can use Group Policy to enable EDR in block mode.
96+
97+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
98+
99+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
100+
101+
2. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
102+
103+
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Features**.
104+
105+
4. Double-click **Enable EDR in block mode** and set the option to **Enabled**.
106+
107+
5. Select **OK**.
108+
93109
## Requirements for EDR in block mode
94110

95111
The following table lists requirements for EDR in block mode:

0 commit comments

Comments
 (0)