You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/alerts-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.reviewer: rlitinsky
10
10
11
11
## What are Microsoft Defender for Identity security alerts?
12
12
13
-
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
13
+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
14
14
15
15
> [!NOTE]
16
16
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
Copy file name to clipboardExpand all lines: ATPDocs/understanding-security-alerts.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ The alerts page provides context into the alert, by combining attack signals and
67
67
68
68
> [!NOTE]
69
69
> Microsoft Defender for Identity alerts currently appear in two different layouts in the Microsoft Defender XDR portal.
70
-
> While the alert views show different information, all alerts are based on detections from Defender for Identity sensors. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
70
+
> While the alert views show different information, all alerts are based on Defender for Identity collected data. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
71
71
72
72
To view alerts from both Defender for Identity and Defender XDR, select **Filter**, then under **Service sources** choose **Microsoft Defender for Identity** and **Defender XDR**, and select **Apply**:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/caac-known-issues.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -119,27 +119,26 @@ When a session policy is enforced using Edge in-browser protection and the user
119
119
120
120
Example Scenario:
121
121
122
-
A user was originally assigned a CA policy for the Salesforce application, along with an Defender for Cloud apps session policy that blocked file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
122
+
A user was originally assigned a CA policy for Salesforce along with a Defender for Cloud Apps session policy to block file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
123
123
124
124
Although the admin later removed the CA policy, the user still experiences the download block in Edge due to cached policy data.
125
125
126
126
Mitigation Options:
127
127
128
128
Option 1: Automatic cleanup
129
-
1. Reassign the user/app to the CA policy.
130
-
2.Remove the corresponding Defender for Cloud Apps session policy.
131
-
3. Have the user access the application using Edge, this will trigger the policy removal automatically.
132
-
4.Remove the CA policy again.
129
+
1. Add the user/app back into the scope of the CA policy.
130
+
2.Remove the corresponding Defender for Cloud Apps session policy.
131
+
3. Wait for users to access the application using Edge. This will automatically trigger the policy removal.
132
+
4.Remove the user/app from the scope of the CA policy.
133
133
134
-
Option 2: Manual cleanup
135
-
1. Delete the cached policy file
136
-
- Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
137
-
- Delete the file: mda_store.txt
138
-
139
-
2. Remove the work profile in Edge
140
-
- Open Microsoft Edge.
141
-
- Navigate to Profile Settings.
142
-
- Delete the work profile associated with the outdated session policy.
134
+
Option 2: Delete the cached policy file (Manual cleanup)
135
+
1. Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
136
+
2. Delete the file: mda_store.1.txt
137
+
138
+
Option 3: Remove the work profile in Edge (Manual cleanup)
139
+
1. Open Edge.
140
+
2. Navigate to Profile Settings.
141
+
3. Delete the work profile associated with the outdated session policy.
143
142
144
143
These steps will force a policy refresh and resolve enforcement issues related to outdated session policies.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+3-69Lines changed: 3 additions & 69 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,29 +179,6 @@ From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're
179
179
- For Android Enterprise with a work profile, only apps installed on the work profile will be supported.
180
180
- For other BYOD modes, by default, vulnerability assessment of apps will **not** be enabled. However, when the device is on administrator mode, admins can explicitly enable this feature through Microsoft Intune to get the list of apps installed on the device. For more information, see details below.
181
181
182
-
### Configure privacy for device administrator mode
183
-
184
-
Use the following steps to **enable vulnerability assessment of apps** from devices in **device administrator** mode for targeted users.
185
-
186
-
> [!NOTE]
187
-
> By default, this is turned off for devices enrolled with device admin mode.
188
-
189
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
201
-
- Value: Enter 0 to disable privacy setting (By default, the value is 1)
202
-
203
-
4. Select **Next** and assign this profile to targeted devices/users.
204
-
205
182
### Configure privacy for Android Enterprise work profile
206
183
207
184
Defender for Endpoint supports vulnerability assessment of apps in the work profile. However, in case you want to turn off this feature for targeted users, you can use the following steps:
@@ -222,28 +199,6 @@ Turning the above privacy controls on or off won't affect the device compliance
222
199
223
200
Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
224
201
225
-
### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
226
-
227
-
Use the following steps to turn it on for targeted users:
228
-
229
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
241
-
- Value: Enter 1 to enable privacy setting. The default value is 0.
242
-
243
-
4. Select **Next** and assign this profile to targeted devices/users.
244
-
245
-
Using this privacy control won't affect the device compliance check or conditional access.
246
-
247
202
### Configure privacy for phishing alert report on Android Enterprise work profile
248
203
249
204
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -263,28 +218,6 @@ Turning the above privacy controls on or off won't affect the device compliance
263
218
264
219
Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
265
220
266
-
### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
267
-
268
-
Use the following steps to turn it on for targeted users:
269
-
270
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
282
-
- Value: Enter 1 to enable privacy setting. The default value is 0.
283
-
284
-
4. Select **Next** and assign this profile to targeted devices/users.
285
-
286
-
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
287
-
288
221
### Configure privacy for malware alert report on Android Enterprise work profile
289
222
290
223
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -308,9 +241,10 @@ Use the following steps to configure Disable out sign:
308
241
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
309
242
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
310
243
3. Select **Microsoft Defender for Endpoint** as the target app.
311
-
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
244
+
1. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
312
245
313
-
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
246
+
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles.
247
+
314
248
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
315
249
316
250
5. Select **Next** and assign this profile to targeted devices and users.
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+1-52Lines changed: 1 addition & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,58 +33,7 @@ Learn how to deploy Defender for Endpoint on Android on Microsoft Intune Company
33
33
34
34
> [!NOTE]
35
35
> **Defender for Endpoint on Android is now available on [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.scmx)**
36
-
>
37
-
> You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across device administrator and Android Enterprise enrollment modes. Updates to the app are automatic via Google Play.
38
-
39
-
## Deploy on Device Administrator enrolled devices
40
-
41
-
Learn how to deploy Defender for Endpoint on Android by using the Microsoft Intune Company Portal for device administrator enrolled devices.
42
-
43
-
### Add as Android store app
44
-
45
-
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps**\>**Android Apps**\>**Add**\>**Android store app**. Then choose **Select**.
46
-
47
-
:::image type="content" source="media/mda-addandroidstoreapp.png" alt-text="The Add Android store application pane in the Microsoft Intune admin center portal" lightbox="media/mda-addandroidstoreapp.png":::
48
-
49
-
2. On the **Add app** page, in the **App Information** section specify the following details:
50
-
51
-
-**Name**
52
-
-**Description**
53
-
-**Publisher** as Microsoft.
54
-
-**App store URL** as `https://play.google.com/store/apps/details?id=com.microsoft.scmx` (URL for the Defender for Endpoint app in the Google Play Store)
55
-
56
-
Other fields are optional. Then select **Next**.
57
-
58
-
:::image type="content" source="media/mda-addappinfo.png" alt-text=" The Add App page displaying the application's publisher and URL information in the Microsoft Intune admin center portal" lightbox="media/mda-addappinfo.png":::
59
-
60
-
3. In the **Assignments** section, go to the **Required** section and select **Add group.** You can then choose the user group (or groups) to receive the Defender for Endpoint on Android app. Choose **Select**, and then tap **Next**.
61
-
62
-
The selected user group should consist of Intune enrolled users.
63
-
64
-
:::image type="content" source="media/363bf30f7d69a94db578e8af0ddd044b.png" alt-text="Screenshot that shows the Add group pane in the Add App page in the Microsoft Intune admin center portal." lightbox="media/363bf30f7d69a94db578e8af0ddd044b.png":::
65
-
66
-
4. In the **Review+Create** section, verify that all the information entered is correct, and then select **Create**.
67
-
68
-
In a few moments, the Defender for Endpoint app should be created, and a notification should appear in the upper right corner of the screen.
69
-
70
-
:::image type="content" source="media/86cbe56f88bb6e93e9c63303397fc24f.png" alt-text="The application status pane in the Microsoft Intune admin center portal" lightbox="media/86cbe56f88bb6e93e9c63303397fc24f.png":::
71
-
72
-
5. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation completed successfully.
73
-
74
-
:::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
75
-
76
-
### Complete onboarding and check status
77
-
78
-
1. After Defender for Endpoint on Android is installed on the device, you should see the app icon.
79
-
80
-
:::image type="content" source="media/7cf9311ad676ec5142002a4d0c2323ca.jpg" alt-text="The Microsoft Defender ATP icon listed in the Search pane" lightbox="media/7cf9311ad676ec5142002a4d0c2323ca.jpg":::
81
-
82
-
2. Tap the Microsoft Defender for Endpoint app icon, and follow the on-screen instructions to complete onboarding. The details include end-user acceptance of Android permissions required by Defender for Endpoint on Android.
83
-
84
-
3. Upon successful onboarding, the device shows up in the list of devices in the [Microsoft Defender portal](https://security.microsoft.com).
85
-
86
-
:::image type="content" source="media/9fe378a1dce0f143005c3aa53d8c4f51.png" alt-text="A device in the Microsoft Defender for Endpoint portal" lightbox="media/9fe378a1dce0f143005c3aa53d8c4f51.png":::
87
-
36
+
> > You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across device administrator and Android Enterprise enrollment modes. Updates to the app are automatic via Google Play.
88
37
## Deploy on Android Enterprise enrolled devices
89
38
90
39
Defender for Endpoint on Android supports Android Enterprise enrolled devices.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -384,6 +384,8 @@ Once the client versions are deployed to target iOS devices, processing starts.
384
384
385
385
> [!NOTE]
386
386
> If you're using SSL inspection solution within your iOS device, add the domain names `securitycenter.windows.com` (in commercial environments) and `securitycenter.windows.us` (in GCC environments) for threat and vulnerability management features to work.
387
+
>
388
+
> The TVM Privacy permission approval screen will only appear for Unsupervised and Non-Zero touch enabled devices. Even For Non-Zero touch enabled devices approval is __not required only on supervised devices__ where the `issupervised` key is configured
0 commit comments