Skip to content

Commit c2dec0d

Browse files
authored
Merge branch 'main' into patch-38
2 parents 00397fc + bd11dd5 commit c2dec0d

File tree

44 files changed

+290
-94
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+290
-94
lines changed

advanced-threat-analytics/docfx.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242
"globalMetadata": {
4343
"feedback_system": "Standard",
4444
"author": "AbbyMSFT",
45-
"manager": "AbbyMSFT",
45+
"manager": "abbyweisberg",
4646
"ms.author": "abbyweisberg",
4747
"feedback_github_repo": "MicrosoftDocs/atadocs",
4848
"feedback_product_url": "https://techcommunity.microsoft.com/t5/Azure-Advanced-Threat-Protection/bd-p/AzureAdvancedThreatProtection",

defender-business/mdb-get-started.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ ms.collection:
1919
- tier1
2020
- essentials-get-started
2121
ms.custom: intro-get-started
22+
#customer intent: As a Defender for Business admin, I need quick guidance to navigate the Microsoft Defender portal and find first steps so I can get started securing devices and email.
2223
---
2324

2425
# Visit the Microsoft Defender portal

defender-endpoint/TOC.yml

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -126,15 +126,13 @@
126126
- name: Step 2 - Configure device proxy and Internet settings
127127
href: configure-proxy-internet.md
128128
- name: Step 3 - Verify client connectivity to service URLs
129-
href: verify-connectivity.md
130-
131-
- name: Streamlined connectivity
132-
items:
133-
- name: Onboarding devices using streamlined method
134-
href: configure-device-connectivity.md
135-
- name: Migrating devices to streamlined method
129+
href: verify-connectivity.md
130+
- name: Onboard devices using streamlined method
131+
href: configure-device-connectivity.md
132+
- name: Migrate devices to streamlined method
136133
href: migrate-devices-streamlined.md
137-
134+
- name: Enable access to service URLs - US government
135+
href: streamlined-device-connectivity-urls-gov.md
138136
- name: Onboard client devices
139137
items:
140138
- name: Onboard client devices running Windows or macOS

defender-endpoint/android-configure.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Configure Microsoft Defender for Endpoint on Android features
33
description: Describes how to configure Microsoft Defender for Endpoint on Android
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.reviewer: denishdonga
88
ms.localizationpriority: medium
99
manager: bagol
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: how-to
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 06/05/2025
18+
ms.date: 10/23/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
@@ -130,14 +130,12 @@ Following privacy controls are available for configuring the data that is sent b
130130

131131
## Root Detection (Preview)
132132

133-
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, these events occur:
133+
Microsoft Defender for Endpoint has the ability to detect unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, the following events occur:
134134

135-
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
135+
- A high-risk alert is reported to the Microsoft Defender portal. If Device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
136136

137-
- User data on app is cleared. When user opens the app after rooted.
137+
- User data on the app is cleared after the device has been detected as rooted. The feature is enabled by default; no action is required from admin or user.
138138

139-
The feature is enabled by default; no action is required from admin or user. Any android device running Defender version **1.0.8125.0302** (or later) will have it activated.
140-
141139
**Prerequisite**
142140

143141
- Company portal must be installed, and version must be >=5.0.6621.0

defender-endpoint/configure-device-connectivity.md

Lines changed: 25 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
---
22
title: Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
33
description: Learn how to use a streamlined domain or static IP ranges during onboarding when connecting devices to Microsoft Defender for Endpoint.
4-
author: batamig
5-
ms.author: bagol
6-
manager: bagol
4+
author: limwainstein
5+
ms.author: lwainstein
6+
manager: bagol
7+
ms.date: 09/29/2025
78
ms.topic: how-to
89
ms.service: defender-endpoint
910
ms.subservice: onboard
@@ -14,7 +15,6 @@ ms.collection:
1415
ms.reviewer: pahuijbr
1516
search.appverid: MET150
1617
audience: ITPro
17-
ms.date: 06/27/2025
1818
appliesto:
1919
- Microsoft Defender for Endpoint Plan 1
2020
- Microsoft Defender for Endpoint Plan 2
@@ -26,12 +26,15 @@ appliesto:
2626

2727
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2828

29+
[!INCLUDE [Prerelease information](../includes/prerelease.md)]
2930

3031
The Defender for Endpoint client might require the use of proxied connections to relevant cloud services. This article describes the streamlined device connectivity method, the prerequisites and provides additional information for verifying connectivity using the new destination(s).
3132

32-
To simplify network configuration and management, you now have the option of onboarding new devices to Defender for Endpoint using a reduced URL set or static IP ranges. For more information on migrating previously onboarded devices, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
33+
To simplify network configuration and management, you can now onboard new devices to Defender for Endpoint using a reduced URL set or static IP ranges. For more information, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
3334

34-
The Defender for Endpoint-recognized simplified domain: `*.endpoint.security.microsoft.com` consolidates connectivity to the following core Defender for Endpoint services:
35+
## Defender for Endpoint-recognized simplified domain
36+
37+
The Defender for Endpoint-recognized simplified domain `*.endpoint.security.microsoft.com` (for commercial devices) or `*.endpoint.security.microsoft.us*` (for US government devices - Preview) consolidates connectivity to the following core Defender for Endpoint services:
3538

3639
- Cloud-delivered protection
3740
- Malware sample submission storage
@@ -43,11 +46,11 @@ For more information on preparing your environment and the updated list of desti
4346

4447
To support network devices without hostname resolution or wildcard support, you can alternatively configure connectivity using dedicated Defender for Endpoint static IP ranges. For more information, see [Configure connectivity using static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges).
4548

46-
> [!NOTE]
47-
> - The streamlined connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
48-
> - There currently is no plan to deprecate the old, consolidated service URLs. Devices onboarded with "standard" connectivity will continue to function. It is important to ensure connectivity to `*.endpoint.security.microsoft.com` is and remains possible, as future services will require it. This new URL is included in all required URL lists.
49-
> - Connections to the service leverage certificate pinning and TLS. It is not supported to "break and inspect" traffic. In addition, connections are initiated from a device context, not a user context. Enforcing proxy (user) authentication will disallow (break) connectivity in most cases.
50-
49+
> [!NOTE]
50+
>
51+
> - The streamlined connectivity method **doesn't change Defender for Endpoint functionality or end-user experience**. Only the URLs or IPs used for service connectivity have changed.
52+
> - There are no plans to deprecate old service URLs. Devices onboarded with standard connectivity continue to function. Ensure ongoing connectivity to `*.endpoint.security.microsoft.com` (for commercial devices) or `*.endpoint.security.microsoft.us` (for US government devices - Preview) for future services.
53+
> - Service connections use certificate pinning and TLS. Traffic inspection is not supported. Connections are device-initiated, not user-initiated. Enforcing proxy (user) authentication breaks connectivity.
5154
5255
## Prerequisites
5356

@@ -75,6 +78,7 @@ Devices must meet specific prerequisites to use the streamlined connectivity met
7578
- Azure Stack HCI OS, version 23H2 and later.
7679

7780
> [!IMPORTANT]
81+
>
7882
> - **Devices running on MMA agent are not supported** on the streamlined connectivity method and will need to continue using the standard URL set (Windows 7, Windows 8.1, Windows Server 2008 R2 MMA, Server 2012 & 2016 not upgraded to modern unified agent).
7983
> - Windows Server 2012 R2 and Server 2016 will need to upgrade to unified agent to leverage the new method. <br/>
8084
> - Windows 10 1607, 1703, 1709, 1803 can leverage the new onboarding option but will use a longer list. For more information, see the [streamlined URL sheet](https://aka.ms/MDE-streamlined-urls).
@@ -107,12 +111,17 @@ Streamlined connectivity allows you to use the following option to configure clo
107111

108112
- [Option 1: Use the simplified domain](#option-1-configure-connectivity-using-the-simplified-domain)
109113
- [Option 2: Use static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges)
110-
114+
111115
#### Option 1: Configure connectivity using the simplified domain
112116

113-
Configure your environment to allow connections to the simplified Defender for Endpoint domain: `*.endpoint.security.microsoft.com`. For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
117+
Configure your environment to allow connections to the simplified Defender for Endpoint domain:
118+
119+
- For commercial devices: `*.endpoint.security.microsoft.com`
120+
- For US government devices (Preview): `*.endpoint.security.microsoft.us`
114121

115-
You must maintain connectivity with remaining required services listed under the [updated list](https://aka.ms/MDE-streamlined-urls). For example, the certification revocation list, Windows Update, SmartScreen services may also need to be accessible dependent on your current networking infrastructure and patching approach.
122+
For more information, see [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
123+
124+
You must maintain connectivity with remaining required services listed under the [commercial devices streamlined URL list](https://aka.ms/MDE-streamlined-urls) or [government devices streamlined URL list (Preview)](streamlined-device-connectivity-urls-gov.md). For example, the certification revocation list, Windows Update, SmartScreen services may also need to be accessible dependent on your current networking infrastructure and patching approach.
116125

117126
#### Option 2: Configure connectivity using static IP ranges
118127

@@ -133,14 +142,7 @@ In order to stay up to date on IP ranges, it's recommended to refer to the follo
133142
| `MicrosoftDefenderForEndpoint` | Cloud-delivered protection, malware sample submission storage, Auto-IR sample storage, Defender for Endpoint command and control. |
134143
| `OneDsCollector` | Defender for Endpoint cyber and diagnostic data <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and can include diagnostic data traffic for other Microsoft services. |
135144

136-
The following table lists the current static IP ranges covered by the MicrosoftDefenderForEndpoint service tag. For latest list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
137-
138-
|Geo|IP Ranges|
139-
|------|-------|
140-
|US|`20.15.141.0/24` <br/> `20.242.181.0/24` <br/>`20.10.127.0/24`<br/>`13.83.125.0/24`|
141-
|EU|`4.208.13.0/24` <br/>`20.8.195.0/24`|
142-
|UK|`20.26.63.224/28` <br/>`20.254.173.48/28`|
143-
|AU|`68.218.120.64/28` <br/>`20.211.228.80/28`|
145+
For latest service tags list, refer to the [Azure service tags](/azure/virtual-network/service-tags-overview) documentation.
144146

145147
> [!IMPORTANT]
146148
> In compliance with Defender for Endpoint security and compliance standards, your data will be processed and stored in accordance with your tenant's physical location. Based on client location, traffic may flow through any of these IP regions (which correspond to Azure datacenter regions). For more information, see [Data storage and privacy](data-storage-privacy.md).
@@ -185,10 +187,6 @@ Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and
185187
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
186188
- [Run a detection test on a device to verify it has been properly onboarded to Microsoft Defender for Endpoint](run-detection-test.md)
187189

188-
189190
4. Exclude devices from any existing onboarding policies that use the standard onboarding package.
190191

191-
For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.
192-
193-
194-
192+
For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.

0 commit comments

Comments
 (0)