You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/behavior-monitor-macos.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -276,11 +276,15 @@ NRI should have a low impact on network performance. Instead of holding the conn
276
276
277
277
```
278
278
279
-
4. Enable network real-time inspection (NRI):
279
+
1. Enable network real-time inspection (NRI):
280
280
281
281
```Bash
282
-
282
+
283
283
sudo mdatp network-protection remote-settings-override set --value "{\"enableNriMpengineMetadata\" : true}"
284
284
285
+
285
286
```
286
-
287
+
288
+
> [!NOTE]
289
+
> While in Public Preview, since the setting is set via a command line, network real-time inspection (NRI) will not persist reboots. You will need to re-enable it.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-whatsnew.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
32
32
33
33
## Defender for Endpoint on iOS now supports iOS/iPadOS 16.x as the minimum version
34
34
35
-
Defender for Endpoint on iOS is ending support for iOS/iPadOS 15, as iOS/iPadOS 18 became available in September 2024. Microsoft typically supports the current version and two previous versions (n-2). This change takes effect beginning on January 31, 2025.
35
+
Defender for Endpoint is ending support for iOS/iPadOS 15 on January 31, 2025. Moving forward, only devices running iOS/iPadOS 16 and later are supported.
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 11/10/2024
6
+
ms.date: 12/12/2024
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -55,14 +55,15 @@ The following table summarizes network protection areas of coverage.
55
55
> [!NOTE]
56
56
> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
57
57
> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58
-
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
59
-
> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60
-
> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
58
+
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
59
+
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60
+
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
61
61
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
62
+
> - URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
62
63
> - Full URL path blocks can be applied for unencrypted URLs.
63
-
>
64
+
>
64
65
> There might be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
65
-
66
+
>
66
67
Watch this video to learn how Network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
Copy file name to clipboardExpand all lines: defender-office-365/attack-simulation-training-teams.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ appliesto:
20
20
# Microsoft Teams in Attack simulation training
21
21
22
22
> [!IMPORTANT]
23
-
> Currently, Microsoft Teams in Attack simulation training is in Private Preview. The information in this article is subject to change.
23
+
> Microsoft Teams' Attack simulation training is currently in Private Preview, and the intake for this preview is now closed. The information in this article is subject to change.
24
24
25
25
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can now use Attack simulation training to deliver simulated phishing messages in Microsoft Teams. For more information about attack simulation training, see [Get started using Attack simulation training in Defender for Office 365](attack-simulation-training-get-started.md).
Copy file name to clipboardExpand all lines: defender-xdr/defender-experts-report.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,7 @@ title: Understand the Defender Experts for Hunting report in Microsoft Defender
3
3
ms.reviewer:
4
4
description: The Defender Experts for Hunting service publishes reports to help you understand all the threats the hunting service surfaced in your environment
Copy file name to clipboardExpand all lines: defender-xdr/experts-on-demand.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,8 +3,7 @@ title: Collaborate with Experts on Demand using Ask Defender Experts
3
3
ms.reviewer:
4
4
description: Select Ask Defender Experts directly inside the Microsoft Defender security portal to get swift and accurate responses to all your threat hunting questions.
Copy file name to clipboardExpand all lines: defender-xdr/onboarding-defender-experts-for-hunting.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,7 @@
2
2
title: How to subscribe to Microsoft Defender Experts for Hunting
3
3
ms.reviewer:
4
4
description: If you're new to Microsoft Defender XDR and Defender Experts for Hunting, this is how you onboard, receive, and set up Defender experts notifications.
0 commit comments