You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-device-connectivity.md
+29-26Lines changed: 29 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
3
-
description: Learn how to use a streamlined domain or static IP ranges during onboarding when connecting devices to Microsoft Defender for Endpoint
3
+
description: Learn how to use a streamlined domain or static IP ranges during onboarding when connecting devices to Microsoft Defender for Endpoint.
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
@@ -27,7 +27,7 @@ ms.date: 05/13/2024
27
27
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
28
-[Microsoft Defender XDR](/defender-xdr)
29
29
30
-
The Microsoft Defender for Endpoint service may require the use of proxy configurations to report diagnostic data and communicate data to the service. Prior to the availability of the streamlined connectivity method, other URLs were required and Defender for Endpoint static IP ranges weren't supported. For more information on preparing your environment, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
30
+
The Microsoft Defender for Endpoint service might require the use of proxy configurations to report diagnostic data and communicate data to the service. Prior to the availability of the streamlined connectivity method, other URLs were required and Defender for Endpoint static IP ranges weren't supported. For more information on preparing your environment, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
31
31
32
32
This article describes the streamlined device connectivity method and how to onboard new devices to use a simpler deployment and management of Defender for Endpoint cloud connectivity services. For more information on migrating previously onboarded devices, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
33
33
@@ -44,17 +44,17 @@ The Defender for Endpoint-recognized simplified domain: `*.endpoint.security.mic
44
44
To support network devices without hostname resolution or wildcard support, you can alternatively configure connectivity using dedicated Defender for Endpoint static IP ranges. For more information, see [Configure connectivity using static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges).
45
45
46
46
> [!NOTE]
47
-
> - The simplified connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
48
-
> - There currently is no plan to deprecate the old, consolidated service URLs. Devices onboarded with "standard" connectivity will continue to function. It is important to ensure connectivity to *.endpoint.security.microsoft.com is and remains possible, as future services will require it. This new URL is included in all required URL lists.
47
+
> - The streamlined connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
48
+
> - There currently is no plan to deprecate the old, consolidated service URLs. Devices onboarded with "standard" connectivity will continue to function. It is important to ensure connectivity to `*.endpoint.security.microsoft.com` is and remains possible, as future services will require it. This new URL is included in all required URL lists.
49
49
50
50
## Consolidated services
51
51
52
-
The following Defender for Endpoint URLs consolidated under the streamlined domain should no longer be required for connectivity if `*.endpoint.security.microsoft.com` is allowed and devices are onboarded using the streamlined onboarding package. You will need to maintain connectivity with other required services not consolidated that are relevant to your organization (for example, CRL, SmartScreen/Network Protection, and Windows Update).
52
+
The following Defender for Endpoint URLs consolidated under the simplified domain should no longer be required for connectivity if `*.endpoint.security.microsoft.com` is allowed and devices are onboarded using the streamlined onboarding package. You need to maintain connectivity with other required services not consolidated that are relevant to your organization (for example, CRL, SmartScreen/Network Protection, and Windows Update).
53
53
54
-
For the updated list of required URLs, see [Download the spreadsheet here](https://aka.ms/MDE-streamlined-urls).
54
+
For the updated list of required URLs, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
55
55
56
56
> [!IMPORTANT]
57
-
> If you are configuring using IP ranges, you will need to separately configure the EDR cyberdata service. This service is not consolidated on an IP level. See section below for more details.
57
+
> If you are configuring using IP ranges, you will need to separately configure the EDR cyberdata service. This service is not consolidated on an IP level.
58
58
59
59
| Category | Consolidated URLs |
60
60
|------------|---------------|
@@ -85,9 +85,9 @@ Devices must meet specific prerequisites to use the streamlined connectivity met
@@ -132,7 +132,7 @@ The following illustration shows the streamlined connectivity process and the co
132
132
133
133
Once you confirm prerequisites are met, ensure your network environment is properly configured to support the streamlined connectivity method. Follow the steps outlined in [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
134
134
135
-
Defender for Endpoint services consolidated under the simplified method should no longer be required for connectivity. However, some URLs aren't included in the consolidation.
135
+
Defender for Endpoint service URLs consolidated under simplified domain should no longer be required for connectivity. However, some URLs aren't included in the consolidation.
136
136
137
137
Streamlined connectivity allows you to use the following option to configure cloud connectivity:
138
138
@@ -157,12 +157,12 @@ With streamlined connectivity, IP-based solutions can be used as an alternative
157
157
> [!IMPORTANT]
158
158
> The EDR Cyber data service must be configured separately if you are using the IP method (this service is only consolidated on a URL level).You must also maintain connectivity with other required services including SmartScreen, CRL, Windows Update, and other services.<br/>
159
159
160
-
In order to stay up to date on IP ranges, it is recommended to refer to the following Azure service tags for Microsoft Defender for Endpoint services. The latest IP ranges will always be found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
160
+
In order to stay up to date on IP ranges, it's recommended to refer to the following Azure service tags for Microsoft Defender for Endpoint services. The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
161
161
162
162
| Service tag name | Defender for Endpoint services included |
| OneDsCollector | EDR Cyberdata <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and may include diagnostic data traffic for other Microsoft services. |
165
+
| OneDsCollector | EDR Cyberdata <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and can include diagnostic data traffic for other Microsoft services. |
166
166
167
167
The following table lists the current static IP ranges. For latest list, refer to the Azure service tags.
168
168
@@ -193,7 +193,7 @@ To test streamlined connectivity for devices not yet onboarded to Defender for E
193
193
194
194
- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.
195
195
196
-
As a supplementary check, you can also use the client analyzer to test whether a device meets pre-requisites: https://aka.ms/BetaMDEAnalyzer
196
+
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/BetaMDEAnalyzer
197
197
198
198
199
199
> [!NOTE]
@@ -203,34 +203,37 @@ As a supplementary check, you can also use the client analyzer to test whether a
203
203
204
204
Once you configure your network to communicate with the full list of services, you can begin onboarding devices using the streamlined method.
205
205
206
-
Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and have updated the sensor and Microsoft Defender Antivirus versions.
206
+
Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and have updated sensor and Microsoft Defender Antivirus versions.
207
207
208
208
209
-
To get the new package, in Microsoft Defender XDR, select **Settings > Endpoints > Device management> Onboarding**.
209
+
1.To get the new package, in Microsoft Defender XDR, select **Settings > Endpoints > Device management> Onboarding**.
210
210
211
+
2. Select the applicable operating system and choose "Streamlined" from the Connectivity type dropdown menu.
211
212
212
-
Select the applicable operating system and choose "Streamlined (preview)" from the Connectivity type dropdown menu.
213
-
214
-
For new devices (not onboarded to Defender for Endpoint) supported under this method, follow onboarding steps from previous sections using the updated onboarded package with your preferred deployment method:
213
+
3. For new devices (not onboarded to Defender for Endpoint) supported under this method, follow onboarding steps from previous sections using the updated onboarded package with your preferred deployment method:
215
214
216
215
-[Onboard Windows Client](onboard-windows-client.md)
217
216
-[Onboard Windows Server](configure-server-endpoints.md)
-[Run a detection test on a device to verify it has been properly onboarded to Microsoft Defender for Endpoint](run-detection-test.md)
220
219
221
220
222
-
Exclude devices from any existing onboarding policies that use the standard onboarding package.
221
+
4.Exclude devices from any existing onboarding policies that use the standard onboarding package.
223
222
224
223
For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.
225
224
226
-
:::image type="content" source="media/migrate-devices-streamlined.png" alt-text="Screenshot of onboarding page with streamlined connectivity":::
225
+
### Stage 5. Set the default onboarding package to streamlined connectivity
227
226
228
-
When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**). For onboarding through Intune & Microsoft Defender for Cloud, you will need to activate the relevant option. Devices already onboarded will not automatically re-onboard; you will need to create a new policy in Intune, where it is recommended to first assign the policy to a set of test devices to verify connectivity is successful, before expanding the audience. Devices in Defender for Cloud can be re-onboarded using the relevant onboarding script.
227
+
When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**).
229
228
230
-
> [!NOTE]
231
-
> Before moving forward with this option, validate that your environment is ready and all devices meet prerequisites.
This setting sets the default onboarding package to 'streamlined' for applicable operating systems. You can still use the standard onboarding package within the onboarding page but you must specifically select it in the drop-down.
232
232
233
+
For onboarding through Intune & Microsoft Defender for Cloud, you need to activate the relevant option. Devices already onboarded don't automatically reonboard; you need to create a new policy in Intune, where it's recommended to first assign the policy to a set of test devices to verify connectivity is successful, before expanding the audience. Devices in Defender for Cloud can be reonboarded using the relevant onboarding script.
234
+
235
+
> [!NOTE]
236
+
> - Only tenants created on or before May 8th, 2024 have the option to switch between standard and streamlined connectivity. Newer tenants will only support streamlined connectivity.
237
+
> - Before moving forward with this option, validate that your environment is ready and all devices meet prerequisites.
233
238
234
-
:::image type="content" source="media/advanced-setting-streamlined-connectivity.png" alt-text="Screenshot of advanced settings page with streamlined connectivity option":::
235
239
236
-
This setting sets the default onboarding package to *streamlined* for applicable operating systems. You can still use the standard onboarding package within the onboarding page, but you must specifically select it in the drop-down.
Copy file name to clipboardExpand all lines: defender-office-365/safe-links-about.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ Safe Links protection by Safe Links policies is available in the following locat
61
61
>
62
62
> Safe Links supports only HTTP(S) and FTP formats.
63
63
>
64
-
> Although Safe Links no longer wraps URLs pointing to SharePoint sites, SharePoint URLs are still processed by Safe Links. This change improves the performance of loading SharePoint URLs without degrading protection.
64
+
> Safe Links no longer wraps URLs pointing to SharePoint sites. SharePoint URLs are still processed by the Safe Links service. This change doesn't cause a degradation in the protection a tenant receives. It's intended to improve the performance of loading SharePoint URLs.
65
65
>
66
66
> Using another service to wrap links before Defender for Office 365 might prevent Safe Links from process links, including wrapping, detonating, or otherwise validating the "maliciousness" of the link.
Copy file name to clipboardExpand all lines: defender-xdr/custom-detection-rules.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,6 +149,7 @@ You can run a query continuously as long as:
149
149
- The query references one table only.
150
150
- The query uses an operator from the list of supported KQL operators. **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**
151
151
- The query doesn't use joins, unions, or the `externaldata` operator.
152
+
- The query doesn't include any comments line/information.
152
153
153
154
###### Tables that support Continuous (NRT) frequency
0 commit comments