Skip to content

Commit c66116b

Browse files
Merge pull request #422 from MicrosoftDocs/main
merge main to live 10:30 AM 5/14/24
2 parents 45813a1 + b93409a commit c66116b

File tree

5 files changed

+70
-32
lines changed

5 files changed

+70
-32
lines changed

defender-endpoint/configure-device-connectivity.md

Lines changed: 29 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
3-
description: Learn how to use a streamlined domain or static IP ranges during onboarding when connecting devices to Microsoft Defender for Endpoint
3+
description: Learn how to use a streamlined domain or static IP ranges during onboarding when connecting devices to Microsoft Defender for Endpoint.
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
@@ -27,7 +27,7 @@ ms.date: 05/13/2024
2727
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2828
- [Microsoft Defender XDR](/defender-xdr)
2929

30-
The Microsoft Defender for Endpoint service may require the use of proxy configurations to report diagnostic data and communicate data to the service. Prior to the availability of the streamlined connectivity method, other URLs were required and Defender for Endpoint static IP ranges weren't supported. For more information on preparing your environment, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
30+
The Microsoft Defender for Endpoint service might require the use of proxy configurations to report diagnostic data and communicate data to the service. Prior to the availability of the streamlined connectivity method, other URLs were required and Defender for Endpoint static IP ranges weren't supported. For more information on preparing your environment, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
3131

3232
This article describes the streamlined device connectivity method and how to onboard new devices to use a simpler deployment and management of Defender for Endpoint cloud connectivity services. For more information on migrating previously onboarded devices, see [Migrating devices to streamlined connectivity](migrate-devices-streamlined.md).
3333

@@ -44,17 +44,17 @@ The Defender for Endpoint-recognized simplified domain: `*.endpoint.security.mic
4444
To support network devices without hostname resolution or wildcard support, you can alternatively configure connectivity using dedicated Defender for Endpoint static IP ranges. For more information, see [Configure connectivity using static IP ranges](#option-2-configure-connectivity-using-static-ip-ranges).
4545

4646
> [!NOTE]
47-
> - The simplified connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
48-
> - There currently is no plan to deprecate the old, consolidated service URLs. Devices onboarded with "standard" connectivity will continue to function. It is important to ensure connectivity to *.endpoint.security.microsoft.com is and remains possible, as future services will require it. This new URL is included in all required URL lists.
47+
> - The streamlined connectivity method will **not change how Microsoft Defender for Endpoint functions on a device nor will it change the end-user experience**. Only the URLs or IPs that a device uses to connect to the service will change.
48+
> - There currently is no plan to deprecate the old, consolidated service URLs. Devices onboarded with "standard" connectivity will continue to function. It is important to ensure connectivity to `*.endpoint.security.microsoft.com` is and remains possible, as future services will require it. This new URL is included in all required URL lists.
4949
5050
## Consolidated services
5151

52-
The following Defender for Endpoint URLs consolidated under the streamlined domain should no longer be required for connectivity if `*.endpoint.security.microsoft.com` is allowed and devices are onboarded using the streamlined onboarding package. You will need to maintain connectivity with other required services not consolidated that are relevant to your organization (for example, CRL, SmartScreen/Network Protection, and Windows Update).
52+
The following Defender for Endpoint URLs consolidated under the simplified domain should no longer be required for connectivity if `*.endpoint.security.microsoft.com` is allowed and devices are onboarded using the streamlined onboarding package. You need to maintain connectivity with other required services not consolidated that are relevant to your organization (for example, CRL, SmartScreen/Network Protection, and Windows Update).
5353

54-
For the updated list of required URLs, see [Download the spreadsheet here](https://aka.ms/MDE-streamlined-urls).
54+
For the updated list of required URLs, see [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
5555

5656
> [!IMPORTANT]
57-
> If you are configuring using IP ranges, you will need to separately configure the EDR cyberdata service. This service is not consolidated on an IP level. See section below for more details.
57+
> If you are configuring using IP ranges, you will need to separately configure the EDR cyberdata service. This service is not consolidated on an IP level.
5858
5959
| Category | Consolidated URLs |
6060
|------------|---------------|
@@ -85,9 +85,9 @@ Devices must meet specific prerequisites to use the streamlined connectivity met
8585

8686
**Microsoft Defender Antivirus versions (Windows)**
8787

88-
- **Antimalware Client:** 4.18.2211.5
89-
- **Engine:** 1.1.19900.2
90-
- **Antivirus (Security Intelligence):** 1.391.345.0
88+
- **Antimalware Client:** `4.18.2211.5`
89+
- **Engine:** `1.1.19900.2`
90+
- **Antivirus (Security Intelligence):** `1.391.345.0`
9191

9292
**Defender Antivirus versions (macOS/Linux)**
9393

@@ -132,7 +132,7 @@ The following illustration shows the streamlined connectivity process and the co
132132

133133
Once you confirm prerequisites are met, ensure your network environment is properly configured to support the streamlined connectivity method. Follow the steps outlined in [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
134134

135-
Defender for Endpoint services consolidated under the simplified method should no longer be required for connectivity. However, some URLs aren't included in the consolidation.
135+
Defender for Endpoint service URLs consolidated under simplified domain should no longer be required for connectivity. However, some URLs aren't included in the consolidation.
136136

137137
Streamlined connectivity allows you to use the following option to configure cloud connectivity:
138138

@@ -157,12 +157,12 @@ With streamlined connectivity, IP-based solutions can be used as an alternative
157157
> [!IMPORTANT]
158158
> The EDR Cyber data service must be configured separately if you are using the IP method (this service is only consolidated on a URL level).You must also maintain connectivity with other required services including SmartScreen, CRL, Windows Update, and other services.<br/>
159159
160-
In order to stay up to date on IP ranges, it is recommended to refer to the following Azure service tags for Microsoft Defender for Endpoint services. The latest IP ranges will always be found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
160+
In order to stay up to date on IP ranges, it's recommended to refer to the following Azure service tags for Microsoft Defender for Endpoint services. The latest IP ranges are found in the service tag. For more information, see [Azure IP ranges](https://azureipranges.azurewebsites.net/).
161161

162162
| Service tag name | Defender for Endpoint services included |
163163
|:---|:---|
164164
| MicrosoftDefenderForEndpoint | MAPS, Malware Sample Submission Storage, Auto-IR Sample Storage, Command and Control. |
165-
| OneDsCollector | EDR Cyberdata <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and may include diagnostic data traffic for other Microsoft services. |
165+
| OneDsCollector | EDR Cyberdata <br/><br/> Note: The traffic under this service tag isn't limited to Defender for Endpoint and can include diagnostic data traffic for other Microsoft services. |
166166

167167
The following table lists the current static IP ranges. For latest list, refer to the Azure service tags.
168168

@@ -193,7 +193,7 @@ To test streamlined connectivity for devices not yet onboarded to Defender for E
193193

194194
- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.
195195

196-
As a supplementary check, you can also use the client analyzer to test whether a device meets pre-requisites: https://aka.ms/BetaMDEAnalyzer
196+
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/BetaMDEAnalyzer
197197

198198

199199
> [!NOTE]
@@ -203,34 +203,37 @@ As a supplementary check, you can also use the client analyzer to test whether a
203203

204204
Once you configure your network to communicate with the full list of services, you can begin onboarding devices using the streamlined method.
205205

206-
Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and have updated the sensor and Microsoft Defender Antivirus versions.
206+
Before proceeding, confirm devices meet the [prerequisites](#prerequisites) and have updated sensor and Microsoft Defender Antivirus versions.
207207

208208

209-
To get the new package, in Microsoft Defender XDR, select **Settings > Endpoints > Device management> Onboarding**.
209+
1. To get the new package, in Microsoft Defender XDR, select **Settings > Endpoints > Device management> Onboarding**.
210210

211+
2. Select the applicable operating system and choose "Streamlined" from the Connectivity type dropdown menu.
211212

212-
Select the applicable operating system and choose "Streamlined (preview)" from the Connectivity type dropdown menu.
213-
214-
For new devices (not onboarded to Defender for Endpoint) supported under this method, follow onboarding steps from previous sections using the updated onboarded package with your preferred deployment method:
213+
3. For new devices (not onboarded to Defender for Endpoint) supported under this method, follow onboarding steps from previous sections using the updated onboarded package with your preferred deployment method:
215214

216215
- [Onboard Windows Client](onboard-windows-client.md)
217216
- [Onboard Windows Server](configure-server-endpoints.md)
218217
- [Onboard non-Windows devices](configure-endpoints-non-windows.md)
219218
- [Run a detection test on a device to verify it has been properly onboarded to Microsoft Defender for Endpoint](run-detection-test.md)
220219

221220

222-
Exclude devices from any existing onboarding policies that use the standard onboarding package.
221+
4. Exclude devices from any existing onboarding policies that use the standard onboarding package.
223222

224223
For migrating devices already onboarded to Defender for Endpoint, see [Migrating devices to the streamlined connectivity](migrate-devices-streamlined.md). You must reboot your device and follow specific guidance here.
225224

226-
:::image type="content" source="media/migrate-devices-streamlined.png" alt-text="Screenshot of onboarding page with streamlined connectivity":::
225+
### Stage 5. Set the default onboarding package to streamlined connectivity
227226

228-
When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**). For onboarding through Intune & Microsoft Defender for Cloud, you will need to activate the relevant option. Devices already onboarded will not automatically re-onboard; you will need to create a new policy in Intune, where it is recommended to first assign the policy to a set of test devices to verify connectivity is successful, before expanding the audience. Devices in Defender for Cloud can be re-onboarded using the relevant onboarding script.
227+
When you're ready to set the default onboarding package to streamlined, you can turn on the following Advanced Feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**).
229228

230-
> [!NOTE]
231-
> Before moving forward with this option, validate that your environment is ready and all devices meet prerequisites.
229+
<img width="593" alt="image" src="https://github.com/MicrosoftDocs/defender-docs-pr/assets/30799281/3509aeec-bbab-4efd-a328-0608a11cc6d1">
230+
231+
This setting sets the default onboarding package to 'streamlined' for applicable operating systems. You can still use the standard onboarding package within the onboarding page but you must specifically select it in the drop-down.
232232

233+
For onboarding through Intune & Microsoft Defender for Cloud, you need to activate the relevant option. Devices already onboarded don't automatically reonboard; you need to create a new policy in Intune, where it's recommended to first assign the policy to a set of test devices to verify connectivity is successful, before expanding the audience. Devices in Defender for Cloud can be reonboarded using the relevant onboarding script.
234+
235+
> [!NOTE]
236+
> - Only tenants created on or before May 8th, 2024 have the option to switch between standard and streamlined connectivity. Newer tenants will only support streamlined connectivity.
237+
> - Before moving forward with this option, validate that your environment is ready and all devices meet prerequisites.
233238
234-
:::image type="content" source="media/advanced-setting-streamlined-connectivity.png" alt-text="Screenshot of advanced settings page with streamlined connectivity option":::
235239

236-
This setting sets the default onboarding package to *streamlined* for applicable operating systems. You can still use the standard onboarding package within the onboarding page, but you must specifically select it in the drop-down.

defender-office-365/safe-links-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Safe Links protection by Safe Links policies is available in the following locat
6161
>
6262
> Safe Links supports only HTTP(S) and FTP formats.
6363
>
64-
> Although Safe Links no longer wraps URLs pointing to SharePoint sites, SharePoint URLs are still processed by Safe Links. This change improves the performance of loading SharePoint URLs without degrading protection.
64+
> Safe Links no longer wraps URLs pointing to SharePoint sites. SharePoint URLs are still processed by the Safe Links service. This change doesn't cause a degradation in the protection a tenant receives. It's intended to improve the performance of loading SharePoint URLs.
6565
>
6666
> Using another service to wrap links before Defender for Office 365 might prevent Safe Links from process links, including wrapping, detonating, or otherwise validating the "maliciousness" of the link.
6767

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,13 +32,45 @@ This article provides information on inaccuracies that have been reported. You c
3232
3333
The following tables present the relevant vulnerability information organized by month:
3434

35+
## May 2024
36+
37+
| Inaccuracy report ID | Description | Fix date |
38+
|---|---|---|
39+
| - | Fixed inaccuracy in Microsoft Visual Studio Code | 06-May-24 |
40+
| - | Added Microsoft Defender Vulnerability Management support to NextGen Mirth Connect | 08-May-24 |
41+
| 54538 | Fixed inaccuracy in Pippo product | 08-May-24 |
42+
| - | Fixed inaccuracy in FortiClient Endpoint Management | 08-May-24 |
43+
44+
## April 2024
45+
46+
| Inaccuracy report ID | Description | Fix date |
47+
|---|---|---|
48+
| 46816 | Fixed inaccuracy in Telerik Progress | 01-Apr-24 |
49+
| - | Fixed inaccuracy in CVE-2024-28916 | 01-Apr-24 |
50+
| - | Fixed inaccuracies in OpenSSL invalid file detections | 01-Apr-24 |
51+
| 48792 | Fixed inaccuracy in CVE-2023-4895 | 02-Apr-24 |
52+
| - | Fixed invalid version detections in Anydesk | 02-Apr-24 |
53+
| 50593 | Fixed inaccuracy in CVE-2023-6237 | 02-Apr-24 |
54+
| - | Defender Vulnerability Management doesn't currently support CVE-2024-27088 | 02-Apr-24 |
55+
| 44989 | Fixed inaccuracy in Ubuntu & Debian Samba | 03-Apr-24 |
56+
| 49233 | Fixed inaccuracy in Suse Kernel-devel | 03-Apr-24 |
57+
| 35636 | Fixed inaccuracy in Azul Zulu | 08-Apr-24 |
58+
| 48792 | Fixed inaccuracy in CVE-2021-32823 | 09-Apr-24 |
59+
| 53310 | Fixed inaccuracy in CVE-2020-8284 | 14-Apr-24 |
60+
| 53315 | Defender Vulnerability Management doesn't currently support ThinkPad P14S Gen3 | 15-Apr-24 |
61+
| 49836 | Fixed inaccuracies in OpenEdge invalid file detections | 15-Apr-24 |
62+
| 48996 | Fixed inaccuracy in Connectwise ScreenConnect Client | 16-Apr-24 |
63+
| - | Fixed inaccurate product considerations in Apple | 16-Apr-24 |
64+
| 49565 | Fixed inaccuracy in GitHub vulnerabilities - CVE-2012-2055 and CVE-2024-0727 | 16-Apr-24 |
65+
3566
## March 2024
3667

3768
| Inaccuracy report ID | Description | Fix date |
3869
|---|---|---|
3970
| - | Defender Vulnerability Management doesn't currently support CVE-2023-4966 | 05-Mar-24 |
4071
| 47296 | Defender Vulnerability Management doesn't currently support Bitdefender Vulnerabilities - CVE-2017-17408, CVE-2017-17409 & CVE-2017-17410 | 05-Mar-24 |
4172
| 45748 | Fixed inaccuracy in Zscaler Client Connector | 14-Mar-24 |
73+
| - | Fixed inaccuracies in Weblogic Server invalid file detections | 19-Mar-24 |
4274
| 49672 | Fixed inaccuracy in CVE-2024-0819 | 20-Mar-24 |
4375
| 30583 | Fixed inaccuracy in Opera Browser | 21-Mar-24 |
4476
| - | Fixed inaccuracy in Autodesk Civil 3D and Anydesk | 21-Mar-24 |
@@ -52,6 +84,8 @@ The following tables present the relevant vulnerability information organized by
5284
| 46021 | Defender Vulnerability Management doesn't currently support CVE-2023-6129 | 26-Mar-24 |
5385
| - | Fixed inaccuracy in Ultraedit | 26-Mar-24 |
5486
| - | Defender Vulnerability Management doesn't currently support CVE-2023-47248 | 26-Mar-24 |
87+
| - | Fixed inaccuracy in CVE-2024-20337 | 26-Mar-24 |
88+
| - | Fixed inaccuracy in Python | 26-Mar-24 |
5589
| - | Fixed inaccuracy in Mitel 6920 & 6930 Firmwares | 31-Mar-24 |
5690

5791
## February 2024

defender-xdr/custom-detection-rules.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -149,6 +149,7 @@ You can run a query continuously as long as:
149149
- The query references one table only.
150150
- The query uses an operator from the list of supported KQL operators. **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**
151151
- The query doesn't use joins, unions, or the `externaldata` operator.
152+
- The query doesn't include any comments line/information.
152153

153154
###### Tables that support Continuous (NRT) frequency
154155

0 commit comments

Comments
 (0)