Skip to content

Commit c663f88

Browse files
authored
Merge branch 'main' into repo_sync_working_branch
2 parents 1485ba7 + 2b44776 commit c663f88

File tree

3 files changed

+31
-18
lines changed

3 files changed

+31
-18
lines changed

defender-endpoint/device-control-policies.md

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Device control policies in Microsoft Defender for Endpoint
33
description: Learn about Device control policies in Defender for Endpoint
4-
author: siosulli
5-
ms.author: siosulli
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 09/13/2024
7+
ms.date: 09/18/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -73,7 +73,7 @@ Device control policies can be applied to users and/or user groups.
7373
> [!NOTE]
7474
> In the articles related to device control, groups of users are referred to as <i>user groups</i>. The term <i>groups</i> refer to [groups](#groups) defined in the device control policy.
7575
76-
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
76+
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
7777

7878
On Windows, a user or user group can be a condition on an [entry](#entries) in a policy.
7979

@@ -198,15 +198,29 @@ Device control policies define access (called an entry) for a set of devices. En
198198
| Action | Allow <br/> Deny <br/> AuditAllow <br/> AuditDeny |
199199
| Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> |
200200

201-
If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
201+
### Entry evaluation
202+
203+
There are two types of entries: enforcement entries (Allow/Deny) and audit entries (AuditAllow/AuditDeny).
204+
205+
Enforcement entries for a rule are evaluated in order until all of the requested permissions have been matched. If no entries match a rule, then the next rule is evaluated. If no rules match, then the default is applied.
206+
207+
### Audit entries
208+
209+
Audit events control the behavior when device control enforces a rule (allow/deny). Device control can display a notification to the end-user. The user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
210+
211+
Device control can also create an event that is available in Advanced Hunting.
212+
213+
> [!IMPORTANT]
214+
> There is a limit of 300 events per device per day. Audit entries are processed after the enforcement decision has been made. All corresponding audit entries are evaluated.
215+
216+
### Conditions
202217

203218
An entry supports the following optional conditions:
204219

205220
- User/User Group Condition: Applies the action only to the user/user group identified by the SID
206221

207222
> [!NOTE]
208-
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored localy, use the Security Identifier (SID)
209-
223+
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored locally, use the Security Identifier (SID)
210224
> [!NOTE]
211225
> On Windows, The SID of the user who's signed in can be retrieved by running the PowerShell command `whoami /user`.
212226

defender-endpoint/hardware-acceleration-and-mdav.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
---
22
title: Hardware acceleration and Microsoft Defender Antivirus.
33
description: How Microsoft Defender Antivirus incorporates hardware acceleration and Microsoft Defender Antivirus.
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7+
ms.reviewer: yongrhee
78
ms.service: defender-endpoint
89
ms.topic: overview
9-
ms.date: 02/26/2024
10+
ms.date: 09/18/2024
1011
ms.subservice: ngp
1112
ms.localizationpriority: medium
1213
ms.custom: partner-contribution
@@ -19,10 +20,6 @@ audience: ITPro
1920

2021
**Applies to:**
2122

22-
- [Microsoft Defender XDR](/defender-xdr)
23-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
24-
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2623
- Microsoft Defender Antivirus
2724
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
2825

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Supported Microsoft Defender for Endpoint capabilities by platform
33
description: Get to know the Microsoft Defender for Endpoint capabilities supported for Windows 10 devices, servers, and non-Windows devices.
44
ms.service: defender-endpoint
5-
ms.author: siosulli
6-
author: siosulli
5+
ms.author: deniseb
6+
author: denisebmsft
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 07/17/2024
16+
ms.date: 09/18/2024
1717
---
1818

1919
# Supported Microsoft Defender for Endpoint capabilities by platform
@@ -58,7 +58,7 @@ The following table gives information about the supported Microsoft Defender for
5858
|[Device response capabilities: collect investigation package ](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> |
5959
|[Device response capabilities: run antivirus scan](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
6060
|[Device isolation](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
61-
|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
61+
|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) <sup>[6]</sup> | ![Yes.](media/svg/check-yes.svg) <sup>[6]</sup> |
6262
|[Live Response](live-response.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
6363

6464
<sup>[1]</sup> Refers to the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
@@ -71,6 +71,8 @@ The following table gives information about the supported Microsoft Defender for
7171

7272
<sup>[5]</sup> Endpoint & network device discovery is supported on Windows Server 2019 or later, Windows 10, and Windows 11
7373

74+
<sup>[6]</sup> Collect file feature is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview)). Currently does not support "Deep analysis" or "Block file, stop, and quarantine process".
75+
7476
> [!NOTE]
7577
> Windows 7, 8.1, Windows Server 2008 R2 include support for the EDR sensor, and antivirus using System Center Endpoint Protection (SCEP).
7678

0 commit comments

Comments
 (0)