You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure-mam.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- mde-android
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
-
ms.date: 07/25/2024
17
+
ms.date: 08/08/2024
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -124,14 +124,14 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
124
124
125
125
1. Sign in to a managed application, for example, Outlook. The device is registered and the application protection policy is synchronized to the device. The application protection policy recognizes the device's health state.
126
126
127
-
2. Select **Continue**. A screen is presented which recommends downloading and setting up of Microsoft Defender for Endpoint on Android app.
127
+
2. Select **Continue**. A screen is presented which recommends downloading and setting up of the Microsoft Defender: Antivirus (Mobile) app.
128
128
129
129
3. Select **Download**. You'll be redirected to the app store (Google play).
130
130
131
-
4. Install the Microsoft Defender for Endpoint (Mobile) app and launch back Managed app onboarding screen.
132
-
133
-
:::image type="content" source="media/download-mde.png" alt-text="The illustrative pages that contain the procedure of downloading MDE and launching back the app-onboarding screen." lightbox="media/download-mde.png":::
131
+
4. Install the Microsoft Defender: Antivirus (Mobile) app and go back to the managed app onboarding screen.
134
132
133
+
:::image type="content" source="media/mam-flow.png" alt-text="Shows the procedure of downloading Microsoft Defender: Antivirus (Mobile) app." lightbox="media/mam-flow.png":::
134
+
135
135
5. Click **Continue > Launch**. The Microsoft Defender for Endpoint app onboarding/activation flow is initiated. Follow the steps to complete onboarding. You'll automatically be redirected back to Managed app onboarding screen, which now indicates that the device is healthy.
136
136
137
137
6. Select **Continue** to log into the managed application.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+14-38Lines changed: 14 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,36 +61,32 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
61
61
62
62
1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
63
63
64
-
> [!div class="mx-imgBorder"]
65
-
> 
66
-
64
+
> [!div class="mx-imgBorder"]
67
65
1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
68
66
69
-
> [!div class="mx-imgBorder"]
70
-
> 
71
-
67
+
> [!div class="mx-imgBorder"]
68
+
> 
69
+
72
70
1. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'1'** to enable Network Protection. (Network protection is disabled by default)
73
71
74
-
> [!div class="mx-imgBorder"]
75
-
> 
76
-
77
-
> [!div class="mx-imgBorder"]
78
-
> 
79
-
72
+
> [!div class="mx-imgBorder"]
73
+
> 
74
+
75
+
> [!div class="mx-imgBorder"]
76
+
> 
77
+
80
78
1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
81
79
82
80
To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.
83
81
84
82
**Example of Thumbprint format to add**: `50 30 06 09 1d 97 d4 f5 ae 39 f7 cb e7 92 7d 7d 65 2d 34 31, 503006091d97d4f5ae39f7cbe7927d7d652d3431`
85
83
86
-
> [!IMPORTANT]
84
+
> [!IMPORTANT]
87
85
> Certificate SHA-1 Thumbprint characters should be with either white space separated, or non separated.
88
86
>
89
87
> This format is invalid: `50:30:06:09:1d:97:d4:f5:ae:39:f7:cb:e7:92:7d:7d:65:2d:34:31`
90
88
91
-
Any other separation characters are invalid.
92
-
93
-
> 
89
+
Any other separation characters are invalid.
94
90
95
91
1. For other configurations related to Network protection, add the following keys and appropriate corresponding value.
96
92
@@ -119,26 +115,6 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
119
115
120
116
> [!NOTE]
121
117
> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
122
-
123
-
## Configure Low Touch Onboarding
124
-
125
-
Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is simply required to provide a reduced set of permissions to complete onboarding.
126
-
127
-
Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:
128
-
129
-
1. Push the Defender app to target user group by following these [steps](android-intune.md#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app).
130
-
2. Push a VPN profile to the user's device by following the instructions [here](android-intune.md#auto-setup-of-always-on-vpn).
131
-
3. In Apps > Application configuration policies, select Managed Devices.
132
-
4. Provide a name to uniquely identify the policy. Select 'Android Enterprise' as the Platform, the required Profile type and 'Microsoft Defender: Antivirus' as the targeted app. Click on Next.
133
-
5. Add runtime permissions. Select Location access (fine)(This permission is not supported for Android 13 and above), POST_NOTIFICATIONS and change the Permission state to 'Auto grant'.
134
-
6. Under configuration settings, select 'Use Configuration designer' and click on Add.
135
-
7. Select Low touch onboarding and User UPN. For User UPN, change the Value type to 'Variable' and Configuration value to 'User Principal Name' from the drop down Enable Low touch onboarding by changing the configuration value to 1.
136
-
>[!div class="mx-imgBorder"]
137
-
>
138
-
139
-
8. Assign the policy to the target user group.
140
-
9. Review and create the policy.
141
-
142
118
## Privacy Controls
143
119
144
120
Following privacy controls are available for configuring the data that is sent by Defender for Endpoint from Android devices:
@@ -347,11 +323,11 @@ Use the following steps to configure the Device tags:
347
323
5. Click Next and assign this policy to targeted devices and users.
348
324
349
325
350
-
> [!NOTE]
326
+
> [!NOTE]
351
327
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
352
-
353
328
## Related articles
354
329
355
330
-[Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)
331
+
356
332
-[Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
357
333
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
"description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.",
100
-
"severity": "Medium",
101
-
"cvssV3": 4.3,
97
+
"id": "CVE-2024-7256",
98
+
"name": "CVE-2024-7256",
99
+
"description": "Summary: Google Chrome is vulnerable to a security bypass due to insufficient data validation in Dawn. An attacker can exploit this vulnerability by tricking a user into visiting a malicious website, allowing them to bypass security restrictions. Impact: If successfully exploited, this vulnerability could allow a remote attacker to bypass security restrictions in Google Chrome. Remediation: Apply the latest patches and updates provided by the respective vendors. Generated by AI",
Copy file name to clipboardExpand all lines: defender-endpoint/api/vulnerability.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,5 +64,7 @@ exploitInKit|Boolean|Exploit is part of an exploit kit
64
64
exploitTypes|String collection|Exploit affect. Possible values are: **Local privilege escalation**, **Denial of service**, or **Local**
65
65
exploitUris|String collection|Exploit source URLs
66
66
CveSupportability| String collection| Possible values are: **Supported**, **Not Supported**, or **SupportedInPremium**
67
+
EPSS|Numeric| Represents the probability that a vulnerability will be exploited. This probability is expressed as a number between 0 and 1 (0%-100%) according to the EPSS model.
68
+
67
69
68
70
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]
# Onboard Windows devices to Defender for Endpoint using Intune
@@ -65,31 +65,39 @@ For security reasons, the package used to Offboard devices will expire 7 days af
65
65
> [!NOTE]
66
66
> Onboarding and offboarding policies must not be deployed on the same device at the same time, otherwise this will cause unpredictable collisions.
67
67
68
-
1. Get the offboarding package from <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>:
68
+
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com) as follows:
69
69
70
-
2. In the navigation pane, select **Settings**\>**Endpoints**\>**Device management**\>**Offboarding**.
70
+
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Device management**\>**Offboarding**.
71
71
72
-
3. Select Windows 10 or Windows 11 as the operating system.
72
+
2. Select **Windows 10 or Windows 11** as the operating system.
73
73
74
-
4. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
74
+
3. In the **Deployment method** field, select **Mobile Device Management / Microsoft Intune**.
75
75
76
-
5. Click **Download package**, and save the .zip file.
76
+
4. Click **Download package**, and save the .zip file.
77
77
78
-
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named *WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding*.
78
+
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the network administrators who will deploy the package. You should have a file named `WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding`.
79
79
80
-
3.Use the Microsoft Intune custom configuration policy to deploy the following supported OMA-URI settings.
80
+
3.In Microsoft Intune admin center, create a custom configuration policy.
- Value: *Copy and paste the value from the content of the WindowsDefenderATP_valid_until_YYYY-MM-DD.offboarding file*
92
+
7. Make the appropriate group assignments, applicability rules, and on the **Review + create** step, click the **Create** button to finish the policy.
85
93
86
94
For more information on Microsoft Intune policy settings, see [Windows 10 policy settings in Microsoft Intune](/mem/intune/configuration/custom-settings-windows-10).
87
95
88
96
> [!NOTE]
89
97
> The **Health Status for offboarded devices** policy uses read-only properties and can't be remediated.
90
98
91
99
> [!IMPORTANT]
92
-
> Offboarding causes the device to stop sending sensor data to the portal but data from the device, including reference to any alerts it has had will be retained for up to 6 months.
100
+
> Offboarding causes the device to stop sending sensor data to Defender for Endpoint, but data from the device, including references to any alerts it has, is retained for up to 6 months.
Copy file name to clipboardExpand all lines: defender-endpoint/data-storage-privacy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- essentials-compliance
17
17
ms.topic: conceptual
18
18
search.appverid: met150
19
-
ms.date: 05/14/2024
19
+
ms.date: 08/12/2024
20
20
---
21
21
22
22
# Microsoft Defender for Endpoint data storage and privacy
@@ -63,7 +63,7 @@ In all scenarios, data is encrypted using 256-bit [AES encryption](https://en.wi
63
63
64
64
## Data storage location
65
65
66
-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, or Switzerland. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
66
+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
67
67
68
68
Customer data in pseudonymized form may also be stored in the central storage and processing systems in the United States.
0 commit comments