Skip to content

Commit c85c49c

Browse files
authored
Merge branch 'main' into dhagarwal_working
2 parents bc84840 + 3ca1513 commit c85c49c

22 files changed

+245
-152
lines changed

defender-endpoint/ios-install.md

Lines changed: 148 additions & 97 deletions
Large diffs are not rendered by default.

defender-endpoint/ios-whatsnew.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: What's new in Microsoft Defender for Endpoint on iOS
33
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on iOS.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 03/14/2025
9+
ms.date: 03/28/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -161,7 +161,7 @@ On January 25, 2022, we announced the general availability of Vulnerability mana
161161
## 1.1.28250101
162162

163163
- **Integration with Tunnel** - Microsoft Defender for Endpoint on iOS can now integrate with Microsoft Tunnel, a VPN gateway solution to enable security and connectivity in a single app. For more information, see [Microsoft Tunnel Overview](/mem/intune/protect/microsoft-tunnel-overview).
164-
- **Zero-touch onboard for enrolled iOS devices** enrolled through Microsoft Intune is generally available. For more information, see [Zero touch onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint).
164+
- **Zero-touch onboard for enrolled iOS devices** enrolled through Microsoft Intune is generally available. For more information, see [Zero touch onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-to-defender-for-endpoint).
165165
- Bug fixes.
166166

167167
## 1.1.24210103
@@ -172,7 +172,7 @@ On January 25, 2022, we announced the general availability of Vulnerability mana
172172
## 1.1.23250104
173173

174174
- Performance optimizations - Test battery performance with this version and let us know your feedback.
175-
- **Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboards for devices enrolled through Microsoft Intune has been added. For more information, see this [Zero-touch (Silent) onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint).
175+
- **Zero-touch onboard for enrolled iOS devices** - With this version, the preview of Zero-touch onboards for devices enrolled through Microsoft Intune has been added. For more information, see this [Zero-touch (Silent) onboarding of Microsoft Defender for Endpoint](ios-install.md#zero-touch-silent-onboarding-to-defender-for-endpoint).
176176
- **Privacy Controls** - Configure privacy controls for phish alert report. For more information, see [Configure iOS features](ios-configure-features.md).
177177

178178
## 1.1.23010101

defender-endpoint/linux-exclusions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 02/21/2025
18+
ms.date: 03/28/2025
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -52,7 +52,7 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
5252
5353
| Exclusion Category | Exclusion Scope | Description |
5454
| --- | --- | --- |
55-
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus scans and on-demand scans.|
55+
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes events from on-demand scans, real-time protection (RTP), and behavior monitoring (BM).|
5656
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)* | Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
5757

5858
> [!IMPORTANT]

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-linux
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 02/07/2025
18+
ms.date: 03/28/2025
1919
---
2020

2121
# Configure offline security intelligence update for Microsoft Defender for Endpoint on Linux
@@ -165,15 +165,16 @@ To manually execute the downloader script, configure the parameters in the `sett
165165

166166
Once the script is executed, the latest signatures get downloaded to the folder configured in the `settings.json` file (`updates.zip`).
167167

168-
Once the signatures zip is downloaded, the mirror server can be used to host it. The mirror server can be hosted using any of the HTTP/HTTPS/network share servers.
168+
Once the signatures zip is downloaded, the mirror server can be used to host it. The mirror server can be hosted using any of the HTTP/HTTPS/network share servers, or a local/remote mount point.
169169

170170
Once hosted, copy the absolute path of the hosted server (up to and not including the `arch_*` directory).
171171

172-
For example, if the script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, the corresponding URI is: `www.example.server.com:8000/linux/production/`.
173-
174-
We can also use the absolute path of directory (local/remote mount point) like `/tmp/wdav-update/linux/production`.
172+
> [!NOTE]
173+
> For example, if the downloader script is executed with `downloadFolder=/tmp/wdav-update`, and the HTTP server (`www.example.server.com:8000`) is hosting the `/tmp/wdav-update` path, then the corresponding URI is: `www.example.server.com:8000/linux/production/` (verify that this within this directory, there are the `arch_*` directories).
174+
>
175+
> We can also use the absolute path of directory (local/remote mount point). For example, if the files were downloaded by the script into a directory `/tmp/wdav-update`, then the corresponding URI is:`/tmp/wdav-update/linux/production`.
175176
176-
Once the mirror server is set up, we need to propagate this URL to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
177+
Once the mirror server is set up, we need to propagate this URI to the Linux endpoints as the `offlineDefinitionUpdateUrl` in the Managed Configuration as described in the next section.
177178

178179
## Configure the endpoints
179180

@@ -200,7 +201,7 @@ Use the following sample `mdatp_managed.json` and update the parameters as per t
200201
|-------------------------------------------|----------------------|-----------------------------------------------------|
201202
| `automaticDefinitionUpdateEnabled` | `True`/`False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
202203
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
203-
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the mirror server setup. This can be either in terms of the remote server URL or a directory (local/remote mount point). |
204+
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the mirror server setup. This can be either in terms of the remote server URL or a directory (local/remote mount point). See the previous section for information about how to specify this path.|
204205
| `offlineDefinitionUpdate` | `enabled`/`disabled` | When set to `enabled`, the "offline security intelligence update" feature is enabled, and vice versa. |
205206
| `offlineDefinitionUpdateFallbackToCloud` | `True`/`False` | Determine Defender for Endpoint security intelligence update approach when "offline mirror server" fails to serve the update request. If set to `true`, the update is retried via the Microsoft cloud when "offline security intelligence update" failed; else, vice versa. |
206207
| `offlineDefinitionUpdateVerifySig` | `enabled`/`disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints; else, vice versa. |
58.1 KB
Loading
41.9 KB
Loading

defender-endpoint/mtd.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ ms.reviewer: tdoucette, sunasing, denishdonga
44
description: Overview of Mobile Threat Defense in Microsoft Defender for Endpoint
55
ms.service: defender-endpoint
66
ms.subservice: onboard
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: ewalsh
8+
author: emmwalshh
99
ms.localizationpriority: medium
10-
ms.date: 03/10/2025
10+
ms.date: 03/28/2025
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -109,7 +109,7 @@ iOS Dedicated/shared/kiosk device enrollment isn't supported.
109109

110110
### End-user onboarding
111111

112-
- [Configure Zero-touch onboard for iOS enrolled devices](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint): Admins can configure zero-touch install to silently onboard Microsoft Defender for Endpoint on enrolled iOS devices without requiring the user to open the app.
112+
- [Configure Zero-touch onboard for iOS enrolled devices](ios-install.md#zero-touch-silent-onboarding-to-defender-for-endpoint): Admins can configure zero-touch install to silently onboard Microsoft Defender for Endpoint on enrolled iOS devices without requiring the user to open the app.
113113

114114
- [Configure Conditional Access to enforce user onboarding](android-configure.md#conditional-access-with-defender-for-endpoint-on-android): This can be applied to ensure end-users onboard to the Microsoft Defender for Endpoint app after deploying. Watch this video for a quick demo on configuring conditional access with Defender for Endpoint risk signals.
115115

@@ -119,7 +119,7 @@ iOS Dedicated/shared/kiosk device enrollment isn't supported.
119119
120120
### Simplify Onboarding
121121

122-
- [iOS - Zero-Touch Onboard](ios-install.md#zero-touch-silent-onboarding-of-microsoft-defender-for-endpoint)
122+
- [iOS - Zero-Touch Onboard](ios-install.md#zero-touch-silent-onboarding-to-defender-for-endpoint)
123123
- [Android Enterprise - Setup Always-on VPN](android-intune.md#auto-setup-of-always-on-vpn).
124124
- [iOS - Auto-setup of VPN profile](ios-install.md#auto-onboarding-of-vpn-profile-simplified-onboarding)
125125

defender-vulnerability-management/tvm-exception.md

Lines changed: 10 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- Tier1
13-
ms.topic: conceptual
13+
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 03/04/2022
15+
ms.date: 03/21/2025
1616
---
1717

1818
# Create and view exceptions for security recommendations
@@ -39,37 +39,21 @@ Only users with "exceptions handling" permissions can manage exceptions (includi
3939

4040
## Create an exception
4141

42-
Select a security recommendation you would like to create an exception for, and then select **Exception options** and fill out the form.
42+
Navigate to Recommendations page in the Microsoft Defender portal. By default, the page shows all recommendations filtered to all device groups. To view recommendations for a specific device group, select the device group from the filter dropdown list.
4343

44-
![Showing where the button for "exception options" is location in a security recommendation flyout.](/defender/media/defender-vulnerability-management/tvm-exception-options.png)
44+
:::image type="content" alt-text="Screenshot highlighting the filter option in the Recommendations page." source="/defender/media/defender-vulnerability-management/exception-filter-small.png" lightbox="/defender/media/defender-vulnerability-management/exception-filter.png":::
4545

46-
### Exception by device group
47-
48-
Apply the exception to all current device groups or choose specific device groups. Future device groups won't be included in the exception. Device groups that already have an exception won't be displayed in the list. If you only select certain device groups, the recommendation state changes from "active" to "partial exception." The state changes to "full exception" if you select all the device groups.
49-
50-
![Showing device group dropdown.](/defender/media/defender-vulnerability-management/tvm-exception-device-group-500.png)
51-
52-
#### Filtered views
53-
54-
If you've filtered by device group on any of the vulnerability management pages, only your filtered device groups appear as options.
46+
Select a security recommendation you would like to create an exception for. In the pane, select **Exception options** and fill out the form.
5547

56-
This is the button to filter by device group on any of the vulnerability management pages:
48+
:::image type="content" alt-text="Screenshot highlighting Exception options in a Recommendation pane." source="/defender/media/defender-vulnerability-management/exception-button-small.png" lightbox="/defender/media/defender-vulnerability-management/exception-button.png":::
5749

58-
![Showing selected device groups filter.](/defender/media/defender-vulnerability-management/tvm-selected-device-groups.png)
50+
The form includes fields to identify the device groups, the justification and context, and the duration of the exception.
5951

60-
Exception view with filtered device groups:
61-
62-
![Showing filtered device group dropdown.](/defender/media/defender-vulnerability-management/tvm-exception-device-filter500.png)
63-
64-
#### Large number of device groups
65-
66-
If your organization has more than 20 device groups, select **Edit** next to the filtered device group option.
67-
68-
![Showing how to edit large numbers of groups.](/defender/media/defender-vulnerability-management/tvm-exception-edit-groups.png)
52+
### Exception by device group
6953

70-
A flyout appears where you can search and choose device groups you want included. Select the check mark icon below Search to check/uncheck all.
54+
Apply the exception to all current device groups or choose specific device groups. Future device groups won't be included in the exception. Device groups that already have an exception won't be displayed in the list. If you only select certain device groups, the recommendation state changes from "active" to "partial exception." The state changes to "full exception" if you select all the device groups.
7155

72-
![Showing large device group flyout.](/defender/media/defender-vulnerability-management/tvm-exception-device-group-flyout-400.png)
56+
![Showing device group dropdown.](/defender/media/defender-vulnerability-management/tvm-exception-device-group-500.png)
7357

7458
### Global exceptions
7559

defender-vulnerability-management/tvm-zero-day-vulnerabilities.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- Tier1
13-
ms.topic: conceptual
13+
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 03/04/2022
15+
ms.date: 03/21/2025
1616
---
1717

1818
# Mitigate zero-day vulnerabilities
@@ -24,19 +24,19 @@ ms.date: 03/04/2022
2424
- [Microsoft Defender XDR](/defender-xdr)
2525
- [Microsoft Defender for Servers Plan 1 & 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
2626

27-
A zero-day vulnerability is a flaw in software for which no official patch or security update has been released. A software vendor may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited.
27+
A zero-day vulnerability is a flaw in software for which no official patch or security update is available yet. A software publisher may or may not be aware of the vulnerability, and no public information about this risk is available. Zero-day vulnerabilities often have high severity levels and are actively exploited.
2828

29-
Vulnerability management will only display zero-day vulnerabilities it has information about.
29+
Vulnerability management only displays zero-day vulnerabilities it has information about.
3030

3131
> [!TIP]
3232
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
3333
3434
## Find information about zero-day vulnerabilities
3535

36-
Once a zero-day vulnerability has been found, information about it will be conveyed through the following experiences in the Microsoft Defender portal.
36+
Once a zero-day vulnerability is found, information about it is conveyed through the following experiences in the Microsoft Defender portal.
3737

3838
> [!NOTE]
39-
> 0-day vulnerability capability is currently available only for Windows products.
39+
> Zero-day vulnerability capability is currently available only for Windows products.
4040
4141
### Defender Vulnerability Management dashboard
4242

@@ -74,17 +74,17 @@ Look for a zero-day tag for each software that has been affected by the zero-day
7474

7575
View clear suggestions about remediation and mitigation options, including workarounds if they exist. Filter by the "zero day" tag to only see security recommendations addressing zero-day vulnerabilities.
7676

77-
If there's software with a zero-day vulnerability and additional vulnerabilities to address, you'll get one recommendation about all vulnerabilities.
77+
If there's software with a zero-day vulnerability and other vulnerabilities to address, you get one recommendation about all vulnerabilities.
7878

7979
:::image type="content" alt-text="Zero day example of Windows Server 2016 in the security recommendations page." source="/defender/media/defender-vulnerability-management/tvm-zero-day-security-recommendation.png" lightbox="/defender/media/defender-vulnerability-management/tvm-zero-day-security-recommendation.png":::
8080

8181
## Addressing zero-day vulnerabilities
8282

8383
Go to the security recommendation page and select a recommendation with a zero-day. A flyout will open with information about the zero-day and other vulnerabilities for that software.
8484

85-
There will be a link to mitigation options and workarounds if they are available. Workarounds may help reduce the risk posed by this zero-day vulnerability until a patch or security update can be deployed.
85+
There is a link to mitigation options and workarounds if they are available. Workarounds might help reduce the risk posed by this zero-day vulnerability until a patch or security update can be deployed.
8686

87-
Open remediation options and choose the attention type. An "attention required" remediation option is recommended for the zero-day vulnerabilities, since an update hasn't been released yet. You won't be able to select a due date, since there's no specific action to perform. If there are older vulnerabilities for this software you wish to remediation, you can override the "attention required" remediation option and choose "update."
87+
Open remediation options and choose the attention type. An "attention required" remediation option is recommended for the zero-day vulnerabilities, since an update is not yet available. You won't be able to select a due date, since there's no specific action to perform. If there are older vulnerabilities for this software you wish to remediation, you can override the "attention required" remediation option and choose "update."
8888

8989
:::image type="content" alt-text="Zero day flyout example of Windows Server 2016 in the security recommendations page." source="/defender/media/defender-vulnerability-management/tvm-zero-day-recommendation-flyout400.png" lightbox="/defender/media/defender-vulnerability-management/tvm-zero-day-recommendation-flyout400.png":::
9090

@@ -94,7 +94,7 @@ Go to the [Remediation](tvm-remediation.md) page to view the remediation activit
9494

9595
## Patching zero-day vulnerabilities
9696

97-
When a patch is released for the zero-day, the recommendation will be changed to "Update" and a blue label next to it that says "New security update for zero day." It will no longer consider as a zero-day, the zero-day tag will be removed from all pages.
97+
When a patch is released for the zero-day, the recommendation changes to **Update** and a blue label next to it that says **New security update for zero day.** The vulnerability is no longer considered as a zero-day and the zero-day tag is removed from all pages.
9898

9999
## Related articles
100100

142 KB
Loading

0 commit comments

Comments
 (0)