You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/get-defender-business.md
+7-12Lines changed: 7 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,17 +5,14 @@ search.appverid: MET150
5
5
author: siosulli
6
6
ms.author: siosulli
7
7
manager: deniseb
8
-
9
8
audience: Admin
10
9
ms.topic: overview
11
10
ms.service: defender-business
12
11
ms.localizationpriority: medium
13
-
ms.date: 09/07/2023
12
+
ms.date: 06/07/2024
14
13
ms.reviewer: efratka
15
14
f1.keywords: NOCSH
16
-
17
15
ms.collection:
18
-
19
16
- SMB
20
17
- m365-security
21
18
- tier1
@@ -34,9 +31,6 @@ Sections include:
34
31
-**[Portals that you use](#portals-you-use-for-setup-and-management)** to set up, configure, and manage Defender for Business
35
32
-**[Next steps](#next-step)**, such as adding users and assigning licenses.
36
33
37
-
> [!IMPORTANT]
38
-
> You should be a global administrator to complete the tasks described in this article. The person who signs your company up for Microsoft 365 is a global administrator. [Learn more about admin roles in the Microsoft 365 admin center](/Microsoft-365/admin/add-users/about-admin-roles).
39
-
40
34
## How to get Microsoft Defender for Business
41
35
42
36
To get Defender for Business, you can choose from several options:
@@ -107,7 +101,7 @@ Microsoft has a list of solution providers who are authorized to sell offerings,
107
101
108
102
Microsoft Defender for Business servers is an add-on to Defender for Business that enables you to secure your server operating systems with the same protection that you get for client devices in Defender for Business.
109
103
110
-
1. Go to the Microsoft 365 admin center ([https://admin.microsoft.com/](https://admin.microsoft.com/)), and sign in.
104
+
1. Go to the [Microsoft 365 admin center](https://admin.microsoft.com), and sign in.
111
105
112
106
2. In the navigation pane, choose **Billing** > **Purchase services**.
113
107
@@ -118,7 +112,6 @@ Microsoft Defender for Business servers is an add-on to Defender for Business th
118
112
> [!IMPORTANT]
119
113
>
120
114
> - In order to add on Microsoft Defender for Business servers, you'll need at least one paid license for [Defender for Business](mdb-overview.md) (standalone) or [Microsoft 365 Business Premium](/Microsoft-365/business-premium/m365bp-overview).
121
-
>
122
115
> - There's a limit of 60 Microsoft Defender for Business servers licenses per subscription to Microsoft 365 Business Premium or Defender for Business.
123
116
> - If preferred, you could use [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/plan-defender-for-servers) instead to onboard your servers. To learn more, see [What happens if I have a mix of Microsoft endpoint security subscriptions](mdb-faq.yml#what-happens-if-i-have-a-mix-of-microsoft-endpoint-security-subscriptions)?
124
117
@@ -133,10 +126,12 @@ If your subscription also includes Microsoft Intune, you use the Intune admin ce
133
126
134
127
|Portal|Description|
135
128
|---|---|
136
-
|The Microsoft 365 admin center ([https://admin.microsoft.com/](https://admin.microsoft.com/))|Use the Microsoft 365 admin center to activate your trial and sign in for the first time. You can also use the Microsoft 365 admin center to: <br/>- Add or remove users.<br/>- Assign user licenses.<br/>- View your products and services.<br/>- Complete setup tasks for your Microsoft 365 subscription.<br/><br/>To learn more, see [Overview of the Microsoft 365 admin center](/Microsoft-365/admin/admin-overview/admin-center-overview).|
137
-
|The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com))|Use the Microsoft Defender portal to set up and configure Defender for Business, and to monitor your devices and threat detections. You use the Microsoft Defender portal to: <br/>- View your devices and device protection policies.<br/>- View detected threats and take action.<br/>- View security recommendations and manage your security settings.<br/><br/>To learn more, see [Get started using the Microsoft Defender portal](mdb-get-started.md).|
138
-
|The Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/))|Use the Intune admin center to set up multifactor authentication (MFA), onboard iOS and Android devices, and configure certain capabilities, such as [attack surface reduction rules](mdb-asr.md).<br/><br/>To learn more about Intune, see [Microsoft Intune is an MDM and MAM provider for your devices](/mem/intune/fundamentals/what-is-intune).|
129
+
|The [Microsoft 365 admin center](https://admin.microsoft.com/)|Use the Microsoft 365 admin center to activate your trial and sign in for the first time. You can also use the Microsoft 365 admin center to: <br/>- Add or remove users.<br/>- Assign user licenses.<br/>- View your products and services.<br/>- Complete setup tasks for your Microsoft 365 subscription.<br/><br/>To learn more, see [Overview of the Microsoft 365 admin center](/Microsoft-365/admin/admin-overview/admin-center-overview).|
130
+
|The [Microsoft Defender portal](https://security.microsoft.com)|Use the Microsoft Defender portal to set up and configure Defender for Business, and to monitor your devices and threat detections. You use the Microsoft Defender portal to: <br/>- View your devices and device protection policies.<br/>- View detected threats and take action.<br/>- View security recommendations and manage your security settings.<br/><br/>To learn more, see [Get started using the Microsoft Defender portal](mdb-get-started.md).|
131
+
|The [Intune admin center](https://intune.microsoft.com/)|Use the Intune admin center to set up multifactor authentication (MFA), onboard iOS and Android devices, and configure certain capabilities, such as [attack surface reduction rules](mdb-asr.md).<br/><br/>To learn more about Intune, see [Microsoft Intune is an MDM and MAM provider for your devices](/mem/intune/fundamentals/what-is-intune).|
Copy file name to clipboardExpand all lines: defender-business/mdb-add-users.md
+2-8Lines changed: 2 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: conceptual
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 05/01/2023
12
+
ms.date: 06/07/2024
13
13
ms.collection:
14
14
- m365-security
15
15
- tier1
@@ -25,10 +25,7 @@ As soon as you have signed up for Defender for Business, your first step is to a
25
25
26
26
## Add users and assign licenses
27
27
28
-
> [!IMPORTANT]
29
-
> You must be a global administrator to perform this task. The person who signed up your company for Microsoft 365 or for Defender for Business is a global administrator by default.
30
-
31
-
1. Go to the Microsoft 365 admin center at [https://admin.microsoft.com](https://admin.microsoft.com) and sign in.
28
+
1. Go to the [Microsoft 365 admin center](https://admin.microsoft.com) and sign in.
32
29
33
30
2. Go to **Users** > **Active users**, and then select **Add a user**.
34
31
@@ -50,9 +47,6 @@ As soon as you have signed up for Defender for Business, your first step is to a
50
47
51
48
One good way to make sure MFA is enabled for all users is by using [security defaults](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults). If your tenant was created on or after October 22, 2019, security defaults might be enabled automatically in your tenant. Use the following procedure to confirm or enable security defaults.
52
49
53
-
> [!IMPORTANT]
54
-
> You must be a security administrator, Conditional Access administrator, or Global Administrator to perform this task.
55
-
56
50
1. Go to the Azure portal ([https://portal.azure.com/](https://portal.azure.com/)) and sign in.
57
51
58
52
2. Under **Manage Microsoft Entra ID**, select **View**.
Copy file name to clipboardExpand all lines: defender-business/mdb-asr.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Get an overview of attack surface reduction capabilities, including
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 11/30/2023
7
+
ms.date: 06/07/2024
8
8
ms.topic: conceptual
9
9
ms.service: defender-business
10
10
ms.localizationpriority: medium
@@ -38,7 +38,7 @@ These rules help protect your network and devices but shouldn't cause disruption
38
38
39
39
## Set up ASR rules using Intune
40
40
41
-
1.As a global administrator, in the Microsoft Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)), go to **Endpoint security** > **Attack surface reduction**.
41
+
1.In the [Microsoft Intune admin center](https://intune.microsoft.com/), go to **Endpoint security** > **Attack surface reduction**.
42
42
43
43
2. Choose **Create policy** to create a new policy.
44
44
@@ -70,7 +70,7 @@ These rules help protect your network and devices but shouldn't cause disruption
70
70
71
71
Defender for Business includes an attack surface reduction report that shows how attack surface reduction rules are working for you.
72
72
73
-
1.As a global administrator, in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, choose **Reports**.
73
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, choose **Reports**.
74
74
75
75
2. Under **Endpoints**, choose **Attack surface reduction rules**. The report opens and includes three tabs:
- Containing a user account by disconnecting current user connections at the device level
42
42
43
43
> [!IMPORTANT]
44
-
> - To view information about a detected advanced attack, you must have the Security Reader, Security Administrator, or Global Administrator role assigned.
45
-
> - To take remediation actions, release a contained device/user, or re-enable a user account, you must have either the Security Administrator or Global Administrator role assigned.
44
+
> - To view information about a detected advanced attack, you must have an appropriate role, such as Security Reader or Security Administrator assigned.
45
+
> - To take remediation actions, release a contained device/user, or re-enable a user account, you must have the Security Administrator role assigned.
46
46
> - See [Security roles and permissions in Defender for Business](mdb-roles-permissions.md).
Copy file name to clipboardExpand all lines: defender-business/mdb-controlled-folder-access.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Get an overview of attack surface reduction capabilities in Microso
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 08/21/2023
7
+
ms.date: 06/07/2024
8
8
ms.topic: conceptual
9
9
ms.service: defender-business
10
10
ms.localizationpriority: medium
@@ -23,7 +23,7 @@ Controlled folder access allows only trusted apps to access protected folders on
23
23
24
24
## Set up controlled folder access
25
25
26
-
1.As a global administrator, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Attack surface reduction**.
26
+
1.In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Attack surface reduction**.
27
27
28
28
2. Select an existing policy, or choose **Create policy** to create a new policy.
Copy file name to clipboardExpand all lines: defender-business/mdb-manage-devices.md
+2-15Lines changed: 2 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: how-to
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 05/10/2023
12
+
ms.date: 06/07/2024
13
13
ms.reviewer: nehabha
14
14
f1.keywords: NOCSH
15
15
ms.collection:
@@ -33,13 +33,6 @@ In Defender for Business, you can manage devices as follows:
33
33
34
34
:::image type="content" source="/defender/media/defender-business/mdb-device-inventory.png" alt-text="Screenshot of device inventory":::
35
35
36
-
> [!IMPORTANT]
37
-
> In order to view the list of onboarded devices, you must have one of the following [roles](mdb-roles-permissions.md) assigned:
38
-
>
39
-
> - Global Administrator
40
-
> - Security Administrator
41
-
> - Security Reader
42
-
43
36
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
44
37
45
38
2. In the navigation pane, go to **Assets** > **Devices**.
@@ -50,13 +43,7 @@ In Defender for Business, you can manage devices as follows:
50
43
51
44
## Take action on a device that has threat detections
52
45
53
-
:::image type="content" source="/defender/media/defender-business/mdb-selected-device.png" alt-text="Screenshot of a selected device with details and actions available":::
54
-
55
-
> [!IMPORTANT]
56
-
> In order to take action on a device with detected threats, you must have one of the following [roles](mdb-roles-permissions.md) assigned:
57
-
>
58
-
> - Global Administrator
59
-
> - Security Administrator
46
+
:::image type="content" source="/defender/media/defender-business/mdb-selected-device.png" alt-text="Screenshot of a selected device with details and actions available.":::
60
47
61
48
1. In the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), in the navigation pane, go to **Assets** > **Devices**.
Copy file name to clipboardExpand all lines: defender-business/mdb-manage-subscription.md
-9Lines changed: 0 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,10 +29,6 @@ This article describes how to apply either Defender for Business or Defender for
29
29
- You should have active trial or paid licenses for both Defender for Business and Defender for Endpoint Plan 2.
30
30
31
31
- If you're using Defender for Business only, you can continue using it. In this case, no changes are needed. But if you're considering switching to Defender for Endpoint Plan 2, follow the guidance in this article.
32
-
- To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
33
-
34
-
- Global Admin
35
-
- Security Admin
36
32
37
33
## View and manage your endpoint security subscription settings
38
34
@@ -64,11 +60,6 @@ The license usage report is estimated based on sign-in activities on the device.
64
60
65
61
To reduce management overhead, there's no requirement for device-to-user mapping and assignment. Instead, the license report provides a utilization estimation that is calculated based on device usage seen across your organization. It might take up to one day for your usage report to reflect the active usage of your devices.
66
62
67
-
> [!IMPORTANT]
68
-
> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
69
-
> - Security Admin
70
-
> - Global Admin
71
-
72
63
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
Copy file name to clipboardExpand all lines: defender-business/mdb-onboard-devices.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: Admin
9
9
ms.topic: overview
10
10
ms.service: defender-business
11
11
ms.localizationpriority: medium
12
-
ms.date: 08/08/2023
12
+
ms.date: 06/07/2024
13
13
ms.reviewer: efratka, nehabha, muktaagarwal
14
14
f1.keywords: NOCSH
15
15
ms.collection:
@@ -358,9 +358,6 @@ You can use the following methods to onboard an instance of Linux Server to Defe
358
358
359
359
## View a list of onboarded devices
360
360
361
-
> [!IMPORTANT]
362
-
> You must be assigned an appropriate role, such as Global Administrator, Security Administrator, or Security Reader to perform the following procedure. For more information, see [Roles in Defender for Business](mdb-roles-permissions.md#roles-in-defender-for-business).
363
-
364
361
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
365
362
366
363
2. In the navigation pane, go to **Assets** > **Devices**. The **Device inventory** view opens.
0 commit comments