You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+6-3Lines changed: 6 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: ios
16
16
search.appverid: met150
17
-
ms.date: 07/18/2024
17
+
ms.date: 07/22/2024
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on iOS features
@@ -97,6 +97,9 @@ Use the following steps to disable web protection for unenrolled devices.
97
97
- Defender for Endpoint sends the heartbeat to the Microsoft Defender portal whenever a user opens the app.
98
98
- Select **Next**, and then assign this profile to targeted devices/users.
99
99
100
+
> [!NOTE]
101
+
> The `WebProtection` key is not applicable for the Control Filter in the list of supervised devices. If you want to disable web protection for supervised devices, you can remove the Control Filter profile.
102
+
100
103
## Configure network protection
101
104
102
105
Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to configure network protection. This configuration is available for both enrolled devices through MDM config and unenrolled devices through MAM config.
@@ -275,8 +278,8 @@ End users install and open the Microsoft Defender app to start onboarding.
275
278
276
279
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are jailbroken. These jailbreak checks are done periodically. If a device is detected as jailbroken, these events occur:
277
280
278
-
-High-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
279
-
- User data on app is cleared. When user opens the app after jailbreaking the VPN profile also is deleted and no web protection is offered.
281
+
-A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access is set up based on device risk score, then the device is blocked from accessing corporate data.
282
+
- User data on app is cleared. When user opens the app after jailbreaking, the VPN profile (only Defender for Endpoint loopback VPN Profile) also is deleted, and no web protection is offered. VPN profiles delivered by Intune are not removed.
280
283
281
284
### Configure compliance policy against jailbroken devices
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
41
41
-[What's new in Microsoft Defender for Office 365](/defender-office-365/defender-for-office-365-whats-new)
42
42
-[What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
43
43
-[What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
44
+
-[What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
44
45
45
46
For more information on Microsoft Defender for Endpoint on specific operating systems:
Copy file name to clipboardExpand all lines: defender-office-365/safe-attachments-policies-configure.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.collection:
18
18
description: Learn about how to define Safe Attachments policies to protect your organization from malicious files in email.
19
19
ms.custom: seo-marvel-apr2020
20
20
ms.service: defender-office-365
21
-
ms.date: 4/26/2024
21
+
ms.date: 07/22/2024
22
22
appliesto:
23
23
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
- Add the URL `http://spamlink.contoso.com` to a file (for example, a Word document), and attach that file in an email message to test Safe Attachments protection. This URL is similar to the GTUBE text string for testing anti-spam solutions. This URL isn't harmful, but when it's included in an email attachment, it triggers a Safe Attachments protection response.
515
-
516
514
- To verify that Safe Attachments is scanning messages, check the available Defender for Office 365 reports. For more information, see [View reports for Defender for Office 365](reports-defender-for-office-365.md) and [Use Explorer in the Microsoft Defender portal](threat-explorer-real-time-detections-about.md).
Copy file name to clipboardExpand all lines: defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ ms.topic: conceptual
14
14
ms.date: 07/09/2024
15
15
---
16
16
17
-
# What's new in Microsoft Defender Vulnerability Management Public Preview
17
+
# What's new in Microsoft Defender Vulnerability Management
18
18
19
-
This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management public preview.
19
+
This article provides information about new features and important product updates for the latest release of Microsoft Defender Vulnerability Management.
20
20
21
21
> [!TIP]
22
22
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
Copy file name to clipboardExpand all lines: defender-xdr/microsoft-365-security-center-defender-cloud.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ f1.keywords:
8
8
ms.author: diannegali
9
9
author: diannegali
10
10
manager: deniseb
11
-
ms.date: 06/05/2024
11
+
ms.date: 07/22/2024
12
12
audience: ITPro
13
13
ms.topic: conceptual
14
14
search.appverid:
@@ -41,11 +41,14 @@ To ensure access to Defender for Cloud alerts in the Microsoft Defender portal,
41
41
42
42
### Required permissions
43
43
44
-
You must be a global administrator or a security administrator in Azure Active Directory to view Defender for Cloud alerts and correlations. For users that don't have these roles, the integration is available only by applying [unified role-based access control (RBAC) roles](manage-rbac.md) for Defender for Cloud.
45
-
46
44
> [!NOTE]
47
45
> The permission to view Defender for Cloud alerts and correlations is automatic for the entire tenant. Viewing for specific subscriptions is not supported. You can use the **alert subscription ID** filter to view Defender for Cloud alerts associated with a specific Defender for Cloud subscription in the alert and incident queues. Learn more about [filters](incident-queue.md#filters-).
48
46
47
+
The integration is available only by applying the appropriate [unified role-based access control (RBAC)](manage-rbac.md) for Defender for Cloud. To view Defender for Cloud alerts and correlations without unified RBAC, you must be a Global Administrator or Security Administrator in Azure Active Directory.
48
+
49
+
> [!IMPORTANT]
50
+
> Global Administrator is a highly privileged role that should be limited to scenarios when you can't use an existing role. Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization.
51
+
49
52
## Investigation experience in the Microsoft Defender portal
50
53
51
54
> [!IMPORTANT]
@@ -54,11 +57,6 @@ You must be a global administrator or a security administrator in Azure Active D
54
57
55
58
The following section describes the detection and investigation experience in the Microsoft Defender portal with Defender for Cloud alerts.
56
59
57
-
> [!NOTE]
58
-
> Informational alerts from Defender for Cloud are not integrated to the Microsoft Defender portal to allow focus on the relevant and high severity alerts. This strategy streamlines management of incidents and reduces alert fatigue.
59
-
60
-
61
-
62
60
> [!div class="mx-tdCol2BreakAl"]
63
61
> |Area |Description |
64
62
> |----------|-----------|
@@ -69,6 +67,9 @@ The following section describes the detection and investigation experience in th
69
67
> |Unified API|Defender for Cloud alerts and incidents are now included in [Microsoft Defender XDR's public API](api-overview.md), allowing customers to export their security alerts data into other systems using one API.|
70
68
> |Advanced hunting (Preview)| Information about cloud audit events for various cloud platforms protected by the organization's Defender for Cloud is available through the [CloudAuditEvents](advanced-hunting-cloudauditevents-table.md) table in [advanced hunting](advanced-hunting-overview.md).|
71
69
70
+
> [!NOTE]
71
+
> Informational alerts from Defender for Cloud are not integrated to the Microsoft Defender portal to allow focus on the relevant and high severity alerts. This strategy streamlines management of incidents and reduces alert fatigue.
72
+
72
73
## Impact to Microsoft Sentinel users
73
74
74
75
Microsoft Sentinel customers [integrating Microsoft Defender XDR incidents](/azure/sentinel/microsoft-365-defender-sentinel-integration)*and* ingesting Defender for Cloud alerts are required to make the following configuration changes to ensure that duplicate alerts and incidents aren't created:
0 commit comments