You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/dcs-inspection.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,9 @@ Microsoft Defender for Cloud Apps enables you to natively use the Microsoft Data
13
13
>[!NOTE]
14
14
> This feature is currently available in the US, Europe, Australia, India, Canada, Japan, and APAC.
15
15
16
+
>[!NOTE]
17
+
> To enable the Data Classification Service option in File Policies, the "Microsoft 365" App Connector is required.
18
+
16
19
## Enable content inspection with Data Classification Services
17
20
18
21
You can set the **Inspection method** to use the **Microsoft Data Classification Service** with no additional configuration required. This option is useful when creating a data leak prevention policy for your files in Microsoft Defender for Cloud Apps.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/includes/entra-conditional-access-policy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,9 +34,9 @@ For more information, see [Conditional Access policies](/azure/active-directory/
34
34
35
35
> [!NOTE]
36
36
> Microsoft Defender for Cloud Apps utilizes the application **Microsoft Defender for Cloud Apps - Session Controls** as part of the Conditional Access App Control service for user sign-in. This application is located within the 'Enterprise Applications' section of Entra ID.
37
-
To protect your SaaS applications with Session Controls, you must allow access to this application.
38
-
If you block access to this application through an Entra ID Conditional Access policy, end users won't be able to access the protected applications under session controls. <br>
39
-
>
37
+
To protect your SaaS applications with Session Controls, you must allow access to this application.
38
+
>
39
+
>If you have any Conditional Access policies that have **“Block Access”** selected in the **“Grant Access”** Control under a Microsoft Entra ID Conditional Access policy scoped to this app, end users will not be able to access the protected applications under session controls. <br><br>
40
40
>It's important to ensure that this application isn't unintentionally restricted by any Conditional Access policies. For policies that restrict all or certain applications, please ensure this application is listed as an exception in the **Target resources** or confirm that the blocking policy is deliberate.<br>
41
41
>
42
42
>To ensure your location-based conditional access policies function correctly, include the **Microsoft Defender for Cloud Apps – Session Controls** application in those policies.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-updates.md
+13-8Lines changed: 13 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier2
16
16
ms.topic: conceptual
17
17
search.appverid: met150
18
-
ms.date: 01/12/2024
18
+
ms.date: 02/10/2025
19
19
---
20
20
21
21
# Create a custom gradual rollout process for Microsoft Defender updates
@@ -49,19 +49,17 @@ The following table lists the available group policy settings for configuring up
49
49
## Group Policy
50
50
51
51
> [!NOTE]
52
-
> An updated Defender ADMX template are published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
52
+
> An updated Defender ADMX template is published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
53
53
54
-
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints.
55
-
56
-
In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
54
+
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints. In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
57
55
58
56
1. On your Group Policy management machine, open the **Group Policy Management Console**, right-click the **Group Policy Object** (GPO) you want to configure and select **Edit**.
59
57
60
58
2. Using the Group Policy Management Editor go to **Computer configuration**.
61
59
62
60
3. Select **Administrative templates**.
63
61
64
-
4. Expand the tree to **Windows components > Microsoft Defender Antivirus**.
62
+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus**.
65
63
66
64
5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
Use `Set-MpPreference -PlatformUpdatesChannel Beta` to configure platform updates to arrive from the Beta Channel.
95
92
96
93
For more information on the parameters and how to configure them, see [Set-MpPreference](/powershell/module/defender/set-mppreference) (Microsoft Defender Antivirus).
97
94
95
+
## Registry
96
+
97
+
These settings can be confirmed in the registry under `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`:
98
+
99
+
-`EngineRing`
100
+
-`PlatformRing`
101
+
-`SignaturesRing`
102
+
98
103
> [!NOTE]
99
-
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts) for guidance on this topic.
104
+
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts).
100
105
101
106
> [!TIP]
102
107
> If you're looking for Antivirus related information for other platforms, see:
3. Scroll down, and then turn on **Enable EDR in block mode**.
85
+
1. Scroll down, and then turn on **Enable EDR in block mode**.
86
86
87
87
### Intune
88
88
89
89
To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP through Intune, and a comparison to on-premises](/troubleshoot/mem/intune/deploy-oma-uris-to-target-csp-via-intune).
90
90
91
91
For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp).
92
92
93
+
### Group Policy
94
+
95
+
You can use Group Policy to enable EDR in block mode.
96
+
97
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
98
+
99
+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
100
+
101
+
2. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
102
+
103
+
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Features**.
104
+
105
+
4. Double-click **Enable EDR in block mode** and set the option to **Enabled**.
106
+
107
+
5. Select **OK**.
108
+
93
109
## Requirements for EDR in block mode
94
110
95
111
The following table lists requirements for EDR in block mode:
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 12/30/2024
9
+
ms.date: 02/06/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -53,7 +53,7 @@ Understand the following prerequisites before you create indicators for files:
53
53
54
54
-[Behavior Monitoring is enabled](behavior-monitor.md)
55
55
56
-
-[Cloud-based protection is turned on](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
56
+
-[Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57
57
58
58
-[Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
0 commit comments