Skip to content

Commit cfa936a

Browse files
committed
Merge branch 'main' into maccruz-quotaupdates
2 parents eae2b72 + 244c7bc commit cfa936a

File tree

9 files changed

+213
-124
lines changed

9 files changed

+213
-124
lines changed

defender-endpoint/machines-view-overview.md

Lines changed: 176 additions & 84 deletions
Large diffs are not rendered by default.

defender-endpoint/malware/trojans-malware.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,7 @@ Trojans can come in many different varieties, but generally they do the followin
4343

4444
Use the following free Microsoft software to detect and remove it:
4545

46-
- [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) for Windows 10 and Windows 8.1, or [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for previous versions of Windows.
47-
46+
- [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) for Windows 10 and 11.
4847
- [Microsoft Safety Scanner](../safety-scanner-download.md)
4948

5049
For more general tips, see [prevent malware infection](prevent-malware-infection.md).

defender-endpoint/malware/unwanted-software.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,9 +45,7 @@ To prevent unwanted software infection, download software only from official web
4545

4646
Use [Microsoft Edge](/microsoft-edge/deploy/index) when browsing the internet. Microsoft Edge includes additional protections that effectively block browser modifiers that can change your browser settings. Microsoft Edge also blocks known websites hosting unwanted software using [Windows Defender SmartScreen](/microsoft-edge/deploy/index) (also used by Internet Explorer).
4747

48-
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
49-
50-
Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
48+
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10 and 11. It provides real-time protection against threats and detects and removes known unwanted software.
5149

5250
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
5351

defender-endpoint/malware/worms-malware.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,8 +49,6 @@ This image shows how a worm can quickly spread through a shared USB drive.
4949

5050
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
5151

52-
Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
53-
5452
In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
5553

5654
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
648 Bytes
Loading

defender-endpoint/safety-scanner-download.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Microsoft Safety Scanner is a scan tool designed to find and remove malware from
4040

4141
- Safety Scanner is a portable executable and doesn't appear in the Windows Start menu or as an icon on the desktop. Note where you saved this download.
4242

43-
- This tool doesn't replace your antimalware product. For real-time protection with automatic updates, use [Microsoft Defender Antivirus on Windows 11, Windows 10, and Windows 8](https://www.microsoft.com/windows/comprehensive-security) or [Microsoft Security Essentials on Windows 7](https://support.microsoft.com/help/14210/security-essentials-download). These antimalware products also provide powerful malware removal capabilities. If you're having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
43+
- This tool doesn't replace your antimalware product. For real-time protection with automatic updates, use [Microsoft Defender Antivirus on Windows 11, Windows 10, and Windows 8](https://www.microsoft.com/windows/comprehensive-security). These antimalware products also provide powerful malware removal capabilities. If you're having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
4444

4545
## System requirements
4646

@@ -60,7 +60,6 @@ For more information about the Safety Scanner, see the support article on [how t
6060

6161
- [Troubleshooting Safety Scanner](https://support.microsoft.com/help/2520970/how-to-troubleshoot-an-error-when-you-run-the-microsoft-safety-scanner)
6262
- [Microsoft Defender Antivirus](https://www.microsoft.com/windows/comprehensive-security)
63-
- [Microsoft Security Essentials](https://support.microsoft.com/help/14210/security-essentials-download)
6463
- [Removing difficult threats](https://support.microsoft.com/help/4466982/windows-10-troubleshoot-problems-with-detecting-and-removing-malware)
6564
- [Submit file for malware analysis](https://www.microsoft.com/wdsi/filesubmission)
6665
- [Microsoft antimalware and threat protection solutions](microsoft-defender-endpoint.md)

defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -631,7 +631,7 @@ sections:
631631
632632
- Engine Version: Antimalware Engine version
633633
634-
NOTE: Whenever Microsoft Defender Antivirus, Microsoft Security Essentials, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it restores the following system settings and services that might have been changed by the malware:
634+
Note: Whenever Microsoft Defender Antivirus, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it restores the following system settings and services that might have been changed by the malware:
635635
636636
- Default Internet Explorer or Microsoft Edge setting
637637

defender-xdr/entity-page-device.md

Lines changed: 31 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: yelevin
77
author: yelevin
88
manager: dansimp
99
audience: ITPro
10-
ms.collection:
10+
ms.collection:
1111
- m365-security
1212
- tier3
1313
- usx-security
@@ -31,7 +31,7 @@ The device entity page in the Microsoft Defender portal helps you in your invest
3131
> The content set displayed on the device entity page may differ slightly, depending on the device's enrollment in Microsoft Defender for Endpoint and Microsoft Defender for Identity.
3232
>
3333
> If your organization onboarded Microsoft Sentinel to the Defender portal, additional information will appear.
34-
>
34+
>
3535
> In Microsoft Sentinel, device entities are also known as **host** entities. [Learn more](/azure/sentinel/entities-reference).
3636
>
3737
> [!INCLUDE [unified-soc-preview-no-alert](../includes/unified-soc-preview-no-alert.md)]
@@ -85,15 +85,15 @@ The **Overview** tab contains the [device details](#device-details) sidebar and
8585

8686
The sidebar lists the device's full name and exposure level. It also provides some important basic information in small subsections, which can be expanded or collapsed, such as:
8787

88-
| Section | Included information |
89-
| ------- | -------------------- |
90-
| **VM details** | Machine and domain names and IDs, health and onboarding statuses, timestamps for first and last seen, IP addresses, and more |
91-
| **DLP policy sync details** | If relevant |
92-
| **Configuration status** | Details regarding Microsoft Defender for Endpoint configuration |
93-
| **Cloud resource details** | Cloud platform, resource ID, subscription information, and more |
94-
| **Hardware and firmware** | VM, processor, and BIOS information, and more |
95-
| **Device management** | Microsoft Defender for Endpoint enrollment status and management info |
96-
| **Directory data** | [UAC](/windows/security/identity-protection/user-account-control/user-account-control-overview) flags, [SPNs](/windows/win32/ad/service-principal-names), and group memberships. |
88+
|Section|Included information|
89+
|---|---|
90+
|**VM details**|Machine and domain names and IDs, health and onboarding statuses, timestamps for first and last seen, IP addresses, and more|
91+
|**DLP policy sync details**|If relevant|
92+
|**Configuration status**|Details regarding Microsoft Defender for Endpoint configuration|
93+
|**Cloud resource details**|Cloud platform, resource ID, subscription information, and more|
94+
|**Hardware and firmware**|VM, processor, and BIOS information, and more|
95+
|**Device management**|Microsoft Defender for Endpoint enrollment status and management info|
96+
|**Directory data**|[UAC](/windows/security/identity-protection/user-account-control/user-account-control-overview) flags, [SPNs](/windows/win32/ad/service-principal-names), and group memberships.|
9797

9898
### Dashboard
9999

@@ -282,30 +282,31 @@ Response actions offer shortcuts to analyze, investigate, and defend against thr
282282
:::image type="content" source="/defender/media/entity-page-device/entity-device-response-actions.png" alt-text="Screenshot of the Action bar for the device entity page in the Microsoft Defender portal.":::
283283

284284
> [!IMPORTANT]
285+
>
285286
> - [Response actions](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts) are only available if the device is enrolled in Microsoft Defender for Endpoint.
286287
> - Devices that are enrolled in Microsoft Defender for Endpoint may display different numbers of response actions, based on the device's OS and version number.
287288
288289
Response actions run along the top of a specific device page and include:
289290

290-
| Action | Description |
291-
| ------ | ----------- |
292-
| **Device value** | |
293-
| **Set criticality** | |
294-
| **Manage tags** | Updates custom tags you've applied to this device. |
295-
| **Report device inaccuracy** | |
296-
| **Run Antivirus Scan** | Updates Microsoft Defender Antivirus definitions and immediately runs an antivirus scan. Choose between Quick scan or Full scan. |
297-
| **Collect Investigation Package** | Gathers information about the device. When the investigation is completed, you can download it. |
298-
| **Restrict app execution** | Prevents applications that aren't signed by Microsoft from running. |
299-
| **Initiate automated investigation** | Automatically [investigates and remediates threats](/defender-office-365/air-about). Although you can manually trigger automated investigations to run from this page, [certain alert policies](/Microsoft-365/compliance/alert-policies#default-alert-policies) trigger automatic investigations on their own. |
300-
| **Initiate Live Response Session** | Loads a remote shell on the device for [in-depth security investigations](/defender-endpoint/live-response). |
301-
| **Isolate device** | Isolates the device from your organization's network while keeping it connected to Microsoft Defender. You can choose to allow Outlook, Teams, and Skype for Business to run while the device is isolated, for communication purposes. |
302-
| **Ask Defender Experts** | |
303-
| **Action Center** | Displays information about any response actions that are currently running. Only available if another action has already been selected. |
304-
| **Download force release from isolation script** | |
305-
| **Exclude** | |
306-
| **Go hunt** | |
307-
| **Turn on troubleshooting mode** | |
308-
| **Policy sync** | |
291+
|Action|Description|
292+
|---|---|
293+
|**Device value**||
294+
|**Set criticality**||
295+
|**Manage tags**|Updates custom tags you've applied to this device.|
296+
|**Report device inaccuracy**||
297+
|**Run Antivirus Scan**|Updates Microsoft Defender Antivirus definitions and immediately runs an antivirus scan. Choose between Quick scan or Full scan.|
298+
|**Collect Investigation Package**|Gathers information about the device. When the investigation is completed, you can download it.|
299+
|**Restrict app execution**|Prevents applications that aren't signed by Microsoft from running.|
300+
|**Initiate automated investigation**|Automatically [investigates and remediates threats](/defender-office-365/air-about). Although you can manually trigger automated investigations to run from this page, [certain alert policies](/Microsoft-365/compliance/alert-policies#default-alert-policies) trigger automatic investigations on their own.|
301+
|**Initiate Live Response Session**|Loads a remote shell on the device for [in-depth security investigations](/defender-endpoint/live-response).|
302+
|**Isolate device**|Isolates the device from your organization's network while keeping it connected to Microsoft Defender. You can choose to allow Outlook, Teams, and Skype for Business to run while the device is isolated, for communication purposes.|
303+
|**Ask Defender Experts**||
304+
|**Action Center**|Displays information about any response actions that are currently running. Only available if another action has already been selected.|
305+
|**Download force release from isolation script**||
306+
|**Exclude**||
307+
|**Go hunt**||
308+
|**Turn on troubleshooting mode**||
309+
|**Policy sync**||
309310

310311
## Related topics
311312

exposure-management/work-attack-paths-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ Security Exposure Management is currently in public preview.
2525
Here's how Security Exposure Management helps you to identify and resolve attack paths.
2626

2727
- **Attack path generation**: Security Exposure Management automatically generates attack paths based on the data collected across assets and workloads. It simulates attack scenarios, and identifies vulnerabilities and weaknesses that an attacker could exploit.
28+
- The number of attack paths visible in the portal can fluctuate due to the dynamic nature of IT environments. Our system dynamically generates attack paths based on the real-time conditions of each customer's environment. Changes such as the addition or removal of assets, updates to configurations, a user logging on or off from a machine, a user added or removed to a group, and the implementation of new network segmentation or security policies can all influence the number and types of attack paths identified.
29+
- This approach ensures that the security posture we provide is both accurate and reflective of the latest environment state, accommodating the agility required in today's IT environments.
2830
- **Attack path visibility**: The attack path graph view uses [enterprise exposure graph](cross-workload-attack-surfaces.md) data to visualize the attack path to understand how potential threats might unfold.
2931
- Hovering over each node and connector icon provides you with additional information about how the attack path is build. For instance, from an initial virtual machine containing TLS/SSL keys all the way to permissions to storage accounts.
3032
- The [enterprise exposure map](enterprise-exposure-map.md) extends how you can visualize attack paths. Along with other data, it shows you multiple attack paths and choke points, nodes that create bottlenecks in the graph or map where attack paths converge. It visualizes exposure data, allowing you to see what assets are at risk, and where to prioritize your focus.

0 commit comments

Comments
 (0)