You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/malware/trojans-malware.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,8 +43,7 @@ Trojans can come in many different varieties, but generally they do the followin
43
43
44
44
Use the following free Microsoft software to detect and remove it:
45
45
46
-
-[Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) for Windows 10 and Windows 8.1, or [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for previous versions of Windows.
47
-
46
+
-[Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) for Windows 10 and 11.
Copy file name to clipboardExpand all lines: defender-endpoint/malware/unwanted-software.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,9 +45,7 @@ To prevent unwanted software infection, download software only from official web
45
45
46
46
Use [Microsoft Edge](/microsoft-edge/deploy/index) when browsing the internet. Microsoft Edge includes additional protections that effectively block browser modifiers that can change your browser settings. Microsoft Edge also blocks known websites hosting unwanted software using [Windows Defender SmartScreen](/microsoft-edge/deploy/index) (also used by Internet Explorer).
47
47
48
-
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
49
-
50
-
Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
48
+
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10 and 11. It provides real-time protection against threats and detects and removes known unwanted software.
51
49
52
50
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
Copy file name to clipboardExpand all lines: defender-endpoint/malware/worms-malware.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,8 +49,6 @@ This image shows how a worm can quickly spread through a shared USB drive.
49
49
50
50
Enable [Microsoft Defender Antivirus](../microsoft-defender-antivirus-windows.md) in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
51
51
52
-
Download [Microsoft Security Essentials](https://www.microsoft.com/download/details.aspx?id=5201) for real-time protection in Windows 7 or Windows Vista.
53
-
54
52
In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
55
53
56
54
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
Copy file name to clipboardExpand all lines: defender-endpoint/safety-scanner-download.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ Microsoft Safety Scanner is a scan tool designed to find and remove malware from
40
40
41
41
- Safety Scanner is a portable executable and doesn't appear in the Windows Start menu or as an icon on the desktop. Note where you saved this download.
42
42
43
-
- This tool doesn't replace your antimalware product. For real-time protection with automatic updates, use [Microsoft Defender Antivirus on Windows 11, Windows 10, and Windows 8](https://www.microsoft.com/windows/comprehensive-security) or [Microsoft Security Essentials on Windows 7](https://support.microsoft.com/help/14210/security-essentials-download). These antimalware products also provide powerful malware removal capabilities. If you're having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
43
+
- This tool doesn't replace your antimalware product. For real-time protection with automatic updates, use [Microsoft Defender Antivirus on Windows 11, Windows 10, and Windows 8](https://www.microsoft.com/windows/comprehensive-security). These antimalware products also provide powerful malware removal capabilities. If you're having difficulties removing malware with these products, you can refer to our help on [removing difficult threats](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
44
44
45
45
## System requirements
46
46
@@ -60,7 +60,6 @@ For more information about the Safety Scanner, see the support article on [how t
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -631,7 +631,7 @@ sections:
631
631
632
632
- Engine Version: Antimalware Engine version
633
633
634
-
NOTE: Whenever Microsoft Defender Antivirus, Microsoft Security Essentials, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it restores the following system settings and services that might have been changed by the malware:
634
+
Note: Whenever Microsoft Defender Antivirus, Malicious Software Removal Tool, or System Center Endpoint Protection detects a malware, it restores the following system settings and services that might have been changed by the malware:
635
635
636
636
- Default Internet Explorer or Microsoft Edge setting
Copy file name to clipboardExpand all lines: defender-xdr/entity-page-device.md
+31-30Lines changed: 31 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.author: yelevin
7
7
author: yelevin
8
8
manager: dansimp
9
9
audience: ITPro
10
-
ms.collection:
10
+
ms.collection:
11
11
- m365-security
12
12
- tier3
13
13
- usx-security
@@ -31,7 +31,7 @@ The device entity page in the Microsoft Defender portal helps you in your invest
31
31
> The content set displayed on the device entity page may differ slightly, depending on the device's enrollment in Microsoft Defender for Endpoint and Microsoft Defender for Identity.
32
32
>
33
33
> If your organization onboarded Microsoft Sentinel to the Defender portal, additional information will appear.
34
-
>
34
+
>
35
35
> In Microsoft Sentinel, device entities are also known as **host** entities. [Learn more](/azure/sentinel/entities-reference).
@@ -85,15 +85,15 @@ The **Overview** tab contains the [device details](#device-details) sidebar and
85
85
86
86
The sidebar lists the device's full name and exposure level. It also provides some important basic information in small subsections, which can be expanded or collapsed, such as:
87
87
88
-
|Section|Included information|
89
-
|------- |-------------------- |
90
-
|**VM details**|Machine and domain names and IDs, health and onboarding statuses, timestamps for first and last seen, IP addresses, and more|
91
-
|**DLP policy sync details**|If relevant|
92
-
|**Configuration status**|Details regarding Microsoft Defender for Endpoint configuration|
93
-
|**Cloud resource details**|Cloud platform, resource ID, subscription information, and more|
94
-
|**Hardware and firmware**|VM, processor, and BIOS information, and more|
95
-
|**Device management**|Microsoft Defender for Endpoint enrollment status and management info|
96
-
|**Directory data**|[UAC](/windows/security/identity-protection/user-account-control/user-account-control-overview) flags, [SPNs](/windows/win32/ad/service-principal-names), and group memberships.|
88
+
|Section|Included information|
89
+
|---|---|
90
+
|**VM details**|Machine and domain names and IDs, health and onboarding statuses, timestamps for first and last seen, IP addresses, and more|
91
+
|**DLP policy sync details**|If relevant|
92
+
|**Configuration status**|Details regarding Microsoft Defender for Endpoint configuration|
93
+
|**Cloud resource details**|Cloud platform, resource ID, subscription information, and more|
94
+
|**Hardware and firmware**|VM, processor, and BIOS information, and more|
95
+
|**Device management**|Microsoft Defender for Endpoint enrollment status and management info|
96
+
|**Directory data**|[UAC](/windows/security/identity-protection/user-account-control/user-account-control-overview) flags, [SPNs](/windows/win32/ad/service-principal-names), and group memberships.|
97
97
98
98
### Dashboard
99
99
@@ -282,30 +282,31 @@ Response actions offer shortcuts to analyze, investigate, and defend against thr
282
282
:::image type="content" source="/defender/media/entity-page-device/entity-device-response-actions.png" alt-text="Screenshot of the Action bar for the device entity page in the Microsoft Defender portal.":::
283
283
284
284
> [!IMPORTANT]
285
+
>
285
286
> -[Response actions](/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts) are only available if the device is enrolled in Microsoft Defender for Endpoint.
286
287
> - Devices that are enrolled in Microsoft Defender for Endpoint may display different numbers of response actions, based on the device's OS and version number.
287
288
288
289
Response actions run along the top of a specific device page and include:
289
290
290
-
|Action|Description|
291
-
|------ |----------- |
292
-
|**Device value**||
293
-
|**Set criticality**||
294
-
|**Manage tags**|Updates custom tags you've applied to this device.|
295
-
|**Report device inaccuracy**||
296
-
|**Run Antivirus Scan**|Updates Microsoft Defender Antivirus definitions and immediately runs an antivirus scan. Choose between Quick scan or Full scan.|
297
-
|**Collect Investigation Package**|Gathers information about the device. When the investigation is completed, you can download it.|
298
-
|**Restrict app execution**|Prevents applications that aren't signed by Microsoft from running.|
299
-
|**Initiate automated investigation**|Automatically [investigates and remediates threats](/defender-office-365/air-about). Although you can manually trigger automated investigations to run from this page, [certain alert policies](/Microsoft-365/compliance/alert-policies#default-alert-policies) trigger automatic investigations on their own.|
300
-
|**Initiate Live Response Session**|Loads a remote shell on the device for [in-depth security investigations](/defender-endpoint/live-response).|
301
-
|**Isolate device**|Isolates the device from your organization's network while keeping it connected to Microsoft Defender. You can choose to allow Outlook, Teams, and Skype for Business to run while the device is isolated, for communication purposes.|
302
-
|**Ask Defender Experts**||
303
-
|**Action Center**|Displays information about any response actions that are currently running. Only available if another action has already been selected.|
304
-
|**Download force release from isolation script**||
305
-
|**Exclude**||
306
-
|**Go hunt**||
307
-
|**Turn on troubleshooting mode**||
308
-
|**Policy sync**||
291
+
|Action|Description|
292
+
|---|---|
293
+
|**Device value**||
294
+
|**Set criticality**||
295
+
|**Manage tags**|Updates custom tags you've applied to this device.|
296
+
|**Report device inaccuracy**||
297
+
|**Run Antivirus Scan**|Updates Microsoft Defender Antivirus definitions and immediately runs an antivirus scan. Choose between Quick scan or Full scan.|
298
+
|**Collect Investigation Package**|Gathers information about the device. When the investigation is completed, you can download it.|
299
+
|**Restrict app execution**|Prevents applications that aren't signed by Microsoft from running.|
300
+
|**Initiate automated investigation**|Automatically [investigates and remediates threats](/defender-office-365/air-about). Although you can manually trigger automated investigations to run from this page, [certain alert policies](/Microsoft-365/compliance/alert-policies#default-alert-policies) trigger automatic investigations on their own.|
301
+
|**Initiate Live Response Session**|Loads a remote shell on the device for [in-depth security investigations](/defender-endpoint/live-response).|
302
+
|**Isolate device**|Isolates the device from your organization's network while keeping it connected to Microsoft Defender. You can choose to allow Outlook, Teams, and Skype for Business to run while the device is isolated, for communication purposes.|
303
+
|**Ask Defender Experts**||
304
+
|**Action Center**|Displays information about any response actions that are currently running. Only available if another action has already been selected.|
305
+
|**Download force release from isolation script**||
Copy file name to clipboardExpand all lines: exposure-management/work-attack-paths-overview.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,8 @@ Security Exposure Management is currently in public preview.
25
25
Here's how Security Exposure Management helps you to identify and resolve attack paths.
26
26
27
27
-**Attack path generation**: Security Exposure Management automatically generates attack paths based on the data collected across assets and workloads. It simulates attack scenarios, and identifies vulnerabilities and weaknesses that an attacker could exploit.
28
+
- The number of attack paths visible in the portal can fluctuate due to the dynamic nature of IT environments. Our system dynamically generates attack paths based on the real-time conditions of each customer's environment. Changes such as the addition or removal of assets, updates to configurations, a user logging on or off from a machine, a user added or removed to a group, and the implementation of new network segmentation or security policies can all influence the number and types of attack paths identified.
29
+
- This approach ensures that the security posture we provide is both accurate and reflective of the latest environment state, accommodating the agility required in today's IT environments.
28
30
-**Attack path visibility**: The attack path graph view uses [enterprise exposure graph](cross-workload-attack-surfaces.md) data to visualize the attack path to understand how potential threats might unfold.
29
31
- Hovering over each node and connector icon provides you with additional information about how the attack path is build. For instance, from an initial virtual machine containing TLS/SSL keys all the way to permissions to storage accounts.
30
32
- The [enterprise exposure map](enterprise-exposure-map.md) extends how you can visualize attack paths. Along with other data, it shows you multiple attack paths and choke points, nodes that create bottlenecks in the graph or map where attack paths converge. It visualizes exposure data, allowing you to see what assets are at risk, and where to prioritize your focus.
0 commit comments