Skip to content

Commit d0ac594

Browse files
authored
Merge branch 'main' into migrate-exclusions
2 parents ff52684 + b924bdd commit d0ac594

File tree

5 files changed

+14
-7
lines changed

5 files changed

+14
-7
lines changed

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-asr
1616
ms.custom: admindeeplinkDEFENDER
1717
search.appverid: met150
18-
ms.date: 04/30/2025
18+
ms.date: 05/08/2025
1919
---
2020

2121
# Enable attack surface reduction rules
@@ -102,7 +102,7 @@ When adding exclusions, keep these points in mind:
102102

103103
If a conflicting policy is applied via MDM and GP, the setting applied from Group Policy takes precedence.
104104

105-
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conficts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
105+
Attack surface reduction rules for managed devices now support behavior for merging settings from different policies to create a policy superset for each device. Only the settings that aren't in conflict are merged, whereas policy conflicts aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile were deployed.
106106

107107
Attack surface reduction rule merge behavior works as follows:
108108

@@ -139,6 +139,7 @@ The following procedures for enabling attack surface reduction rules include ins
139139
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140140
> - [Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141141
> - [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142+
> - [Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
142143
143144
#### Endpoint security policy (Preferred)
144145

defender-office-365/mdo-data-retention.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,16 @@ f1.keywords:
55
ms.author: dansimp
66
author: dansimp
77
manager: deniseb
8-
ms.date: 6/15/2023
8+
ms.date: 05/08/2025
99
audience: ITPro
1010
ms.topic: conceptual
1111
ms.service: defender-office-365
1212
ms.localizationpriority: medium
1313
ms.collection:
1414
- m365-security
1515
- tier2
16+
- essentials-compliance
17+
- essentials-security
1618
ms.custom:
1719
description: Admins can learn how long Defender for Office 365 features retain data.
1820
search.appverid: met150

defender-office-365/mdo-privacy.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,14 +5,15 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 09/03/2024
8+
ms.date: 05/08/2025
99
audience: ITPro
1010
ms.topic: conceptual
1111
ms.service: defender-office-365
1212
ms.localizationpriority: medium
1313
ms.collection:
1414
- m365-security
1515
- tier2
16+
- essentials-privacy
1617
ms.custom:
1718
description: Admins can learn about privacy in Defender for Office 365.
1819
search.appverid: met150

defender-vulnerability-management/defender-vulnerability-management.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,12 @@ ms.collection:
1111
- tier1
1212
- m365-security
1313
- essentials-overview
14+
- essentials-compliance
15+
- essentials-privacy
16+
- essentials-security
1417
search.appverid: met150
1518
audience: ITPro
16-
ms.date: 02/23/2025
19+
ms.date: 05/08/2025
1720
---
1821

1922
# What is Microsoft Defender Vulnerability Management

defender-vulnerability-management/retention-logic-mdvm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,10 +11,10 @@ ms.localizationpriority: medium
1111
ms.collection:
1212
- tier1
1313
- m365-security
14-
- essentials-overview
14+
- essentials-compliance
1515
search.appverid: met150
1616
audience: ITPro
17-
ms.date: 04/29/2025
17+
ms.date: 05/08/2025
1818
---
1919

2020
# Understand retention logic in Microsoft Defender Vulnerability Management

0 commit comments

Comments
 (0)