Skip to content

Commit d0c3f4b

Browse files
committed
pulling from upstream
2 parents f5ff4ec + fac564a commit d0c3f4b

File tree

298 files changed

+1493
-668
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

298 files changed

+1493
-668
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,31 @@
170170
"redirect_url": "/defender-xdr/",
171171
"redirect_document_id": false
172172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
173198
{
174199
"source_path": "defender-xdr/tickets.md",
175200
"redirect_url": "/defender-xdr/troubleshoot",
@@ -180,10 +205,60 @@
180205
"redirect_url": "/defender-xdr/troubleshoot",
181206
"redirect_document_id": false
182207
},
208+
{
209+
"source_path": "defender-xdr/mto-advanced-hunting.md",
210+
"redirect_url": "/unified-secops-platform/mto-advanced-hunting",
211+
"redirect_document_id": false
212+
},
213+
{
214+
"source_path": "defender-xdr/mto-dashboard.md",
215+
"redirect_url": "/unified-secops-platform/mto-dashboard",
216+
"redirect_document_id": false
217+
},
218+
{
219+
"source_path": "defender-xdr/mto-endpoint-security-policy.md",
220+
"redirect_url": "/unified-secops-platform/mto-endpoint-security-policy",
221+
"redirect_document_id": false
222+
},
223+
{
224+
"source_path": "defender-xdr/mto-incidents-alerts.md",
225+
"redirect_url": "/unified-secops-platform/mto-incidents-alerts",
226+
"redirect_document_id": false
227+
},
228+
{
229+
"source_path": "defender-xdr/mto-overview.md",
230+
"redirect_url": "/unified-secops-platform/mto-overview",
231+
"redirect_document_id": false
232+
},
233+
{
234+
"source_path": "defender-xdr/mto-requirements.md",
235+
"redirect_url": "/unified-secops-platform/mto-requirements",
236+
"redirect_document_id": false
237+
},
238+
{
239+
"source_path": "defender-xdr/mto-tenant-devices.md",
240+
"redirect_url": "/unified-secops-platform/mto-tenant-devices",
241+
"redirect_document_id": false
242+
},
243+
{
244+
"source_path": "defender-xdr/mto-tenantgroups.md",
245+
"redirect_url": "/unified-secops-platform/mto-tenantgroups",
246+
"redirect_document_id": false
247+
},
248+
{
249+
"source_path": "defender-xdr/mto-tenants.md",
250+
"redirect_url": "/unified-secops-platform/mto-tenants",
251+
"redirect_document_id": false
252+
},
183253
{
184254
"source_path": "defender-xdr/portals.md",
185255
"redirect_url": "/unified-secops-platform/overview-plan#understand-microsoft-security-portals-and-admin-centers",
186256
"redirect_document_id": false
257+
},
258+
{
259+
"source_path": "defender-xdr/microsoft-sentinel-onboard.md",
260+
"redirect_url": "/unified-secops-platform/microsoft-sentinel-onboard",
261+
"redirect_document_id": false
187262
}
188263
]
189264
}
-43.2 KB
Binary file not shown.

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,8 @@ Use the following steps to prepare for deploying Defender for Identity:
5050
1. [Plan your Defender for Identity capacity](capacity-planning.md).
5151

5252
> [!TIP]
53-
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.
54-
>
55-
> The link to the *Test-MdiReadiness.ps1* script is also available from Microsoft Defender XDR, on the **Identities > Tools** page (Preview).
53+
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
54+
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
5655
5756
## Deploy Defender for Identity
5857

@@ -71,12 +70,12 @@ The following procedures help you complete the deployment process:
7170

7271
- [**Enable and configure unified role-based access control (RBAC)**](../role-groups.md) for Defender for Identity.
7372

74-
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities
73+
- [**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities.
7574

7675
- [**Configure remote calls to SAM**](remote-calls-sam.md) as needed. While this step is optional, we recommend that you configure remote calls to SAM-R for lateral movement path detection with Defender for Identity.
7776

7877
> [!TIP]
79-
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, please open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
78+
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
8079
>
8180
8281
> [!IMPORTANT]

CloudAppSecurityDocs/ops-guide/ops-guide-daily.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ Based on the data you review, you might want to create new or adjust app governa
146146

147147
For more information, see:
148148

149-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
149+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
150150
- [View your app details with app governance](../app-governance-visibility-insights-view-apps.md)
151151
- [Create app policies in app governance](../app-governance-app-policies-create.md).
152152

@@ -163,7 +163,7 @@ App governance uses machine learning-based detection algorithms to detect anomal
163163

164164
For more information, see:
165165

166-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
166+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
167167
- [View your app details with app governance](../app-governance-visibility-insights-view-apps.md)
168168
- [Getting detailed information on an app](../app-governance-visibility-insights-view-apps.md#getting-detailed-information-on-an-app)
169169

@@ -199,7 +199,7 @@ By default, there's no access or session policies deployed, and therefore no rel
199199

200200
For more information, see:
201201

202-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
202+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
203203
- [Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](../proxy-intro-aad.md)
204204
- [Block and protect download of sensitive data to unmanaged or risky devices](../best-practices.md#block-and-protect-download-of-sensitive-data-to-unmanaged-or-risky-devices)
205205
- [Secure collaboration with external users by enforcing real-time session controls](../best-practices.md#secure-collaboration-with-external-users-by-enforcing-real-time-session-controls)
@@ -231,7 +231,7 @@ Create app discovery policies to start alerting and tagging newly discovered app
231231
232232
For more information, see:
233233

234-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
234+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
235235
- [Cloud discovery policies](../policies-cloud-discovery.md)
236236
- [Create cloud discovery policies](../cloud-discovery-policies.md)
237237
- [Set up cloud discovery](../set-up-cloud-discovery.md)
@@ -298,7 +298,7 @@ Use the results of these queries to adjust existing file policies or create new
298298

299299
For more information, see:
300300

301-
- [View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
301+
- [View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
302302
- [Information protection policies](../policies-information-protection.md).
303303

304304
## Related content

defender-endpoint/TOC.yml

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -234,6 +234,8 @@
234234
href: mac-troubleshoot-mode.md
235235
- name: Troubleshoot macOS installation issues
236236
href: mac-support-install.md
237+
- name: Troubleshoot macOS configuration
238+
href: mac-support-configuration.md
237239
- name: Troubleshoot macOS performance issues overview
238240
href: mac-support-perf-overview.md
239241
displayName: Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
@@ -259,7 +261,7 @@
259261
items:
260262
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
261263
href: mde-linux-arm.md
262-
- name: Installer script
264+
- name: Installer script based deployment
263265
href: linux-installer-script.md
264266
- name: Ansible based deployment
265267
href: linux-install-with-ansible.md
@@ -1532,17 +1534,21 @@
15321534
- name: Microsoft Security Resources
15331535
items:
15341536
- name: Threat actor naming
1535-
href: /defender-xdr/microsoft-threat-actor-naming
1537+
href: /unified-secops-platform/microsoft-threat-actor-naming
1538+
15361539
- name: Malware names
1537-
href: /defender-xdr/malware-naming
1540+
href: /unified-secops-platform/malware-naming
1541+
15381542
- name: How Microsoft identifies malware and PUA
15391543
href: /defender-xdr/criteria
15401544
- name: Submit files for analysis
1541-
href: /defender-xdr/submission-guide
1545+
href: /unified-secops-platform/submission-guide
1546+
15421547
- name: Troubleshoot MSI portal errors caused by admin block
15431548
href: /defender-xdr/portal-submission-troubleshooting
15441549
- name: Microsoft virus initiative
1545-
href: /defender-xdr/virus-initiative-criteria
1550+
href: /unified-secops-platform/virus-initiative-criteria
1551+
15461552
- name: Software developer FAQ
15471553
href: /defender-xdr/developer-faq
15481554
- name: Malware information

defender-endpoint/address-unwanted-behaviors-mde.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ In this scenario, a legitimate app is blocked from writing to folders that are p
116116

117117
In this scenario, a third-party app that isn't a threat is detected and identified as malicious by Microsoft Defender Antivirus.
118118

119-
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/defender-xdr/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
119+
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/unified-secops-platform/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
120120

121121
### An app is incorrectly detected and identified as malicious by Defender for Endpoint
122122

defender-endpoint/advanced-features.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ ms.date: 10/17/2024
2626
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2727

2828

29-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-advancedfeats-abovefoldlink)
29+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030
3131
Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Defender for Endpoint with.
3232

@@ -44,7 +44,7 @@ Use the following advanced features to get better protected from potentially mal
4444

4545
## Restrict correlation to within scoped device groups
4646

47-
This configuration can be used for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access. By turning on this setting, an incident composed of alerts that cross-device groups will no longer be considered a single incident. The local SOC can then take action on the incident because they have access to one of the device groups involved. However, global SOC will see several different incidents by device group instead of one incident. We don't recommend turning on this setting unless doing so outweighs the benefits of incident correlation across the entire organization.
47+
This configuration can be used for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access. When this setting is turned on, an incident composed of alerts that cross-device groups are no longer considered a single incident. The local SOC can then take action on the incident because they have access to one of the device groups involved. However, global SOC sees several different incidents by device group instead of one incident. We don't recommend turning on this setting unless doing so outweighs the benefits of incident correlation across the entire organization.
4848

4949
> [!NOTE]
5050
> - Changing this setting impacts future alert correlations only.
@@ -57,7 +57,7 @@ Endpoint detection and response (EDR) in block mode provides protection from mal
5757

5858
## Automatically resolve alerts
5959

60-
Turn this setting on to automatically resolve alerts where no threats were found or where detected threats were remediated. If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
60+
Turn on this setting to automatically resolve alerts where no threats were found or where detected threats were remediated. If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
6161

6262
> [!NOTE]
6363
> - The result of the auto-resolve action may influence the Device risk level calculation which is based on the active alerts found on a device.

defender-endpoint/alerts-queue-endpoint-detection-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ search.appverid: met150
2727
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2828
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2929

30-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
30+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131
3232
Learn how you can view and manage the queue so that you can effectively investigate threats seen on entities such as devices, files, or user accounts.
3333

defender-endpoint/alerts-queue.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ search.appverid: met150
2424
**Applies to:**
2525
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2626

27-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-alertsq-abovefoldlink)
27+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
2828
2929
The **Alerts queue** shows a list of alerts that were flagged from devices in your network. By default, the queue displays alerts seen in the last 7 days in a grouped view. The most recent alerts are shown at the top of the list helping you see the most recent alerts first.
3030

defender-endpoint/android-configure.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Configure Microsoft Defender for Endpoint on Android features
33
description: Describes how to configure Microsoft Defender for Endpoint on Android
44
ms.service: defender-endpoint
5-
ms.author: priyankagill
6-
author: priyankagill
7-
ms.reviewer: priyankagill
5+
ms.author: ewalsh
6+
author: emmwalshh
7+
ms.reviewer: denishdonga
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 11/22/2024
18+
ms.date: 02/11/2025
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -38,6 +38,7 @@ For more information about how to set up Defender for Endpoint on Android and Co
3838
> [!NOTE]
3939
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
4040
>
41+
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
4142
> Also, alerts for custom indicators are currently not supported for Defender for Endpoint on Android.
4243
4344
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
@@ -332,4 +333,5 @@ Use the following steps to configure the Device tags:
332333
- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)
333334

334335
- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
336+
335337
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)