You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/deploy-defender-identity.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,9 +50,8 @@ Use the following steps to prepare for deploying Defender for Identity:
50
50
1.[Plan your Defender for Identity capacity](capacity-planning.md).
51
51
52
52
> [!TIP]
53
-
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if your environment has the necessary prerequisites.
54
-
>
55
-
> The link to the *Test-MdiReadiness.ps1* script is also available from Microsoft Defender XDR, on the **Identities > Tools** page (Preview).
53
+
> We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script to test and see if the servers in your environment have the necessary prerequisites.
54
+
> You can use the [DefenderForIdentity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/) to add the required auditing and configure the necessary settings.
56
55
57
56
## Deploy Defender for Identity
58
57
@@ -71,12 +70,12 @@ The following procedures help you complete the deployment process:
71
70
72
71
-[**Enable and configure unified role-based access control (RBAC)**](../role-groups.md) for Defender for Identity.
73
72
74
-
-[**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities
73
+
-[**Configure a Directory Service account (DSA) for use with Defender for Identity**](directory-service-accounts.md). While a DSA is optional in some scenarios, we recommend that you configure a DSA for Defender for Identity for full security coverage. For example, when you have a DSA configured, the DSA is used to connect to the domain controller at startup. A DSA can also be used to query the domain controller for data on entities seen in network traffic, monitored events, and monitored ETW activities.
75
74
76
75
-[**Configure remote calls to SAM**](remote-calls-sam.md) as needed. While this step is optional, we recommend that you configure remote calls to SAM-R for lateral movement path detection with Defender for Identity.
77
76
78
77
> [!TIP]
79
-
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, please open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
78
+
> By default, Defender for Identity sensors query the directory using LDAP on ports 389 and 3268. To switch to LDAPS on ports 636 and 3269, open a support case. For more information, see [Microsoft Defender for Identity support](../support.md).
-[View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
166
+
-[View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
167
167
-[View your app details with app governance](../app-governance-visibility-insights-view-apps.md)
168
168
-[Getting detailed information on an app](../app-governance-visibility-insights-view-apps.md#getting-detailed-information-on-an-app)
169
169
@@ -199,7 +199,7 @@ By default, there's no access or session policies deployed, and therefore no rel
199
199
200
200
For more information, see:
201
201
202
-
-[View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
202
+
-[View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
203
203
-[Protect apps with Microsoft Defender for Cloud Apps Conditional Access app control](../proxy-intro-aad.md)
204
204
-[Block and protect download of sensitive data to unmanaged or risky devices](../best-practices.md#block-and-protect-download-of-sensitive-data-to-unmanaged-or-risky-devices)
205
205
-[Secure collaboration with external users by enforcing real-time session controls](../best-practices.md#secure-collaboration-with-external-users-by-enforcing-real-time-session-controls)
@@ -231,7 +231,7 @@ Create app discovery policies to start alerting and tagging newly discovered app
231
231
232
232
For more information, see:
233
233
234
-
-[View and manage incidents and alerts](/microsoft-365/security/defender/mto-incidents-alerts)
234
+
-[View and manage incidents and alerts](/unified-secops-platform/mto-incidents-alerts)
Copy file name to clipboardExpand all lines: defender-endpoint/address-unwanted-behaviors-mde.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,7 +116,7 @@ In this scenario, a legitimate app is blocked from writing to folders that are p
116
116
117
117
In this scenario, a third-party app that isn't a threat is detected and identified as malicious by Microsoft Defender Antivirus.
118
118
119
-
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/defender-xdr/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
119
+
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/unified-secops-platform/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
120
120
121
121
### An app is incorrectly detected and identified as malicious by Defender for Endpoint
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-advancedfeats-abovefoldlink)
29
+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
30
30
31
31
Depending on the Microsoft security products that you use, some advanced features might be available for you to integrate Defender for Endpoint with.
32
32
@@ -44,7 +44,7 @@ Use the following advanced features to get better protected from potentially mal
44
44
45
45
## Restrict correlation to within scoped device groups
46
46
47
-
This configuration can be used for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access. By turning on this setting, an incident composed of alerts that cross-device groups will no longer be considered a single incident. The local SOC can then take action on the incident because they have access to one of the device groups involved. However, global SOC will see several different incidents by device group instead of one incident. We don't recommend turning on this setting unless doing so outweighs the benefits of incident correlation across the entire organization.
47
+
This configuration can be used for scenarios where local SOC operations would like to limit alert correlations only to device groups that they can access. When this setting is turned on, an incident composed of alerts that cross-device groups are no longer considered a single incident. The local SOC can then take action on the incident because they have access to one of the device groups involved. However, global SOC sees several different incidents by device group instead of one incident. We don't recommend turning on this setting unless doing so outweighs the benefits of incident correlation across the entire organization.
48
48
49
49
> [!NOTE]
50
50
> - Changing this setting impacts future alert correlations only.
@@ -57,7 +57,7 @@ Endpoint detection and response (EDR) in block mode provides protection from mal
57
57
58
58
## Automatically resolve alerts
59
59
60
-
Turn this setting on to automatically resolve alerts where no threats were found or where detected threats were remediated. If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
60
+
Turn on this setting to automatically resolve alerts where no threats were found or where detected threats were remediated. If you don't want to have alerts auto resolved, you'll need to manually turn off the feature.
61
61
62
62
> [!NOTE]
63
63
> - The result of the auto-resolve action may influence the Device risk level calculation which is based on the active alerts found on a device.
Copy file name to clipboardExpand all lines: defender-endpoint/alerts-queue-endpoint-detection-response.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ search.appverid: met150
27
27
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28
28
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29
29
30
-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
30
+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
31
31
32
32
Learn how you can view and manage the queue so that you can effectively investigate threats seen on entities such as devices, files, or user accounts.
Copy file name to clipboardExpand all lines: defender-endpoint/alerts-queue.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ search.appverid: met150
24
24
**Applies to:**
25
25
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26
26
27
-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-alertsq-abovefoldlink)
27
+
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
28
28
29
29
The **Alerts queue** shows a list of alerts that were flagged from devices in your network. By default, the queue displays alerts seen in the last 7 days in a grouped view. The most recent alerts are shown at the top of the list helping you see the most recent alerts first.
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,9 @@
2
2
title: Configure Microsoft Defender for Endpoint on Android features
3
3
description: Describes how to configure Microsoft Defender for Endpoint on Android
4
4
ms.service: defender-endpoint
5
-
ms.author: priyankagill
6
-
author: priyankagill
7
-
ms.reviewer: priyankagill
5
+
ms.author: ewalsh
6
+
author: emmwalshh
7
+
ms.reviewer: denishdonga
8
8
ms.localizationpriority: medium
9
9
manager: deniseb
10
10
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 11/22/2024
18
+
ms.date: 02/11/2025
19
19
---
20
20
21
21
# Configure Defender for Endpoint on Android features
@@ -38,6 +38,7 @@ For more information about how to set up Defender for Endpoint on Android and Co
38
38
> [!NOTE]
39
39
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
40
40
>
41
+
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
41
42
> Also, alerts for custom indicators are currently not supported for Defender for Endpoint on Android.
42
43
43
44
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
@@ -332,4 +333,5 @@ Use the following steps to configure the Device tags:
332
333
-[Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)
333
334
334
335
-[Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
336
+
335
337
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments