You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/alerts-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.reviewer: rlitinsky
10
10
11
11
## What are Microsoft Defender for Identity security alerts?
12
12
13
-
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
13
+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
14
14
15
15
> [!NOTE]
16
16
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.
Copy file name to clipboardExpand all lines: ATPDocs/deploy/activate-sensor.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ You can choose to activate eligible domain controllers either automatically, whe
25
25
|---------|---------|
26
26
|Activate new sensor |The domain controller is already onboarded to Defender for Endpoint. [Activate the sensor](#activate-the-defender-for-identity-sensor).|
27
27
|Install classic sensor|[Deploy the classic Defender for Identity sensor](install-sensor.md) from the **Sensors page**.|
28
-
|OS update is required |This domain controller is running an unsupported operating system version for the new sensor. Update the server to Windows Server 2019 or later to use the new sensor. |
28
+
|OS upgrade is required |This domain controller is running an unsupported operating system version for the new sensor. Upgrade the OS version to the latest version. |
29
29
30
30
<!--|Download onboarding package |[Onboard the domain controller to Defender for Endpoint](#onboard-the-domain-controller).|-->
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/caac-known-issues.md
+28Lines changed: 28 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,6 +114,34 @@ A user who starts a session in Edge with a profile other than his work profile,
114
114
115
115
If the URL points to a resource within the secured application, the user will be directed to the application's homepage in Edge.
116
116
117
+
### Outdated session policy enforcement with Edge
118
+
When a session policy is enforced using Edge in-browser protection and the user is later removed from the corresponding Conditional Access (CA) policy, the original session enforcement may still persist.
119
+
120
+
Example Scenario:
121
+
122
+
A user was originally assigned a CA policy for Salesforce along with a Defender for Cloud Apps session policy to block file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
123
+
124
+
Although the admin later removed the CA policy, the user still experiences the download block in Edge due to cached policy data.
125
+
126
+
Mitigation Options:
127
+
128
+
Option 1: Automatic cleanup
129
+
1. Add the user/app back into the scope of the CA policy.
130
+
2. Remove the corresponding Defender for Cloud Apps session policy.
131
+
3. Wait for users to access the application using Edge. This will automatically trigger the policy removal.
132
+
4. Remove the user/app from the scope of the CA policy.
133
+
134
+
Option 2: Delete the cached policy file (Manual cleanup)
135
+
1. Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
136
+
2. Delete the file: mda_store.1.txt
137
+
138
+
Option 3: Remove the work profile in Edge (Manual cleanup)
139
+
1. Open Edge.
140
+
2. Navigate to Profile Settings.
141
+
3. Delete the work profile associated with the outdated session policy.
142
+
143
+
These steps will force a policy refresh and resolve enforcement issues related to outdated session policies.
144
+
117
145
## Related content
118
146
119
147
-[Conditional Access app control in Microsoft Defender for Cloud Apps](proxy-intro-aad.md)
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+3-69Lines changed: 3 additions & 69 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -179,29 +179,6 @@ From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're
179
179
- For Android Enterprise with a work profile, only apps installed on the work profile will be supported.
180
180
- For other BYOD modes, by default, vulnerability assessment of apps will **not** be enabled. However, when the device is on administrator mode, admins can explicitly enable this feature through Microsoft Intune to get the list of apps installed on the device. For more information, see details below.
181
181
182
-
### Configure privacy for device administrator mode
183
-
184
-
Use the following steps to **enable vulnerability assessment of apps** from devices in **device administrator** mode for targeted users.
185
-
186
-
> [!NOTE]
187
-
> By default, this is turned off for devices enrolled with device admin mode.
188
-
189
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
201
-
- Value: Enter 0 to disable privacy setting (By default, the value is 1)
202
-
203
-
4. Select **Next** and assign this profile to targeted devices/users.
204
-
205
182
### Configure privacy for Android Enterprise work profile
206
183
207
184
Defender for Endpoint supports vulnerability assessment of apps in the work profile. However, in case you want to turn off this feature for targeted users, you can use the following steps:
@@ -222,28 +199,6 @@ Turning the above privacy controls on or off won't affect the device compliance
222
199
223
200
Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
224
201
225
-
### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
226
-
227
-
Use the following steps to turn it on for targeted users:
228
-
229
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
241
-
- Value: Enter 1 to enable privacy setting. The default value is 0.
242
-
243
-
4. Select **Next** and assign this profile to targeted devices/users.
244
-
245
-
Using this privacy control won't affect the device compliance check or conditional access.
246
-
247
202
### Configure privacy for phishing alert report on Android Enterprise work profile
248
203
249
204
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -263,28 +218,6 @@ Turning the above privacy controls on or off won't affect the device compliance
263
218
264
219
Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
265
220
266
-
### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
267
-
268
-
Use the following steps to turn it on for targeted users:
269
-
270
-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
- Data type: Select Integer in the drop-down list.
282
-
- Value: Enter 1 to enable privacy setting. The default value is 0.
283
-
284
-
4. Select **Next** and assign this profile to targeted devices/users.
285
-
286
-
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
287
-
288
221
### Configure privacy for malware alert report on Android Enterprise work profile
289
222
290
223
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -308,9 +241,10 @@ Use the following steps to configure Disable out sign:
308
241
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
309
242
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
310
243
3. Select **Microsoft Defender for Endpoint** as the target app.
311
-
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
244
+
1. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
312
245
313
-
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
246
+
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles.
247
+
314
248
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
315
249
316
250
5. Select **Next** and assign this profile to targeted devices and users.
Copy file name to clipboardExpand all lines: defender-endpoint/android-intune.md
+1-52Lines changed: 1 addition & 52 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,58 +33,7 @@ Learn how to deploy Defender for Endpoint on Android on Microsoft Intune Company
33
33
34
34
> [!NOTE]
35
35
> **Defender for Endpoint on Android is now available on [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.scmx)**
36
-
>
37
-
> You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across device administrator and Android Enterprise enrollment modes. Updates to the app are automatic via Google Play.
38
-
39
-
## Deploy on Device Administrator enrolled devices
40
-
41
-
Learn how to deploy Defender for Endpoint on Android by using the Microsoft Intune Company Portal for device administrator enrolled devices.
42
-
43
-
### Add as Android store app
44
-
45
-
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps**\>**Android Apps**\>**Add**\>**Android store app**. Then choose **Select**.
46
-
47
-
:::image type="content" source="media/mda-addandroidstoreapp.png" alt-text="The Add Android store application pane in the Microsoft Intune admin center portal" lightbox="media/mda-addandroidstoreapp.png":::
48
-
49
-
2. On the **Add app** page, in the **App Information** section specify the following details:
50
-
51
-
-**Name**
52
-
-**Description**
53
-
-**Publisher** as Microsoft.
54
-
-**App store URL** as `https://play.google.com/store/apps/details?id=com.microsoft.scmx` (URL for the Defender for Endpoint app in the Google Play Store)
55
-
56
-
Other fields are optional. Then select **Next**.
57
-
58
-
:::image type="content" source="media/mda-addappinfo.png" alt-text=" The Add App page displaying the application's publisher and URL information in the Microsoft Intune admin center portal" lightbox="media/mda-addappinfo.png":::
59
-
60
-
3. In the **Assignments** section, go to the **Required** section and select **Add group.** You can then choose the user group (or groups) to receive the Defender for Endpoint on Android app. Choose **Select**, and then tap **Next**.
61
-
62
-
The selected user group should consist of Intune enrolled users.
63
-
64
-
:::image type="content" source="media/363bf30f7d69a94db578e8af0ddd044b.png" alt-text="Screenshot that shows the Add group pane in the Add App page in the Microsoft Intune admin center portal." lightbox="media/363bf30f7d69a94db578e8af0ddd044b.png":::
65
-
66
-
4. In the **Review+Create** section, verify that all the information entered is correct, and then select **Create**.
67
-
68
-
In a few moments, the Defender for Endpoint app should be created, and a notification should appear in the upper right corner of the screen.
69
-
70
-
:::image type="content" source="media/86cbe56f88bb6e93e9c63303397fc24f.png" alt-text="The application status pane in the Microsoft Intune admin center portal" lightbox="media/86cbe56f88bb6e93e9c63303397fc24f.png":::
71
-
72
-
5. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation completed successfully.
73
-
74
-
:::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
75
-
76
-
### Complete onboarding and check status
77
-
78
-
1. After Defender for Endpoint on Android is installed on the device, you should see the app icon.
79
-
80
-
:::image type="content" source="media/7cf9311ad676ec5142002a4d0c2323ca.jpg" alt-text="The Microsoft Defender ATP icon listed in the Search pane" lightbox="media/7cf9311ad676ec5142002a4d0c2323ca.jpg":::
81
-
82
-
2. Tap the Microsoft Defender for Endpoint app icon, and follow the on-screen instructions to complete onboarding. The details include end-user acceptance of Android permissions required by Defender for Endpoint on Android.
83
-
84
-
3. Upon successful onboarding, the device shows up in the list of devices in the [Microsoft Defender portal](https://security.microsoft.com).
85
-
86
-
:::image type="content" source="media/9fe378a1dce0f143005c3aa53d8c4f51.png" alt-text="A device in the Microsoft Defender for Endpoint portal" lightbox="media/9fe378a1dce0f143005c3aa53d8c4f51.png":::
87
-
36
+
> > You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across device administrator and Android Enterprise enrollment modes. Updates to the app are automatic via Google Play.
88
37
## Deploy on Android Enterprise enrolled devices
89
38
90
39
Defender for Endpoint on Android supports Android Enterprise enrolled devices.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -384,6 +384,8 @@ Once the client versions are deployed to target iOS devices, processing starts.
384
384
385
385
> [!NOTE]
386
386
> If you're using SSL inspection solution within your iOS device, add the domain names `securitycenter.windows.com` (in commercial environments) and `securitycenter.windows.us` (in GCC environments) for threat and vulnerability management features to work.
387
+
>
388
+
> The TVM Privacy permission approval screen will only appear for Unsupervised and Non-Zero touch enabled devices. Even For Non-Zero touch enabled devices approval is __not required only on supervised devices__ where the `issupervised` key is configured
0 commit comments