Skip to content

Commit dc11b67

Browse files
committed
Merge branch 'main' into diannegali-mdecustomapk
2 parents c449f3e + 038119f commit dc11b67

18 files changed

+215
-119
lines changed

defender-endpoint/TOC.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -108,15 +108,15 @@
108108
items:
109109
- name: Overview
110110
href: mde-planning-guide.md
111-
- name: Step 1 - Set up Defender for Endpoint deployment
111+
- name: Step 1 - Prepare for deployment
112112
href: production-deployment.md
113113
- name: Step 2 - Assign roles and permissions
114114
href: prepare-deployment.md
115-
- name: Step 3 - Identify your architecture and deployment method
115+
- name: Step 3 - Identify your architecture and select a deployment method
116116
href: deployment-strategy.md
117-
- name: Step 4 - Onboard devices
117+
- name: Step 4 - Onboard devices to Defender for Endpoint
118118
href: onboarding.md
119-
- name: Step 5 - Configure Microsoft Defender for Endpoint capabilities
119+
- name: Step 5 - Configure Defender for Endpoint capabilities
120120
href: onboard-configure.md
121121

122122
- name: Onboard and configure devices

defender-endpoint/controlled-folders.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from changes through malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 03/04/2025
6+
ms.date: 04/15/2025
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -38,6 +38,7 @@ search.appverid: met150
3838
## What is controlled folder access?
3939

4040
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on:
41+
4142
- Windows 11
4243
- Windows 10
4344
- Windows Server 2025
@@ -92,8 +93,10 @@ Default folders appear in the user's profile, under **This PC**, as shown in the
9293

9394
![Protected Windows default systems folders](media/defaultfolders.png)
9495

96+
The same profile folders are also protected for system accounts, such as `LocalService`, `NetworkService`, `systemprofile`, and so on. For example, `C:\Windows\System32\config\systemprofile\Documents` is also protected (if it exists).
97+
9598
> [!NOTE]
96-
> You can configure more folders as protected, but you can't remove the Windows system folders that are protected by default.
99+
> You can configure more folders as protected, but you can't remove Windows system folders that are protected by default.
97100
98101
## Requirements for controlled folder access
99102

@@ -150,7 +153,7 @@ You can use the Windows Security app to view the list of folders that are protec
150153

151154
4. If controlled folder access is turned off, you need to turn it on. Select **protected folders**.
152155

153-
5. Do one of the following steps:
156+
5. Take one of the following steps:
154157

155158
- To add a folder, select **+ Add a protected folder**.
156159
- To remove a folder, select it, and then select **Remove**.

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ This playbook is a simple guide to help you make the most of your free trial. Us
6969

7070
To make sure your Defender for Endpoint subscription is properly provisioned, you can check your license state in either the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) or Microsoft Entra ID ([https://portal.azure.com](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products)).
7171

72-
[Check your license state](production-deployment.md#check-license-state).
72+
[Check your license state](production-deployment.md#check-your-license-state).
7373

7474
## Step 2: Set up role-based access control and grant permissions to your security team
7575

defender-endpoint/deployment-strategy.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Identify Defender for Endpoint architecture and deployment method
2+
title: Identify your architecture and select a deployment method for Defender for Endpoint
33
description: Select the best Microsoft Defender for Endpoint deployment strategy for your environment.
44
ms.service: defender-endpoint
55
ms.author: deniseb
@@ -13,10 +13,10 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 12/12/2024
16+
ms.date: 04/15/2025
1717
---
1818

19-
# Identify Defender for Endpoint architecture and deployment method
19+
# Identify your architecture and select a deployment method for Defender for Endpoint
2020

2121
**Applies to:**
2222

@@ -26,7 +26,7 @@ ms.date: 12/12/2024
2626

2727
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
2828
29-
If you're already completed the steps to set up your Microsoft Defender for Endpoint deployment, and you have assigned roles and permissions for Defender for Endpoint, your next step is to create a plan for onboarding. Your plan begins with identifying your architecture and choosing your deployment method.
29+
If you're already completed the steps to [prepare your environment for Defender for Endpoint](production-deployment.md), and you have [assigned roles and permissions for Defender for Endpoint](prepare-deployment.md), your next step is to create a plan for onboarding. This plan should begin with identifying your architecture and choosing your deployment method.
3030

3131
We understand that every enterprise environment is unique, so we've provided several options to give you the flexibility in choosing how to deploy the service. Deciding how to onboard endpoints to the Defender for Endpoint service comes down to two important steps:
3232

@@ -43,21 +43,27 @@ Depending on your environment, some tools are better suited for certain architec
4343
|**On-premises**|For enterprises who want to take advantage of the cloud-based capabilities of Microsoft Defender for Endpoint while also maximizing their investments in Configuration Manager or Active Directory Domain Services, we recommend this architecture.|
4444
|**Evaluation and local onboarding**|We recommend this architecture for SOCs (Security Operations Centers) who are looking to evaluate or run a Microsoft Defender for Endpoint pilot, but don't have existing management or deployment tools. This architecture can also be used to onboard devices in small environments without management infrastructure, such as a DMZ (Demilitarized Zone).|
4545

46-
## Step 2: Select deployment method
46+
## Step 2: Select your deployment method
4747

48-
Once you have determined the architecture of your environment and have created an inventory as outlined in the [requirements section](mde-planning-guide.md#requirements), use the table below to select the appropriate deployment tools for the endpoints in your environment. This will help you plan the deployment effectively.
48+
Once you have determined the architecture of your environment and have created an inventory as outlined in the [requirements section](mde-planning-guide.md#requirements), use the table below to select the appropriate deployment tools for the endpoints in your environment. This information will help you plan the deployment effectively.
4949

5050
|Endpoint|Deployment tool|
5151
|---|---|
52-
|**Windows**|[Local script (up to 10 devices)](configure-endpoints-script.md) <br/> [Group Policy](configure-endpoints-gp.md) <br/> [Microsoft Intune/ Mobile Device Manager](configure-endpoints-mdm.md) <br/> [Microsoft Configuration Manager](configure-endpoints-sccm.md) <br/> [VDI scripts](configure-endpoints-vdi.md)|
53-
|**Windows servers<br/>Linux servers** <br/>(Requires a server license) | [Onboard Windows devices using a local script](configure-endpoints-script.md)<br/>[Integration with Microsoft Defender for Cloud](azure-server-integration.md) |
54-
|**macOS**|[Local script](mac-install-manually.md) <br/> [Microsoft Intune](mac-install-with-intune.md) <br/> [JAMF Pro](mac-install-with-jamf.md) <br/> [Mobile Device Management](mac-install-with-other-mdm.md)|
55-
|**Linux servers**|[Local script](linux-install-manually.md) <br/> [Puppet](linux-install-with-puppet.md) <br/> [Ansible](linux-install-with-ansible.md) <br/> [Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/> [Saltstack](linux-install-with-saltack.md)<br/>[Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)|
52+
| **Windows client devices** |[Microsoft Intune / Mobile Device Management (MDM)](configure-endpoints-mdm.md) <br/>[Microsoft Configuration Manager](configure-endpoints-sccm.md)<br/>[Local script (up to 10 devices)](configure-endpoints-script.md)<br/>[Group Policy](configure-endpoints-gp.md)<br/>[Non-persistent virtual desktop infrastructure (VDI) devices](configure-endpoints-vdi.md)<br/>[Azure Virtual Desktop](onboard-windows-multi-session-device.md)<br/>[System Center Endpoint Protection and Microsoft Monitoring Agent](onboard-downlevel.md) (for previous versions of Windows) |
53+
|**Windows Server** <br/>(Requires a server plan) | [Local script](configure-endpoints-script.md)<br/>[Integration with Microsoft Defender for Cloud](azure-server-integration.md)<br/>[Guidance for Windows Server with SAP](mde-sap-windows-server.md) |
54+
|**macOS**| [Intune](mac-install-with-intune.md)<br/>[JAMF Pro](mac-install-with-jamf.md) <br/>[Local script](mac-install-manually.md)(manual deployment) <br/>[MDM tools](mac-install-with-other-mdm.md)|
55+
|**Linux server**<br/>(Requires a server plan)|[Installer script based deployment](linux-installer-script.md)<br/>[Ansible](linux-install-with-ansible.md)<br/>[Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/>[Puppet](linux-install-with-puppet.md) <br/>[Saltstack](linux-install-with-saltack.md)<br/>[Manual deployment](linux-install-manually.md)<br/>[Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)<br/>[Guidance for ARM64-based devices (preview)](mde-linux-arm.md)<br/>[Guidance for Linux with SAP](mde-linux-deployment-on-sap.md)|
5656
|**Android**|[Microsoft Intune](android-intune.md)|
5757
|**iOS**|[Microsoft Intune](ios-install.md) <br/> [Mobile Application Manager](ios-install-unmanaged.md) |
5858

5959
> [!NOTE]
60-
> For devices that aren't managed by Microsoft Intune or Microsoft Configuration Manager, you can use the Security Management for Microsoft Defender for Endpoint to receive security configurations for Microsoft Defender directly from Intune.
60+
> For devices that aren't managed by Intune or Configuration Manager, you can use the Defender for Endpoint Security Settings Management to receive security configurations directly from Intune.
61+
> To onboard servers to Defender for Endpoint, [server licenses](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-defender-for-endpoint) are required. You can choose from these options:
62+
>
63+
> - [Microsoft Defender for Servers Plan 1 or Plan 2](/azure/defender-for-cloud/defender-for-servers-overview) (as part of the Defender for Cloud) offering
64+
> - Microsoft Defender for Endpoint for servers
65+
> - [Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers) (for small and medium-sized businesses only)
66+
6167

6268
## Next step
6369

defender-endpoint/linux-install-manually.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -151,13 +151,13 @@ In order to preview new features and provide early feedback, it's recommended th
151151
1. Install `curl` if it isn't installed yet:
152152

153153
```bash
154-
sudo apt-get install curl
154+
sudo apt install curl
155155
```
156156

157157
2. Install `libplist-utils` if it isn't installed yet:
158158

159159
```bash
160-
sudo apt-get install libplist-utils
160+
sudo apt install libplist-utils
161161
```
162162

163163
> [!NOTE]
@@ -193,13 +193,13 @@ In order to preview new features and provide early feedback, it's recommended th
193193
5. Install the `gpg` package if not already installed:
194194

195195
```bash
196-
sudo apt-get install gpg
196+
sudo apt install gpg
197197
```
198198

199199
If `gpg` isn't available, then install `gnupg`.
200200

201201
```bash
202-
sudo apt-get install gnupg
202+
sudo apt install gnupg
203203
```
204204

205205
6. Install the Microsoft GPG public key:
@@ -219,13 +219,13 @@ In order to preview new features and provide early feedback, it's recommended th
219219
7. Install the HTTPS driver if not already installed:
220220

221221
```bash
222-
sudo apt-get install apt-transport-https
222+
sudo apt install apt-transport-https
223223
```
224224

225225
8. Update the repository metadata:
226226

227227
```bash
228-
sudo apt-get update
228+
sudo apt update
229229
```
230230

231231
### Mariner
@@ -313,7 +313,7 @@ sudo zypper install packages-microsoft-com-prod:mdatp
313313
### Ubuntu and Debian systems
314314

315315
```bash
316-
sudo apt-get install mdatp
316+
sudo apt install mdatp
317317
```
318318

319319
> [!NOTE]
@@ -551,7 +551,7 @@ For manual uninstallation, execute the following command for your Linux distribu
551551
552552
- `sudo yum remove mdatp` for RHEL and variants(CentOS and Oracle Linux).
553553
- `sudo zypper remove mdatp` for SLES and variants.
554-
- `sudo apt-get purge mdatp` for Ubuntu and Debian systems.
554+
- `sudo apt purge mdatp` for Ubuntu and Debian systems.
555555
- `sudo dnf remove mdatp` for Mariner
556556
557557
## See also

defender-endpoint/linux-install-with-ansible.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ ansible-playbook -i /etc/ansible/hosts /etc/ansible/playbooks/install_mdatp.yml
216216
217217
- name: MDE Deployed
218218
debug:
219-
msg: "MDE succesfully deployed"
219+
msg: "MDE succesfully deployed"
220220
```
221221
222222
### How to uninstall Microsoft Defender for Endpoint on Linux Servers
135 KB
Loading

defender-endpoint/onboarding.md

Lines changed: 15 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Onboard to Microsoft Defender for Endpoint
2+
title: Onboard devices to Microsoft Defender for Endpoint
33
description: Learn how to onboard endpoints to Microsoft Defender for Endpoint service.
44
ms.service: defender-endpoint
55
ms.author: deniseb
@@ -20,7 +20,7 @@ search.appverid: met150
2020
ms.date: 04/03/2024
2121
---
2222

23-
# Onboard to Microsoft Defender for Endpoint
23+
# Onboard devices to Microsoft Defender for Endpoint
2424

2525
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2626

@@ -35,16 +35,21 @@ ms.date: 04/03/2024
3535
3636
## Onboard devices using any of the supported management tools
3737

38-
The deployment tool you use influences how you onboard endpoints to the service.
38+
The deployment tool you use influences how you onboard endpoints to the service. Refer to your selected [deployment method](deployment-strategy.md#step-2-select-your-deployment-method).
3939

40-
To start onboarding your devices:
40+
If you're onboarding devices in the Microsoft Defender portal, follow these steps:
4141

42-
1. Go to [Select deployment method](deployment-strategy.md#step-2-select-deployment-method).
43-
2. Choose the Operating System for the devices you wish to Onboard.
44-
3. Select the tool you plan to use.
45-
4. Follow the instructions to Onboard your devices.
42+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
4643

47-
This video provides a quick overview of the onboarding process and the different tools and methods.
44+
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
45+
46+
2. Under **Select operating system to start onboarding process**, select the operating system for the device.
47+
48+
3. Under **Connectivity type**, select either **Streamlined** or **Standard**. (See [prerequisites for streamlined connectivity](/defender-endpoint/configure-device-connectivity#prerequisites).)
49+
50+
4. Under **Deployment method**, select an option. Then download the onboarding package (and installation package, if there is one available). Follow the instructions to onboard your devices.
51+
52+
The following video provides a quick overview of the onboarding process and the different tools and methods:
4853

4954
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2524ee5d-6a5f-482c-8f69-dc3792577c60]
5055
@@ -59,7 +64,7 @@ This table provides an example of the deployment rings you might use:
5964
|Deployment ring|Description|
6065
|---|---|
6166
|Evaluate|Ring 1: Identify 50 devices to onboard to the service for testing.|
62-
|Pilot|Ring 2: Identify and onboard the next 50-100 endpoints in a production environment. Microsoft Defender for Endpoint supports various endpoints that you can onboard to the service, for more information, see [Select deployment method](deployment-strategy.md#step-2-select-deployment-method).|
67+
|Pilot|Ring 2: Identify and onboard the next 50-100 endpoints in a production environment. Microsoft Defender for Endpoint supports various endpoints that you can onboard to the service, for more information, see [Select deployment method](deployment-strategy.md#step-2-select-your-deployment-method).|
6368
|Full deployment|Ring 3: Roll out service to the rest of environment in larger increments. For more information, see [Get started with your Microsoft Defender for Endpoint deployment](mde-planning-guide.md).
6469

6570
### Exit criteria

0 commit comments

Comments
 (0)