Skip to content

Commit deedf2b

Browse files
authored
Merge branch 'main' into mde-mac-overview
2 parents 5af6e65 + 1d116c4 commit deedf2b

File tree

51 files changed

+601
-407
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+601
-407
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5+
pull-requests: read
56

67
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
78
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1009,6 +1009,11 @@
10091009
"source_path": "CloudAppSecurityDocs/troubleshooting-api-connectors-using-error-messages.md",
10101010
"redirect_url": "/defender-cloud-apps/troubleshooting-api-connectors-errors",
10111011
"redirect_document_id": true
1012-
}
1012+
},
1013+
{
1014+
"source_path": "CloudAppSecurityDocs/connector-platform.md",
1015+
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
1016+
"redirect_document_id": true
1017+
},
10131018
]
10141019
}

CloudAppSecurityDocs/connector-platform.md

Lines changed: 0 additions & 60 deletions
This file was deleted.

CloudAppSecurityDocs/protect-servicenow.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Protect your ServiceNow environment | Microsoft Defender for Cloud Apps
33
description: Learn how about connecting your ServiceNow app to Defender for Cloud Apps using the API connector.
4-
ms.date: 04/28/2025
4+
ms.date: 05/05/2025
55
ms.topic: how-to
66
---
77

@@ -97,6 +97,7 @@ Defender for Cloud Apps supports the following ServiceNow versions:
9797
- Kingston
9898
- London
9999
- Utah
100+
- Yokohama
100101
:::column-end:::
101102
:::column:::
102103
- Madrid

CloudAppSecurityDocs/toc.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,6 @@ items:
6262
- name: Overview
6363
displayName: connect apps
6464
href: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
65-
- name: Custom connectors with the open app connector platform
66-
href: ./connector-platform.md
6765
- name: Asana
6866
href: protect-asana.md
6967
- name: Atlassian

defender-endpoint/TOC.yml

Lines changed: 27 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -254,14 +254,14 @@
254254
href: manage-sys-extensions-using-jamf.md
255255
- name: Manual deployment
256256
href: manage-sys-extensions-manual-deployment.md
257-
257+
258258
- name: Defender for Endpoint on Linux
259259
items:
260260
- name: Deploy Defender for Endpoint on Linux
261261
items:
262-
- name: 1 - Prerequisites
262+
- name: Prerequisites
263263
href: mde-linux-prerequisites.md
264-
- name: 2 - Choose a deployment method
264+
- name: Choose a deployment method
265265
items:
266266
- name: Installer script based deployment
267267
href: linux-installer-script.md
@@ -279,28 +279,28 @@
279279
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
280280
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
281281
href: mde-linux-deployment-on-sap.md
282-
- name: 3 - Configuration
282+
- name: Configure Defender for Endpoint on Linux
283+
items:
284+
- name: Configure security policies and settings
285+
href: linux-preferences.md
286+
- name: Static proxy configuration
287+
href: linux-static-proxy-configuration.md
288+
- name: Configure antivirus scans
283289
items:
284-
- name: Configure security policies and settings
285-
href: linux-preferences.md
286-
- name: Static proxy configuration
287-
href: linux-static-proxy-configuration.md
288-
- name: Configure antivirus scans
289-
items:
290-
- name: Schedule antivirus scans using Anacron
291-
href: schedule-antivirus-scan-anacron.md
292-
- name: Schedule antivirus scans using Crontab
293-
href: schedule-antivirus-scan-crontab.md
294-
- name: Network protection for Linux
295-
href: network-protection-linux.md
296-
- name: Configure and validate exclusions on Linux
297-
href: linux-exclusions.md
298-
- name: Configure eBPF-based sensor
299-
href: linux-support-ebpf.md
300-
- name: Detect and block Potentially Unwanted Applications
301-
href: linux-pua.md
302-
- name: Configure Offline Security Intelligence Update
303-
href: linux-support-offline-security-intelligence-update.md
290+
- name: Schedule antivirus scans using Anacron
291+
href: schedule-antivirus-scan-anacron.md
292+
- name: Schedule antivirus scans using Crontab
293+
href: schedule-antivirus-scan-crontab.md
294+
- name: Network protection for Linux
295+
href: network-protection-linux.md
296+
- name: Configure and validate exclusions on Linux
297+
href: linux-exclusions.md
298+
- name: Configure eBPF-based sensor
299+
href: linux-support-ebpf.md
300+
- name: Detect and block Potentially Unwanted Applications
301+
href: linux-pua.md
302+
- name: Configure Offline Security Intelligence Update
303+
href: linux-support-offline-security-intelligence-update.md
304304
- name: Update Defender for Endpoint on Linux
305305
items:
306306
- name: Update Defender for Endpoint on Linux
@@ -309,7 +309,7 @@
309309
href: linux-update-mde-linux.md
310310
- name: Privacy for Defender for Endpoint on Linux
311311
href: linux-privacy.md
312-
- name: Resources for Microsoft Defender for Endpoint on Linux
312+
- name: Additional resources for Defender for Endpoint on Linux
313313
href: linux-resources.md
314314
- name: Mobile Threat Defense
315315
items:
@@ -783,6 +783,8 @@
783783
- name: Configure Microsoft Defender Antivirus scans
784784
href: schedule-antivirus-scans.md
785785
items:
786+
- name: Schedule scans using Intune
787+
href: schedule-antivirus-scans-intune.md
786788
- name: Schedule scans using Group Policy
787789
href: schedule-antivirus-scans-group-policy.md
788790
- name: Schedule scans using PowerShell

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/04/2025
18+
ms.date: 04/30/2025
1919
search.appverid: met150
2020
---
2121

@@ -253,8 +253,8 @@ For rules with the "Rule State" specified:
253253

254254
> [!NOTE]
255255
> To protect your environment from vulnerable drivers, you should first implement these:
256-
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
257-
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
256+
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
257+
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
258258
> For Windows 11 or later, and Windows Server core 1809 or later, or Windows Server 2019 or later, you should also enable [Microsoft Windows vulnerable driver blocklist](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules),
259259
> Then as another layer of defense, you should enable this attack surface reduction rule.
260260
@@ -544,7 +544,9 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
544544
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
545545

546546
> [!NOTE]
547-
> If `CcmExec.exe` (SCCM Agent) is detected on the device, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
547+
> If you're utilizing Configuration Manager (CM, previously known as MEMCM or SCCM) with CcmExec.exe` (SCCM Agent), we recommend running it in audit mode for at least 60 days.
548+
> Once you're prepared to switch to block mode, ensure you deploy the appropriate ASR rules, considering any necessary rule exclusions.
549+
548550

549551
Intune name: `Persistence through WMI event subscription`
550552

0 commit comments

Comments
 (0)