Skip to content

Commit e44db8f

Browse files
Merge pull request #1373 from MicrosoftDocs/main
Publish main to live, 09/18, 11:00 AM IST
2 parents 877388e + 759c54d commit e44db8f

9 files changed

+151
-87
lines changed

defender-endpoint/device-control-policies.md

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Device control policies in Microsoft Defender for Endpoint
33
description: Learn about Device control policies in Defender for Endpoint
4-
author: siosulli
5-
ms.author: siosulli
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 09/13/2024
7+
ms.date: 09/18/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -73,7 +73,7 @@ Device control policies can be applied to users and/or user groups.
7373
> [!NOTE]
7474
> In the articles related to device control, groups of users are referred to as <i>user groups</i>. The term <i>groups</i> refer to [groups](#groups) defined in the device control policy.
7575
76-
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
76+
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
7777

7878
On Windows, a user or user group can be a condition on an [entry](#entries) in a policy.
7979

@@ -198,15 +198,29 @@ Device control policies define access (called an entry) for a set of devices. En
198198
| Action | Allow <br/> Deny <br/> AuditAllow <br/> AuditDeny |
199199
| Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> |
200200

201-
If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
201+
### Entry evaluation
202+
203+
There are two types of entries: enforcement entries (Allow/Deny) and audit entries (AuditAllow/AuditDeny).
204+
205+
Enforcement entries for a rule are evaluated in order until all of the requested permissions have been matched. If no entries match a rule, then the next rule is evaluated. If no rules match, then the default is applied.
206+
207+
### Audit entries
208+
209+
Audit events control the behavior when device control enforces a rule (allow/deny). Device control can display a notification to the end-user. The user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
210+
211+
Device control can also create an event that is available in Advanced Hunting.
212+
213+
> [!IMPORTANT]
214+
> There is a limit of 300 events per device per day. Audit entries are processed after the enforcement decision has been made. All corresponding audit entries are evaluated.
215+
216+
### Conditions
202217

203218
An entry supports the following optional conditions:
204219

205220
- User/User Group Condition: Applies the action only to the user/user group identified by the SID
206221

207222
> [!NOTE]
208-
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored localy, use the Security Identifier (SID)
209-
223+
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored locally, use the Security Identifier (SID)
210224
> [!NOTE]
211225
> On Windows, The SID of the user who's signed in can be retrieved by running the PowerShell command `whoami /user`.
212226

defender-endpoint/hardware-acceleration-and-mdav.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
---
22
title: Hardware acceleration and Microsoft Defender Antivirus.
33
description: How Microsoft Defender Antivirus incorporates hardware acceleration and Microsoft Defender Antivirus.
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7+
ms.reviewer: yongrhee
78
ms.service: defender-endpoint
89
ms.topic: overview
9-
ms.date: 02/26/2024
10+
ms.date: 09/18/2024
1011
ms.subservice: ngp
1112
ms.localizationpriority: medium
1213
ms.custom: partner-contribution
@@ -19,10 +20,6 @@ audience: ITPro
1920

2021
**Applies to:**
2122

22-
- [Microsoft Defender XDR](/defender-xdr)
23-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
24-
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2623
- Microsoft Defender Antivirus
2724
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
2825

155 KB
Loading

defender-endpoint/microsoft-defender-offline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Offline scan in Windows
33
description: You can use Microsoft Defender Offline Scan straight from the Microsoft Defender Antivirus app. You can also manage how it's deployed in your network.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 04/30/2024
6+
ms.date: 09/18/2024
77
author: YongRhee-MSFT
88
ms.author: yongrhee
99
manager: deniseb
@@ -34,7 +34,7 @@ search.appverid: met150
3434
|**Protection type** | Hardware|
3535
|**Firmware/ Rootkit**| Operating system <br/> Driver <br/> Memory (Heap) <br/> Application <br/> Identity <br/> Cloud|
3636

37-
> [NOTE]
37+
> [!NOTE]
3838
> The protection for this feature focuses on the Firmware/Rootkit.
3939
4040
Microsoft Defender Offline is an anti-malware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR).
@@ -50,7 +50,7 @@ The following are the hardware requirements for Microsoft Defender Offline Scan
5050
- x64/x86 Windows 8.1
5151
- x64/x86 Windows 7 Service Pack 1
5252

53-
>[!CAUTION]
53+
> [!CAUTION]
5454
> Microsoft Defender Offline Scan does not apply to:
5555
>
5656
> - ARM Windows 11

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Supported Microsoft Defender for Endpoint capabilities by platform
33
description: Get to know the Microsoft Defender for Endpoint capabilities supported for Windows 10 devices, servers, and non-Windows devices.
44
ms.service: defender-endpoint
5-
ms.author: siosulli
6-
author: siosulli
5+
ms.author: deniseb
6+
author: denisebmsft
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 07/17/2024
16+
ms.date: 09/18/2024
1717
---
1818

1919
# Supported Microsoft Defender for Endpoint capabilities by platform
@@ -58,7 +58,7 @@ The following table gives information about the supported Microsoft Defender for
5858
|[Device response capabilities: collect investigation package ](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> |
5959
|[Device response capabilities: run antivirus scan](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
6060
|[Device isolation](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
61-
|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
61+
|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) <sup>[6]</sup> | ![Yes.](media/svg/check-yes.svg) <sup>[6]</sup> |
6262
|[Live Response](live-response.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
6363

6464
<sup>[1]</sup> Refers to the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
@@ -71,6 +71,8 @@ The following table gives information about the supported Microsoft Defender for
7171

7272
<sup>[5]</sup> Endpoint & network device discovery is supported on Windows Server 2019 or later, Windows 10, and Windows 11
7373

74+
<sup>[6]</sup> Collect file feature is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview)). Currently does not support "Deep analysis" or "Block file, stop, and quarantine process".
75+
7476
> [!NOTE]
7577
> Windows 7, 8.1, Windows Server 2008 R2 include support for the EDR sensor, and antivirus using System Center Endpoint Protection (SCEP).
7678

0 commit comments

Comments
 (0)