Skip to content

Commit e7a72b7

Browse files
authored
Merge branch 'main' into repo_sync_working_branch
2 parents 53fa090 + dcdd0c0 commit e7a72b7

File tree

3 files changed

+11
-15
lines changed

3 files changed

+11
-15
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/18/2024
18+
ms.date: 12/02/2024
1919
search.appverid: met150
2020
---
2121

@@ -528,9 +528,6 @@ Dependencies: Microsoft Defender Antivirus
528528

529529
This rule prevents malware from abusing WMI to attain persistence on a device.
530530

531-
> [!IMPORTANT]
532-
> File and folder exclusions don't apply to this attack surface reduction rule.
533-
534531
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
535532

536533
> [!NOTE]

defender-endpoint/ios-troubleshoot.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 06/19/2024
17+
ms.date: 12/02/2024
1818
---
1919

2020
# Troubleshoot issues and find answers to FAQs on Microsoft Defender for Endpoint on iOS
@@ -28,12 +28,11 @@ ms.date: 06/19/2024
2828

2929
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
3030
31-
3231
This article provides troubleshooting information to help you address issues that might arise with Microsoft Defender for Endpoint on iOS.
3332

3433
> [!NOTE]
3534
> - Defender for Endpoint on iOS requires configuring its VPN to activate the Web Protection feature and to send periodic status signals while the app operates in the background. This VPN is local and pass-through, meaning it does not route traffic through a remote VPN server.
36-
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for 7 days, the device may be marked as inactive in the Microsoft Defender Portal.
35+
> - Customers who opt not to set up a Defender for Endpoint VPN can disable Web Protection and still deploy Defender for Endpoint. In such cases, Defender for Endpoint will only send status signals to the Microsoft Defender portal when the user opens the app. If the app is not opened for seven days, the device may be marked as inactive in the Microsoft Defender portal.
3736
3837
## Apps don't work when VPN is turned on
3938

@@ -88,12 +87,12 @@ In addition, a notification is shown on the iOS device. Tapping on the notificat
8887
> [!div class="mx-imgBorder"]
8988
> :::image type="content" source="media/ios-phish-alert.png" alt-text="The site reported as unsafe notification" lightbox="media/ios-phish-alert.png":::
9089
91-
## Device not seen on the Defender for Endpoint console after onboarding
90+
## Device not seen in the Microsoft Defender portal after onboarding
9291

93-
After onboarding, it takes few hours for device to show up in the Device inventory in the Defender for Endpoint security console. Also, ensure that device is registered correctly with Microsoft Entra ID and device has internet connectivity. For successful onboarding, the device has to be registered via Microsoft Authenticator or Intune Company Portal and the user needs to sign-in using the same account with which device is registered with Microsoft Entra ID.
92+
After onboarding, it takes few hours for device to show up in the Device inventory in the Microsoft Defender portal. Also, ensure that device is registered correctly with Microsoft Entra ID and device has internet connectivity. For successful onboarding, the device has to be registered via Microsoft Authenticator or Intune Company Portal and the user needs to sign-in using the same account with which device is registered with Microsoft Entra ID.
9493

9594
> [!NOTE]
96-
> Sometimes, the device name is not consistent with that in Microsoft Intune admin center. The device name in Defender for Endpoint console is of the format <username_iPhone/iPad model>. You can also use Microsoft Entra device ID to identify the device in the Defender for Endpoint console.
95+
> Sometimes, the device name is not consistent with that in Microsoft Intune admin center. The device name in the Microsoft Defender portal is of the format <username_iPhone/iPad*>. You can also use your Microsoft Entra device ID to identify the device in the Microsoft Defender portal.
9796
9897
## Data and Privacy
9998

defender-endpoint/mtd.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
title: Microsoft Defender for Endpoint - Mobile Threat Defense
3-
ms.reviewer: tdoucette, sunasing
3+
ms.reviewer: tdoucette, sunasing, denishdonga
44
description: Overview of Mobile Threat Defense in Microsoft Defender for Endpoint
55
ms.service: defender-endpoint
66
ms.subservice: onboard
7-
ms.author: denishdonga
8-
author: denishdonga27
7+
ms.author: deniseb
8+
author: denisebmsft
99
ms.localizationpriority: medium
10-
ms.date: 11/15/2024
10+
ms.date: 12/02/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -37,7 +37,7 @@ Microsoft Defender for Endpoint on Android and iOS provides the below key capabi
3737
|Capability|Description|
3838
|---|---|
3939
|Web Protection|Anti-phishing, blocking unsafe network connections, and support for custom indicators for URLs and domains. (File and IP indicators aren't currently supported.)|
40-
|Malware Protection (Android-only)|Scanning for malicious apps.|
40+
|Malware Protection (Android-only)|Scanning for malicious apps and APK Files.|
4141
|Jailbreak Detection (iOS-only)|Detection of jailbroken devices.|
4242
|Microsoft Defender Vulnerability Management (MDVM) |Vulnerability assessment of onboarded mobile devices. Includes OS and Apps vulnerabilities assessment for both Android and iOS. Visit this [page](/defender-vulnerability-management/defender-vulnerability-management) to learn more about Microsoft Defender Vulnerability Management in Microsoft Defender for Endpoint.|
4343
|Network Protection | Protection against rogue Wi-Fi related threats and rogue certificates; ability to add to the "allow" list the root CA and private root CA certificates in Intune; establish trust with endpoints.|

0 commit comments

Comments
 (0)