Skip to content

Commit e9bdf45

Browse files
authored
Merge branch 'main' into diannegali-updatemdeinxdr
2 parents f4a2638 + f8ff855 commit e9bdf45

File tree

6 files changed

+59
-70
lines changed

6 files changed

+59
-70
lines changed

defender-endpoint/android-intune.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 07/25/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -284,7 +284,10 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
284284

285285
> [!div class="mx-imgBorder"]
286286
> ![Screenshot showing a low touch onboarding configuration policy.](media/low-touch-user-upn.png)
287-
287+
288+
> [!Note]
289+
> Once the policy is created, these value types will show as string.
290+
288291
8. Assign the policy to the target user group.
289292

290293
9. Review and create the policy.

defender-endpoint/linux-install-manually.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/11/2024
18+
ms.date: 10/15/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -94,48 +94,46 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
9494

9595
- Install `yum-utils` if it isn't installed yet:
9696

97-
```bash
97+
```bash
9898
sudo yum install yum-utils
9999
```
100100

101-
> [!NOTE]
101+
> [!NOTE]
102102
> Your distribution and version, and identify the closest entry (by major, then minor) for it under `https://packages.microsoft.com/config/rhel/`.
103103
104-
Use the following table to help guide you in locating the package:
104+
Use the following table to help guide you in locating the package:
105105

106106
|Distro & version|Package|
107107
|---|---|
108108
|For Alma 8.4 and higher|<https://packages.microsoft.com/config/alma/8/prod.repo>|
109109
|For Alma 9.2 and higher|<https://packages.microsoft.com/config/alma/9/prod.repo>|
110110
|For RHEL/Centos/Oracle 9.0-9.8|<https://packages.microsoft.com/config/rhel/9/prod.repo>|
111-
|For RHEL/Centos/Oracle 8.0-8.9|<https://packages.microsoft.com/config/rhel/8/prod.repo>|
111+
|For RHEL/Centos/Oracle 8.0-8.10|<https://packages.microsoft.com/config/rhel/8/prod.repo>|
112112
|For RHEL/Centos/Oracle 7.2-7.9 & Amazon Linux 2 |<https://packages.microsoft.com/config/rhel/7.2/prod.repo>|
113113
|For Amazon Linux 2023 |<https://packages.microsoft.com/config/amazonlinux/2023/prod.repo>|
114114
|For Fedora 33|<https://packages.microsoft.com/config/fedora/33/prod.repo>|
115115
|For Fedora 34|<https://packages.microsoft.com/config/fedora/34/prod.repo>|
116116
|For Rocky 8.7 and higher|<https://packages.microsoft.com/config/rocky/8/prod.repo>|
117117
|For Rocky 9.2 and higher|<https://packages.microsoft.com/config/rocky/9/prod.repo>|
118+
119+
In the following commands, replace *[version]* and *[channel]* with the information you've identified:
118120

119-
<!--|For RHEL/Centos 6.7-6.10|<https://packages.microsoft.com/config/rhel/6/[channel].repo>|-->
120-
121-
In the following commands, replace *[version]* and *[channel]* with the information you've identified:
122-
123-
```bash
121+
```bash
124122
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/[version]/[channel].repo
125123
```
126124

127-
> [!TIP]
125+
> [!TIP]
128126
> Use hostnamectl command to identify system related information including release *[version]*.
129127
130-
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
128+
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
131129

132-
```bash
130+
```bash
133131
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
134132
```
135133

136-
Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
134+
Or if you wish to explore new features on selected devices, you might want to deploy Microsoft Defender for Endpoint on Linux to *insiders-fast* channel:
137135

138-
```bash
136+
```bash
139137
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/insiders-fast.repo
140138
```
141139

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 11 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 10/03/2024
18+
ms.date: 10/15/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Mac
@@ -59,24 +59,18 @@ To get the latest features, including preview capabilities (such as endpoint det
5959

6060
There are several methods and deployment tools that you can use to install and configure Defender for Endpoint on Mac.
6161

62-
- Third-party management tools:
63-
- [Microsoft Intune-based deployment](mac-install-with-intune.md)
62+
- [Microsoft Intune-based deployment](mac-install-with-intune.md)
63+
- Non-Microsoft management tools:
6464
- [JAMF-based deployment](mac-install-with-jamf.md)
6565
- [Other MDM products](mac-install-with-other-mdm.md)
66-
67-
- Command-line tool:
68-
- [Manual deployment](mac-install-manually.md)
66+
- Command-line tool: [Manual deployment](mac-install-manually.md)
6967

7068
### System requirements
7169

7270
These four most recent major releases of macOS are supported.
73-
7471
- 15.0.1 (Sequoia)
75-
7672
- 14 (Sonoma)
77-
7873
- 13 (Ventura)
79-
8074
- 12 (Monterey)
8175

8276
- Supported processors: x64 and ARM64
@@ -85,24 +79,23 @@ These four most recent major releases of macOS are supported.
8579

8680
- Beta versions of macOS aren't supported.
8781

88-
- Important
89-
90-
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fmicrosoft-defender-endpoint-mac.md/main/979628aa-e0a5-ba01-7de6-f03ef27b15df/mac-sysext-policies.md).
82+
> [!IMPORTANT]
83+
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
9184
92-
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
85+
After you've enabled the service, you might need to configure your network or firewall to allow outbound connections between it and your endpoints.
9386

9487
### Licensing requirements
9588

9689
Microsoft Defender for Endpoint on Mac requires one of the following Microsoft Volume Licensing offers:
9790

98-
- Microsoft 365 E5 (M365 E5)
91+
- Microsoft 365 E5
9992
- Microsoft 365 E5 Security
100-
- Microsoft 365 A5 (M365 A5)
93+
- Microsoft 365 A5
10194
- Windows 10 Enterprise E5
10295
- Microsoft 365 Business Premium
10396
- Windows 11 Enterprise E5
104-
- Microsoft Defender for Endpoint P2
105-
- Microsoft Defender for Endpoint P1 (which is included in [Microsoft 365 E3 (M365 E3)](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-plan-1-now-included-in-m365-e3/ba-p/3060639))
97+
- Microsoft Defender for Endpoint P2 (included in Microsoft 365 E5 and E5 Security)
98+
- Microsoft Defender for Endpoint P1 (included in [Microsoft 365 E3](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-plan-1-now-included-in-m365-e3/ba-p/3060639))
10699

107100
> [!NOTE]
108101
> Eligible licensed users may use Microsoft Defender for Endpoint on up to five concurrent devices.
@@ -126,7 +119,6 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
126119

127120
> [!WARNING]
128121
> Authenticated proxies are not supported. Ensure that only PAC, WPAD, or a static proxy is being used.
129-
>
130122
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
131123
132124
#### Test network connectivity

defender-endpoint/run-analyzer-macos-linux.md

Lines changed: 25 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -22,39 +22,40 @@ search.appverid: met150
2222
# Run the client analyzer on macOS and Linux
2323

2424
**Applies to:**
25+
2526
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2627
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2728

2829
The XMDEClientAnalyzer is used for diagnosing Microsoft Defender for Endpoint health or reliability issues on onboarded devices running either Linux, or macOS.
2930

3031
There are two ways to run the client analyzer tool:
3132

32-
1. Using a binary version (no Python dependency)
33+
1. Using a binary version (no external Python dependency)
3334
2. Using a Python-based solution
3435

35-
3636
## Running the binary version of the client analyzer
3737

3838
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the macOS or Linux machine you need to investigate.\
3939
If you're using a terminal, download the tool by entering the following command:
4040

41-
```console
41+
```bash
4242
wget --quiet -O XMDEClientAnalyzerBinary.zip https://aka.ms/XMDEClientAnalyzerBinary
4343
```
4444

4545
1. Verify the download.
4646

4747
> [!NOTE]
4848
> The current SHA256 hash of `XMDEClientAnalyzerBinary.zip` that is downloaded from this link is: `4E972F7950EA475A21735042484CD00CED6EA70ED9CBB48B4C9405FFD2706DFA`.
49+
4950
- Linux
5051

51-
```console
52+
```bash
5253
echo '4E972F7950EA475A21735042484CD00CED6EA70ED9CBB48B4C9405FFD2706DFA XMDEClientAnalyzerBinary.zip' | sha256sum -c
5354
```
5455

5556
- macOS
5657

57-
```console
58+
```bash
5859
echo '4E972F7950EA475A21735042484CD00CED6EA70ED9CBB48B4C9405FFD2706DFA XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
5960
```
6061

@@ -63,13 +64,13 @@ If you're using a terminal, download the tool by entering the following command:
6364

6465
If you're using a terminal, extract the files by entering the following command:
6566
66-
```console
67+
```bash
6768
unzip -q XMDEClientAnalyzerBinary.zip -d XMDEClientAnalyzerBinary
6869
```
6970
7071
4. Change to the tool's directory by entering the following command:
7172

72-
```console
73+
```bash
7374
cd XMDEClientAnalyzerBinary
7475
```
7576

@@ -84,87 +85,82 @@ If you're using a terminal, download the tool by entering the following command:
8485

8586
- Linux
8687

87-
```console
88+
```bash
8889
unzip -q SupportToolLinuxBinary.zip
8990
```
9091

9192
- Mac
9293

93-
```console
94+
```bash
9495
unzip -q SupportToolMacOSBinary.zip
9596
```
9697

9798
7. Run the tool as _root_ to generate diagnostic package:
9899

99-
```console
100+
```bash
100101
sudo ./MDESupportTool -d
101102
```
102103

103104
## Running the Python-based client analyzer
104105

105106
> [!NOTE]
106-
>
107-
> - The analyzer depends on few extra PIP packages (sh, distro, lxml, pandas) which are installed in the OS when in root to produce the result output. If not installed, the analyzer will try to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
108-
>
109-
> >[!WARNING]
110-
> >Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
111-
>
112-
> - In addition, the tool currently requires Python version 3 or later to be installed.
113-
>
114-
> - If your device is behind a proxy, then you can simply pass the proxy server as an environment variable to the mde_support_tool.sh script. For example:
115-
.
116-
> `https_proxy=https://myproxy.contoso.com:8080 ./mde_support_tool.sh"`
107+
> - The analyzer depends on few extra PIP packages (`decorator`, `sh`, `distro`, `lxml`, and `psutil`) which are installed in the operating system when in root to produce the result output. If not installed, the analyzer attempts to fetch it from the [official repository for Python packages](https://pypi.org/search/?q=lxml).
108+
> - In addition, the tool currently requires Python version 3 or later to be installed on your device.
109+
> - If your device is behind a proxy, then you can simply pass the proxy server as an environment variable to the `mde_support_tool.sh` script. For example: `https_proxy=https://myproxy.contoso.com:8080 ./mde_support_tool.sh"`.
110+
111+
> [!WARNING]
112+
> Running the Python-based client analyzer requires the installation of PIP packages which may cause some issues in your environment. To avoid issues from occurring, it is recommended that you install the packages into a user PIP environment.
117113
118114
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the macOS or Linux machine you need to investigate.
119115
120116
If you're using a terminal, download the tool by running the following command:
121117
122-
```console
118+
```bash
123119
wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
124120
```
125121
126122
2. Verify the download
127123
128124
- Linux
129125
130-
```console
126+
```bash
131127
echo 'E1C3D20516C849D8CD27257BB6084FBC2991B8F6214BF9121BB9B1446F95BB1F XMDEClientAnalyzer.zip' | sha256sum -c
132128
```
133129
134130
- macOS
135131
136-
```console
132+
```bash
137133
echo 'E1C3D20516C849D8CD27257BB6084FBC2991B8F6214BF9121BB9B1446F95BB1F XMDEClientAnalyzer.zip' | shasum -a 256 -c
138134
```
139135
140136
3. Extract the contents of XMDEClientAnalyzer.zip on the machine.
141137
If you're using a terminal, extract the files by using the following command:
142138
143-
```console
139+
```bash
144140
unzip -q XMDEClientAnalyzer.zip -d XMDEClientAnalyzer
145141
```
146142
147143
4. Change directory to the extracted location.
148144
149-
```console
145+
```bash
150146
cd XMDEClientAnalyzer
151147
```
152148
153149
5. Give the tool executable permission:
154150
155-
```console
151+
```bash
156152
chmod a+x mde_support_tool.sh
157153
```
158154
159155
6. Run as a non-root user to install required dependencies:
160156
161-
```console
157+
```bash
162158
./mde_support_tool.sh
163159
```
164160
165161
7. To collect actual diagnostic package and generate the result archive file, run again as root:
166162
167-
```console
163+
```bash
168164
sudo ./mde_support_tool.sh -d
169165
```
170166

defender-office-365/message-headers-eop-mdo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The individual fields and values are described in the following table.
5656
|Field|Description|
5757
|---|---|
5858
|`ARC`|The `ARC` protocol has the following fields: <ul><li>`AAR`: Records the content of the **Authentication-results** header from DMARC.</li><li>`AMS`: Includes cryptographic signatures of the message.</li><li>`AS`: Includes cryptographic signatures of the message headers. This field contains a tag of a chain validation called `"cv="`, which includes the outcome of the chain validation as **none**, **pass**, or **fail**.</li></ul>|
59-
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
59+
|`CAT:`|The category of protection policy that's applied to the message: <ul><li>`AMP`: Anti-malware</li><li>`BIMP`: Brand impersonation<sup>\*</sup></li><li>`BULK`: Bulk</li><li>`DIMP`: Domain impersonation<sup>\*</sup></li><li>`FTBP`: Anti-malware [common attachments filter](anti-malware-protection-about.md#common-attachments-filter-in-anti-malware-policies)</li><li>`GIMP`: [Mailbox intelligence](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365) impersonation<sup>\*</sup></li><li>`HPHSH` or `HPHISH`: High confidence phishing</li><li>`BIMP`: Brand impersonation</li><li>`HSPM`: High confidence spam</li><li>`INTOS`: Intra-Organization phishing</li><li>`MALW`: Malware</li><li>`OSPM`: Outbound spam</li><li>`PHSH`: Phishing</li><li>`SAP`: Safe Attachments<sup>\*</sup></li><li>`SPM`: Spam</li><li>`SPOOF`: Spoofing</li><li>`UIMP`: User impersonation<sup>\*</sup></li></ul> <br/> <sup>\*</sup>Defender for Office 365 only. <br/><br/> An inbound message might be flagged by multiple forms of protection and multiple detection scans. Policies are applied in an order of precedence, and the policy with the highest priority is applied first. For more information, see [What policy applies when multiple protection methods and detection scans run on your email](how-policies-and-protections-are-combined.md).|
6060
|`CIP:[IP address]`|The connecting IP address. You can use this IP address in the IP Allow List or the IP Block List. For more information, see [Configure connection filtering](connection-filter-policies-configure.md).|
6161
|`CTRY`|The source country/region as determined by the connecting IP address, which might not be the same as the originating sending IP address.|
6262
|`DIR`|The Directionality of the message: <ul><li>`INB`: Inbound message.</li><li>`OUT`: Outbound message.</li><li>`INT`: Internal message.</li></ul>|

defender-xdr/experts-on-demand.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection:
1919
- essentials-manage
2020
ms.topic: conceptual
2121
search.appverid: met150
22-
ms.date: 10/14/2024
22+
ms.date: 10/16/2024
2323
---
2424

2525
# Collaborate with experts on demand
@@ -52,12 +52,12 @@ You need to select one of the following Microsoft Entra ID roles to view and sub
5252

5353
To learn more about how Microsoft Entra ID roles map to Microsoft Defender Unified RBAC permissions, see [Microsoft Entra Global roles access](compare-rbac-roles.md#microsoft-entra-global-roles-access).
5454

55-
Microsoft Defender Experts customers using Ask Defender Experts capability will also be able to use the following permissions from [Microsoft Defender XDR Unified RBAC](../defender-xdr/custom-permissions-details.md).
55+
Microsoft Threat Experts customers using Ask Defender Experts capability will also be able to use the following permissions from [Microsoft Defender XDR Unified RBAC](../defender-xdr/custom-permissions-details.md).
5656

57-
|Microsoft Unified RBAC role|Permission level|
57+
|Microsoft Defender XDR Unified RBAC role|Permission level|
5858
|---|---|---|
5959
| Security data basics | Read |
60-
| Alerts or Response | Read and submit |
60+
| Alerts, Response | Read and submit |
6161

6262
### Where to submit inquiries to Ask Defender Experts
6363

0 commit comments

Comments
 (0)