You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-controlled-folders.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier3
16
16
- mde-asr
17
17
search.appverid: met150
18
-
ms.date: 06/11/2024
18
+
ms.date: 07/17/2024
19
19
---
20
20
21
21
# Enable controlled folder access
@@ -47,10 +47,10 @@ You can enable controlled folder access by using any of these methods:
47
47
> [!TIP]
48
48
> Try using [audit mode](evaluate-controlled-folder-access.md) at first so you can see how the feature works and review events without impacting normal device usage in your organization.
49
49
50
-
Group Policy settings that disable local administrator list merging will override controlled folder access settings. They also override protected folders and allowed apps set by the local administrator through controlled folder access. These policies include:
51
-
52
-
- Microsoft Defender Antivirus **Configure local administrator merge behavior for lists**
53
-
- System Center Endpoint Protection **Allow users to add exclusions and overrides**
50
+
> [!NOTE]
51
+
> If you add Microsoft Defender Antivirus exclusions (process or path) for the binary in question, controlled folder access trusts it, and doesn't block the process or path. Group Policy settings that disable local administrator list merging override controlled folder access settings. They also override protected folders and allowed apps set by the local administrator through controlled folder access. These policies include:
52
+
> - Microsoft Defender Antivirus **Configure local administrator merge behavior for lists**
53
+
> - System Center Endpoint Protection **Allow users to add exclusions and overrides**
54
54
55
55
For more information about disabling local list merging, see [Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus).
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-updates.md
+1-2Lines changed: 1 addition & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -116,8 +116,7 @@ All our updates contain
116
116
- Fixed potentially packet loss due to [network protection](network-protection.md) shutdown that could lead to deadlock.
117
117
- Implemented performance improvements for scenarios where WDAC is enabled with Intelligent Security Graph.
118
118
- Fixed an issue where an Outlook exclusion for the ASR rule [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes) was not honored.
119
-
- Fixed a race condition during the startup of [endpoint data loss prevention](/purview/endpoint-dlp-getting-started), such that in certain environments, some system files could be corrupted.
120
-
119
+
- Fixed a race condition during the startup of [endpoint data loss prevention](/purview/endpoint-dlp-getting-started) such that, in certain environments, some system files could be corrupted.
Copy file name to clipboardExpand all lines: defender-endpoint/minimum-requirements.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
6
6
author: siosulli
7
7
ms.reviewer: pahuijbr
8
8
ms.localizationpriority: medium
9
-
ms.date: 05/01/2024
9
+
ms.date: 07/17/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -67,9 +67,13 @@ Devices on your network must be running one of these editions. New features or c
67
67
68
68
### Supported Windows versions
69
69
70
+
> [!IMPORTANT]
71
+
> Windows 11 Home devices that have been upgraded to one of the below supported editions might require you to run the following command before onboarding:
> For more information about edition upgrades and features, see [Features](/windows-hardware/manufacture/desktop/windows-features?view=windows-11&preserve-view=true))
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-onboarding-error-messages.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.topic: troubleshooting
14
14
ms.subservice: onboard
15
15
search.appverid: met150
16
-
ms.date: 12/18/2020
16
+
ms.date: 07/18/2024
17
17
---
18
18
19
19
# Troubleshoot subscription and portal access issues
@@ -76,7 +76,7 @@ You'll need to allow the `security.windows.com` and all subdomains under it on y
76
76
77
77
## Portal communication issues
78
78
79
-
If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are allowed and open for communication.
79
+
If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are accessible through the browser for authorized users:
Copy file name to clipboardExpand all lines: defender-for-iot/device-discovery.md
+19-19Lines changed: 19 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,7 @@ Learn how to [discover and manage your IoT/OT devices](manage-devices-inventory.
24
24
## Device inventory: initial view
25
25
26
26
If you don't yet have a Defender for IoT license, the **Device inventory** page detects your OT devices and lists them with regular device data, but without security data. For example, the device name, IP, and category are visible, while the risk level isn't visible. The device inventory also displays a note at the top of the page that indicates the number of unprotected OT devices.
27
-
27
+
28
28
In this case, [onboard Defender for IoT](get-started.md) to get security value for your OT devices.
29
29
30
30
If you're seeing the message that indicates the number of unprotected OT devices, and you've already set up Defender for IoT, [set up a site](set-up-sites.md) and associate the relevant devices with it.
@@ -41,29 +41,29 @@ Learn more about the [device inventory in Microsoft Defender for Endpoint](/defe
41
41
42
42
The key device discovery capabilities are:
43
43
44
-
|Capability|Description|
45
-
|---------|---------|
46
-
|OT device management|[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.<br>- Add organization-specific information to emphasize your organization preferences.|
47
-
|Device protection with risk-based approach|Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling.|
48
-
|Device alignment with physical sites|Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views).|
49
-
|Device groups|Allows different teams in your organization to monitor and manage relevant assets only. Learn more about [creating a device group](/defender-endpoint/machine-groups#create-a-device-group).|
50
-
|Device criticality|Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview).|
44
+
|Capability|Description|
45
+
|---|---|
46
+
|OT device management|[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.<br>- Add organization-specific information to emphasize your organization preferences.|
47
+
|Device protection with risk-based approach|Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling.|
48
+
|Device alignment with physical sites|Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views).|
49
+
|Device groups|Allows different teams in your organization to monitor and manage relevant assets only. Learn more about [creating a device group](/defender-endpoint/machine-groups#create-a-device-group).|
50
+
|Device criticality|Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview).|
51
51
52
52
## Supported devices
53
53
54
54
Defender for IoT's device inventory supports the following device classes:
55
55
56
-
|Devices|Example|
57
-
|---------|---------|
58
-
|**Manufacturing**|Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots|
Copy file name to clipboardExpand all lines: defender-for-iot/microsoft-defender-iot.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,18 +22,18 @@ In this article, you learn how Microsoft Defender customers can extend their pro
22
22
23
23
You can work with these different flavors of Defender for IoT:
24
24
25
-
|Flavor|Details|Next steps|
26
-
|---------|---------|---------|
27
-
|Defender for IoT in the Defender portal (Preview)|Microsoft Defender customers can use this flavor for a unified IT/OT experience, extending Defender XDR protection to OT environments. [Learn about the main use cases](#what-are-the-main-defender-for-iot-use-cases).|[Get started](get-started.md) with Defender for IoT in the Defender portal.|
28
-
|Defender for IoT in the classic, Azure portal|All customers can use this flavor to identify OT devices, vulnerabilities, and threats in the Azure portal.|See the [Defender for IoT on Azure overview](/azure/defender-for-iot/organizations/overview).|
29
-
|Protection for enterprise IoT devices|Microsoft Defender customers can enable protection for enterprise IoT devices, like printers, smart TVs, and conferencing systems and purpose-built, proprietary devices.|[Get started](/azure/defender-for-iot/organizations/eiot-sensor) with enterprise IoT monitoring.|
25
+
|Flavor|Details|Next steps|
26
+
|---|---|---|
27
+
|Defender for IoT in the Defender portal (Preview)|Microsoft Defender customers can use this flavor for a unified IT/OT experience, extending Defender XDR protection to OT environments. [Learn about the main use cases](#what-are-the-main-defender-for-iot-use-cases).|[Get started](get-started.md) with Defender for IoT in the Defender portal.|
28
+
|Defender for IoT in the classic, Azure portal|All customers can use this flavor to identify OT devices, vulnerabilities, and threats in the Azure portal.|See the [Defender for IoT on Azure overview](/azure/defender-for-iot/organizations/overview).|
29
+
|Protection for enterprise IoT devices|Microsoft Defender customers can enable protection for enterprise IoT devices, like printers, smart TVs, and conferencing systems and purpose-built, proprietary devices.|[Get started](/azure/defender-for-iot/organizations/eiot-sensor) with enterprise IoT monitoring.|
30
30
31
31
## Who uses Defender for IoT?
32
32
33
33
Defender for IoT is intended for:
34
34
35
35
-**CISOs** or security leaders that want to gain an overview of their organization's OT network and security.
36
-
-**OT security admins, industrial engineers, risk managers, and SOC analysts** that want to gain a high-level view of a site's risks, incidents, and vulnerabilities, get recommendations for remediation actions, manage and discover protected OT devices, and more.
36
+
-**OT security admins, industrial engineers, risk managers, and SOC analysts** that want to gain a high-level view of a site's risks, incidents, and vulnerabilities, get recommendations for remediation actions, manage and discover protected OT devices, and more.
37
37
38
38
## What are the main OT security challenges?
39
39
@@ -51,13 +51,13 @@ Defender for IoT in the Defender portal uses the following combination of techno
51
51
52
52
## What are the main Defender for IoT use cases?
53
53
54
-
|Use case|Capabilities|
55
-
|---------|---------|
56
-
|**[Discover OT devices](manage-devices-inventory.md)**|Gather OT network data from Microsoft Defender for Endpoint; identify and manage OT devices.|
57
-
|**[Get an overview of your productions sites (site security)](site-security-overview.md)**|Get an overview of your production sites to gain insights into OT risks, make better-informed security investment decisions, and streamline communication between stakeholders.|
58
-
|**[Prioritize and remediate vulnerabilities](prioritize-vulnerabilities.md)**|Proactively manage OT network risks based on vulnerability details and recommended remediation advice.|
59
-
|**[Analyze incidents](investigate-threats.md) and respond to threats**|Review incidents and alerts with real-time details about events logged in your OT network and take recommended remediation actions.|
60
-
|**Extend Microsoft Defender XDR**|Microsoft Defender XDR and Defender for IoT form a unified pre- and post-breach enterprise defense suite. This suite natively integrates across endpoint, IoT/OT, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.|
54
+
|Use case|Capabilities|
55
+
|---|---|
56
+
|**[Discover OT devices](manage-devices-inventory.md)**|Gather OT network data from Microsoft Defender for Endpoint; identify and manage OT devices.|
57
+
|**[Get an overview of your productions sites (site security)](site-security-overview.md)**|Get an overview of your production sites to gain insights into OT risks, make better-informed security investment decisions, and streamline communication between stakeholders.|
58
+
|**[Prioritize and remediate vulnerabilities](prioritize-vulnerabilities.md)**|Proactively manage OT network risks based on vulnerability details and recommended remediation advice.|
59
+
|**[Analyze incidents](investigate-threats.md) and respond to threats**|Review incidents and alerts with real-time details about events logged in your OT network and take recommended remediation actions.|
60
+
|**Extend Microsoft Defender XDR**|Microsoft Defender XDR and Defender for IoT form a unified pre- and post-breach enterprise defense suite. This suite natively integrates across endpoint, IoT/OT, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.|
0 commit comments