Skip to content

Commit eaf8d20

Browse files
authored
Merge branch 'main' into v-mathavale-9153480
2 parents 0f0dd42 + 7e65d70 commit eaf8d20

34 files changed

+451
-364
lines changed

defender-endpoint/enable-controlled-folders.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier3
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 06/11/2024
18+
ms.date: 07/17/2024
1919
---
2020

2121
# Enable controlled folder access
@@ -47,10 +47,10 @@ You can enable controlled folder access by using any of these methods:
4747
> [!TIP]
4848
> Try using [audit mode](evaluate-controlled-folder-access.md) at first so you can see how the feature works and review events without impacting normal device usage in your organization.
4949
50-
Group Policy settings that disable local administrator list merging will override controlled folder access settings. They also override protected folders and allowed apps set by the local administrator through controlled folder access. These policies include:
51-
52-
- Microsoft Defender Antivirus **Configure local administrator merge behavior for lists**
53-
- System Center Endpoint Protection **Allow users to add exclusions and overrides**
50+
> [!NOTE]
51+
> If you add Microsoft Defender Antivirus exclusions (process or path) for the binary in question, controlled folder access trusts it, and doesn't block the process or path. Group Policy settings that disable local administrator list merging override controlled folder access settings. They also override protected folders and allowed apps set by the local administrator through controlled folder access. These policies include:
52+
> - Microsoft Defender Antivirus **Configure local administrator merge behavior for lists**
53+
> - System Center Endpoint Protection **Allow users to add exclusions and overrides**
5454
5555
For more information about disabling local list merging, see [Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus).
5656

defender-endpoint/ios-configure-features.md

Lines changed: 242 additions & 185 deletions
Large diffs are not rendered by default.

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -116,8 +116,7 @@ All our updates contain
116116
- Fixed potentially packet loss due to [network protection](network-protection.md) shutdown that could lead to deadlock.
117117
- Implemented performance improvements for scenarios where WDAC is enabled with Intelligent Security Graph.
118118
- Fixed an issue where an Outlook exclusion for the ASR rule [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes) was not honored.
119-
- Fixed a race condition during the startup of [endpoint data loss prevention](/purview/endpoint-dlp-getting-started), such that in certain environments, some system files could be corrupted.
120-
119+
- Fixed a race condition during the startup of [endpoint data loss prevention](/purview/endpoint-dlp-getting-started) such that, in certain environments, some system files could be corrupted.
121120

122121
### May-2024 (Engine: 1.1.24050.5 | Platform: 4.18.24050.7)
123122

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/11/2024
18+
ms.date: 07/17/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -89,8 +89,6 @@ In general you need to take the following steps:
8989
- Ubuntu 18.04 LTS
9090
- Ubuntu 20.04 LTS
9191
- Ubuntu 22.04 LTS
92-
- Ubuntu 24.04 LTS
93-
9492
- Debian 9 - 12
9593
- SUSE Linux Enterprise Server 12 or higher
9694
- SUSE Linux Enterprise Server 15 or higher

defender-endpoint/minimum-requirements.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
66
author: siosulli
77
ms.reviewer: pahuijbr
88
ms.localizationpriority: medium
9-
ms.date: 05/01/2024
9+
ms.date: 07/17/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -67,9 +67,13 @@ Devices on your network must be running one of these editions. New features or c
6767

6868
### Supported Windows versions
6969

70+
> [!IMPORTANT]
71+
> Windows 11 Home devices that have been upgraded to one of the below supported editions might require you to run the following command before onboarding:
72+
> `DISM /online /Add-Capability /CapabilityName:Microsoft.Windows.Sense.Client~~~~`.
73+
> For more information about edition upgrades and features, see [Features](/windows-hardware/manufacture/desktop/windows-features?view=windows-11&preserve-view=true))
74+
7075
- Windows 11 Enterprise
7176
- Windows 11 IoT Enterprise
72-
7377
- Windows 11 Education
7478
- Windows 11 Pro
7579
- Windows 11 Pro Education

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 07/11/2024
16+
ms.date: 07/17/2024
1717
---
1818

1919
# Supported Microsoft Defender for Endpoint capabilities by platform
@@ -38,15 +38,15 @@ The following table gives information about the supported Microsoft Defender for
3838
|[Attack Surface Reduction](attack-surface-reduction.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
3939
|Device Control|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|
4040
|[Firewall](host-firewall-reporting.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
41-
|[Network Protection](network-protection.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
41+
|[Network Protection](network-protection.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
4242
|[Next-generation protection](next-generation-protection.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
4343
|[Tamper Protection](prevent-changes-to-security-settings-with-tamper-protection.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|
44-
|[Web Protection](web-protection-overview.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
44+
|[Web Protection](web-protection-overview.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
4545
||||||
4646
|**Detection**|||||
4747
|[Advanced Hunting](/defender-xdr/advanced-hunting-overview)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
4848
|[Custom file indicators](indicator-file.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
49-
|[Custom network indicators](indicator-ip-domain.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
49+
|[Custom network indicators](indicator-ip-domain.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg) <sup>[2]</sup>|
5050
|[EDR Block](edr-in-block-mode.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
5151
|[Passive Mode](microsoft-defender-antivirus-compatibility.md)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|
5252
|Sense detection sensor|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|![Yes.](media/svg/check-yes.svg)|

defender-endpoint/troubleshoot-onboarding-error-messages.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: troubleshooting
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 12/18/2020
16+
ms.date: 07/18/2024
1717
---
1818

1919
# Troubleshoot subscription and portal access issues
@@ -76,7 +76,7 @@ You'll need to allow the `security.windows.com` and all subdomains under it on y
7676

7777
## Portal communication issues
7878

79-
If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are allowed and open for communication.
79+
If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are accessible through the browser for authorized users:
8080

8181
- `*.blob.core.windows.net`
8282
- `crl.microsoft.com`

defender-for-iot/device-discovery.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Learn how to [discover and manage your IoT/OT devices](manage-devices-inventory.
2424
## Device inventory: initial view
2525

2626
If you don't yet have a Defender for IoT license, the **Device inventory** page detects your OT devices and lists them with regular device data, but without security data. For example, the device name, IP, and category are visible, while the risk level isn't visible. The device inventory also displays a note at the top of the page that indicates the number of unprotected OT devices.
27-
27+
2828
In this case, [onboard Defender for IoT](get-started.md) to get security value for your OT devices.
2929

3030
If you're seeing the message that indicates the number of unprotected OT devices, and you've already set up Defender for IoT, [set up a site](set-up-sites.md) and associate the relevant devices with it.
@@ -41,29 +41,29 @@ Learn more about the [device inventory in Microsoft Defender for Endpoint](/defe
4141

4242
The key device discovery capabilities are:
4343

44-
|Capability |Description |
45-
|---------|---------|
46-
|OT device management |[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.<br>- Add organization-specific information to emphasize your organization preferences. |
47-
|Device protection with risk-based approach |Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling. |
48-
|Device alignment with physical sites |Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views). |
49-
|Device groups |Allows different teams in your organization to monitor and manage relevant assets only. Learn more about [creating a device group](/defender-endpoint/machine-groups#create-a-device-group). |
50-
|Device criticality |Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview). |
44+
|Capability|Description|
45+
|---|---|
46+
|OT device management|[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.<br>- Add organization-specific information to emphasize your organization preferences.|
47+
|Device protection with risk-based approach|Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling.|
48+
|Device alignment with physical sites|Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views).|
49+
|Device groups|Allows different teams in your organization to monitor and manage relevant assets only. Learn more about [creating a device group](/defender-endpoint/machine-groups#create-a-device-group).|
50+
|Device criticality|Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview).|
5151

5252
## Supported devices
5353

5454
Defender for IoT's device inventory supports the following device classes:
5555

56-
|Devices |Example |
57-
|---------|---------|
58-
|**Manufacturing**| Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots |
59-
|**Building** | Access panels, surveillance devices, HVAC systems, elevators, smart lighting systems |
60-
|**Health care** | Glucose meters, monitors |
61-
|**Transportation / Utilities** | Turnstiles, people counters, motion sensors, fire and safety systems, intercoms |
62-
|**Energy and resources** | DCS controllers, PLCs, historian devices, HMIs |
63-
|**Endpoint devices** | Workstations, servers, or mobile devices |
64-
| **Enterprise** | Smart devices, printers, communication devices, or audio/video devices |
65-
| **Retail** | Barcode scanners, humidity sensor, punch clocks |
56+
|Devices|Example|
57+
|---|---|
58+
|**Manufacturing**|Industrial and operational devices, such as pneumatic devices, packaging systems, industrial packaging systems, industrial robots|
59+
|**Building**|Access panels, surveillance devices, HVAC systems, elevators, smart lighting systems|
60+
|**Health care**|Glucose meters, monitors|
61+
|**Transportation / Utilities**|Turnstiles, people counters, motion sensors, fire and safety systems, intercoms|
62+
|**Energy and resources**|DCS controllers, PLCs, historian devices, HMIs|
63+
|**Endpoint devices**|Workstations, servers, or mobile devices|
64+
|**Enterprise**|Smart devices, printers, communication devices, or audio/video devices|
65+
|**Retail**|Barcode scanners, humidity sensor, punch clocks|
6666

6767
## Next steps
6868

69-
[Discover and manage devices](manage-devices-inventory.md)
69+
[Discover and manage devices](manage-devices-inventory.md)

defender-for-iot/microsoft-defender-iot.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -22,18 +22,18 @@ In this article, you learn how Microsoft Defender customers can extend their pro
2222

2323
You can work with these different flavors of Defender for IoT:
2424

25-
|Flavor |Details |Next steps |
26-
|---------|---------|---------|
27-
|Defender for IoT in the Defender portal (Preview) |Microsoft Defender customers can use this flavor for a unified IT/OT experience, extending Defender XDR protection to OT environments. [Learn about the main use cases](#what-are-the-main-defender-for-iot-use-cases). |[Get started](get-started.md) with Defender for IoT in the Defender portal. |
28-
|Defender for IoT in the classic, Azure portal |All customers can use this flavor to identify OT devices, vulnerabilities, and threats in the Azure portal. |See the [Defender for IoT on Azure overview](/azure/defender-for-iot/organizations/overview). |
29-
|Protection for enterprise IoT devices |Microsoft Defender customers can enable protection for enterprise IoT devices, like printers, smart TVs, and conferencing systems and purpose-built, proprietary devices. |[Get started](/azure/defender-for-iot/organizations/eiot-sensor) with enterprise IoT monitoring. |
25+
|Flavor|Details|Next steps|
26+
|---|---|---|
27+
|Defender for IoT in the Defender portal (Preview)|Microsoft Defender customers can use this flavor for a unified IT/OT experience, extending Defender XDR protection to OT environments. [Learn about the main use cases](#what-are-the-main-defender-for-iot-use-cases).|[Get started](get-started.md) with Defender for IoT in the Defender portal.|
28+
|Defender for IoT in the classic, Azure portal|All customers can use this flavor to identify OT devices, vulnerabilities, and threats in the Azure portal.|See the [Defender for IoT on Azure overview](/azure/defender-for-iot/organizations/overview).|
29+
|Protection for enterprise IoT devices|Microsoft Defender customers can enable protection for enterprise IoT devices, like printers, smart TVs, and conferencing systems and purpose-built, proprietary devices.|[Get started](/azure/defender-for-iot/organizations/eiot-sensor) with enterprise IoT monitoring.|
3030

3131
## Who uses Defender for IoT?
3232

3333
Defender for IoT is intended for:
3434

3535
- **CISOs** or security leaders that want to gain an overview of their organization's OT network and security.
36-
- **OT security admins, industrial engineers, risk managers, and SOC analysts** that want to gain a high-level view of a site's risks, incidents, and vulnerabilities, get recommendations for remediation actions, manage and discover protected OT devices, and more.
36+
- **OT security admins, industrial engineers, risk managers, and SOC analysts** that want to gain a high-level view of a site's risks, incidents, and vulnerabilities, get recommendations for remediation actions, manage and discover protected OT devices, and more.
3737

3838
## What are the main OT security challenges?
3939

@@ -51,13 +51,13 @@ Defender for IoT in the Defender portal uses the following combination of techno
5151

5252
## What are the main Defender for IoT use cases?
5353

54-
|Use case |Capabilities |
55-
|---------|---------|
56-
|**[Discover OT devices](manage-devices-inventory.md)** |Gather OT network data from Microsoft Defender for Endpoint; identify and manage OT devices. |
57-
|**[Get an overview of your productions sites (site security)](site-security-overview.md)** |Get an overview of your production sites to gain insights into OT risks, make better-informed security investment decisions, and streamline communication between stakeholders. |
58-
|**[Prioritize and remediate vulnerabilities](prioritize-vulnerabilities.md)** |Proactively manage OT network risks based on vulnerability details and recommended remediation advice. |
59-
|**[Analyze incidents](investigate-threats.md) and respond to threats** |Review incidents and alerts with real-time details about events logged in your OT network and take recommended remediation actions. |
60-
|**Extend Microsoft Defender XDR** |Microsoft Defender XDR and Defender for IoT form a unified pre- and post-breach enterprise defense suite. This suite natively integrates across endpoint, IoT/OT, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks. |
54+
|Use case|Capabilities|
55+
|---|---|
56+
|**[Discover OT devices](manage-devices-inventory.md)**|Gather OT network data from Microsoft Defender for Endpoint; identify and manage OT devices.|
57+
|**[Get an overview of your productions sites (site security)](site-security-overview.md)**|Get an overview of your production sites to gain insights into OT risks, make better-informed security investment decisions, and streamline communication between stakeholders.|
58+
|**[Prioritize and remediate vulnerabilities](prioritize-vulnerabilities.md)**|Proactively manage OT network risks based on vulnerability details and recommended remediation advice.|
59+
|**[Analyze incidents](investigate-threats.md) and respond to threats**|Review incidents and alerts with real-time details about events logged in your OT network and take recommended remediation actions.|
60+
|**Extend Microsoft Defender XDR**|Microsoft Defender XDR and Defender for IoT form a unified pre- and post-breach enterprise defense suite. This suite natively integrates across endpoint, IoT/OT, identity, email, and applications to detect, prevent, investigate, and automatically respond to sophisticated attacks.|
6161

6262
## Next steps
6363

0 commit comments

Comments
 (0)