Skip to content

Commit ee05115

Browse files
authored
Merge pull request #3178 from MicrosoftDocs/deniseb-portal
Microsoft Defender portal
2 parents f87d689 + d1e0399 commit ee05115

File tree

6 files changed

+7
-7
lines changed

6 files changed

+7
-7
lines changed

defender-endpoint/ios-install-unmanaged.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
4949

5050
### Prerequisites
5151

52-
1. **Verify that the Intune connector is enabled in Security portal**. <br> On the [unified security console](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced Features** and ensure that **Microsoft Intune connection** is enabled.
52+
1. **Verify that the Intune connector is enabled in Security portal**. <br> In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced Features** and ensure that **Microsoft Intune connection** is enabled.
5353

5454
:::image type="content" source="media/enable-intune-connection.png" alt-text="The Defender for Endpoint - Intune connector." lightbox="media/enable-intune-connection.png":::
5555

defender-endpoint/linux-preferences.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -531,7 +531,7 @@ Type of threat for which the behavior is configured.
531531
Action to take when coming across a threat of the type specified in the preceding section. Can be:
532532

533533
- **Audit**: The device isn't protected against this type of threat, but an entry about the threat is logged. (Default)
534-
- **Block**: The device is protected against this type of threat and you're notified in the security console.
534+
- **Block**: The device is protected against this type of threat and you're notified in the Microsoft Defender portal.
535535
- **Off**: The device isn't protected against this type of threat and nothing is logged.
536536

537537
|Description|JSON Value|Microsoft Defender portal value|

defender-endpoint/mac-jamfpro-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ Use this article to set up policies for Defender for Endpoint on Mac using Jamf
107107

108108
## Step 3: Configure Microsoft Defender for Endpoint settings
109109

110-
In this step, we go over *Preferences* so you can configure anti-malware and EDR policies using Microsoft Defender XDR portal ([https://security.microsoft.com](https://security.microsoft.com)) or Jamf.
110+
In this step, we go over *Preferences* so you can configure anti-malware and EDR policies using the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) or Jamf.
111111

112112
> [!IMPORTANT]
113113
> Microsoft Defender for Endpoint Security Settings Management policies take precedence over Jamf set (and other 3rd party MDM) policies.

defender-endpoint/mac-preferences.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ Specify threat types.
294294
Specify what action to take when a threat of the type specified in the preceding section is detected. Choose from the following options:
295295

296296
- **Audit**: your device isn't protected against this type of threat, but an entry about the threat is logged.
297-
- **Block**: your device is protected against this type of threat and you're notified in the user interface and the security console.
297+
- **Block**: your device is protected against this type of threat and you're notified in the user interface and the Microsoft Defender portal.
298298
- **Off**: your device isn't protected against this type of threat and nothing is logged.
299299

300300
|Section|Value|

defender-endpoint/microsoft-defender-endpoint-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Deployment of Microsoft Defender for Endpoint on iOS can be done via Microsoft I
9494

9595
- Stay informed about upcoming releases by visiting [What's new in Microsoft Defender for Endpoint on iOS](ios-whatsnew.md) or our [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/iOS).
9696

97-
- Provide feedback through in-app feedback system or through the [unified security console](https://security.microsoft.com)
97+
- Provide feedback through in-app feedback system or through the [Microsoft Defender portal](https://security.microsoft.com)
9898

9999
## Next steps
100100

defender-endpoint/onboard-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ ms.date: 03/17/2025
2828

2929
You can choose from several options to onboard a server to Microsoft Defender for Endpoint. Make sure to review the [Minimum requirements for Microsoft Defender for Endpoint](minimum-requirements.md).
3030

31-
## Server licenses
31+
## Server plans
3232

3333
To onboard servers to Defender for Endpoint, [server licenses](/office365/servicedescriptions/microsoft-365-service-descriptions/microsoft-365-tenantlevel-services-licensing-guidance/microsoft-365-security-compliance-licensing-guidance#microsoft-defender-for-endpoint) are required. You can choose from these options:
3434

@@ -44,7 +44,7 @@ The following table lists deployment methods for onboarding servers:
4444
|---|---|
4545
| Windows Server 2025 <br/>Windows Server 2022 <br/>Windows Server 2019<br/>Windows Server, version 1803 | [Local script](configure-endpoints-script.md) (uses an onboarding package)<br/>[Defender for Servers](/azure/defender-for-cloud/tutorial-enable-servers-plan)<br/> [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection) <br/> [Group Policy](configure-endpoints-gp.md) <br/>[VDI scripts](configure-endpoints-vdi.md) |
4646
| Windows Server 2016 <br/>Windows Server 2012 R2 | [Modern, unified solution in Defender for Endpoint](/defender-endpoint/configure-server-endpoints#windows-server-2016-and-windows-server-2012-r2) |
47-
|Linux Server |[Installer script based deployment](/defender-endpoint/linux-installer-script) <br/>[Ansible](linux-install-with-ansible.md) <br/>[Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/>[Puppet](linux-install-with-puppet.md) <br/>[Saltstack](linux-install-with-saltack.md)<br/> [Manual deployment](linux-install-manually.md) (uses a local script) <br/>[Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)<br/>[Deployment guidance for Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md) <br/>[Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)|
47+
|Linux Server |[Installer script based deployment](/defender-endpoint/linux-installer-script) <br/>[Ansible](linux-install-with-ansible.md) <br/>[Chef](linux-deploy-defender-for-endpoint-with-chef.md)<br/>[Puppet](linux-install-with-puppet.md) <br/>[Saltstack](linux-install-with-saltack.md)<br/> [Manual deployment](linux-install-manually.md) (uses a local script) <br/>[Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)<br/>[Connect your non-Azure machines to Microsoft Defender for Cloud with Defender for Endpoint](/azure/defender-for-cloud/quickstart-onboard-machines)<br/>[Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md)<br/>[Deployment guidance for Defender for Endpoint on Linux for SAP](mde-linux-deployment-on-sap.md) |
4848

4949
## See also
5050

0 commit comments

Comments
 (0)