Skip to content

Commit f1cb5e5

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into redirect
2 parents 29e2576 + 860b6e3 commit f1cb5e5

File tree

558 files changed

+7378
-5171
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

558 files changed

+7378
-5171
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
{:changed-files-limit 30
1+
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["defender-xdr/" "exposure-management/" "defender/" "defender-business/" "defender-vulnerability-management/" "defender-office-365/" "defender-endpoint/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

.openpublishing.redirection.defender.json

Lines changed: 25 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,6 @@
55
"redirect_url": "/defender-xdr/advanced-hunting-overview",
66
"redirect_document_id": false
77
},
8-
{
9-
"source_path": "defender-xdr/alerts-incidents-correlation.md",
10-
"redirect_url": "/defender-xdr/incident-response-overview",
11-
"redirect_document_id": false
12-
},
138
{
149
"source_path": "defender-office-365/zero-trust-continuous-access-evaluation-microsoft-365.md",
1510
"redirect_url": "/security/zero-trust/zero-trust-continuous-access-evaluation-microsoft-365",
@@ -185,10 +180,35 @@
185180
"redirect_url": "/defender-xdr/pilot-deploy-overview",
186181
"redirect_document_id": false
187182
},
183+
{
184+
"source_path": "defender-xdr/microsoft-365-security-mde-redirection.md",
185+
"redirect_url": "/defender-xdr/",
186+
"redirect_document_id": false
187+
},
188188
{
189189
"source_path": "defender-endpoint/evaluation-lab.md",
190190
"redirect_url": "/defender-endpoint/evaluate-microsoft-defender-antivirus",
191191
"redirect_document_id": true
192+
},
193+
{
194+
"source_path": "defender-endpoint/collect-diagnostic-data-update-compliance.md",
195+
"redirect_url": "/defender-endpoint/collect-diagnostic-data",
196+
"redirect_document_id": false
197+
},
198+
{
199+
"source_path": "defender-endpoint/attack-simulations.md",
200+
"redirect_url": "/defender-endpoint/defender-endpoint-demonstrations",
201+
"redirect_document_id": true
202+
},
203+
{
204+
"source_path": "defender-endpoint/mssp-support.md",
205+
"redirect_url": "/defender-endpoint/configure-mssp-support",
206+
"redirect_document_id": true
207+
},
208+
{
209+
"source_path": "defender-endpoint/evaluate-mde.md",
210+
"redirect_url": "/defender-endpoint/evaluate-microsoft-defender-antivirus",
211+
"redirect_document_id": false
192212
}
193213
]
194214
}

defender-business/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
href: trial-playbook-defender-business.md
2626
- name: Visit the Microsoft Defender portal
2727
href: mdb-get-started.md
28-
- name: Try tutorials and simulations
28+
- name: Find training and learning resources
2929
href: mdb-tutorials.md
3030
- name: Set up and configure Defender for Business
3131
items:

defender-business/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ landingContent:
5656
url: trial-playbook-defender-business.md
5757
- text: Turn on preview features
5858
url: /defender-xdr/preview
59+
- text: Find training and learning resources
60+
url: mdb-tutorials.md
5961

6062
# Card
6163
- title: Setup information

defender-business/mdb-add-users.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 06/07/2024
12+
ms.date: 06/19/2024
1313
ms.collection:
1414
- m365-security
1515
- tier1
@@ -59,8 +59,8 @@ One good way to make sure MFA is enabled for all users is by using [security def
5959

6060
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
6161

62-
> [!CAUTION]
63-
> If your organization is using Conditional Access policies, you won't be able to enable security defaults. You'll see a message that indicates you're using classic policies instead. You can use *either* security defaults *or* Conditional Access, but not both. For most organizations, security defaults offer a good level of sign-in security. But if your organization must meet more stringent requirements, you can use Conditional Access policies instead. To learn more, see the following articles:
62+
> [!NOTE]
63+
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
6464
> - [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
6565
> - [Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
6666
@@ -69,5 +69,6 @@ One good way to make sure MFA is enabled for all users is by using [security def
6969
## Next steps
7070

7171
- [Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
72+
7273
- [Step 4: Set up email notifications for your security team](mdb-email-notifications.md).
7374

defender-business/mdb-asr.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Get an overview of attack surface reduction capabilities, including
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 06/07/2024
7+
ms.date: 07/23/2024
88
ms.topic: conceptual
99
ms.service: defender-business
1010
ms.localizationpriority: medium
@@ -23,9 +23,6 @@ Your attack surfaces are all the places and ways that your organization's networ
2323

2424
To help protect your network and devices, Microsoft Defender for Business includes several attack surface reduction capabilities, including attack surface reduction rules. This article describes how to set up your attack surface reduction rules and describes attack surface reduction capabilities.
2525

26-
> [!NOTE]
27-
> Intune is not included in the standalone version of Defender for Business, but it can be added on.
28-
2926
## Standard protection ASR rules
3027

3128
There are lots of attack surface reduction rules available. You don't have to set them all up at once. And, you can set up some rules in audit mode just to see how they work for your organization, and change them to work in block mode later. That said, we recommend enabling the following standard protection rules as soon as possible:

defender-business/mdb-create-edit-device-groups.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/17/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- SMB
@@ -30,7 +30,6 @@ In Defender for Business, policies are applied to devices through certain collec
3030
- [How to view an existing device group](#view-an-existing-device-group)
3131
- [What the Add All Devices option does](#what-does-the-add-all-devices-option-do)
3232

33-
3433
## What is a device group?
3534

3635
A device group is a collection of devices that are grouped together because of certain specified criteria, such as operating system version. Devices that meet the criteria are included in that device group, unless you exclude them. In Defender for Business, policies are applied to devices by using device groups.

defender-business/mdb-email-notifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/01/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- m365-security
@@ -45,7 +45,7 @@ When you set up email notifications, you can choose from two types, as described
4545
> [!TIP]
4646
> **Email notifications are not the only way your security team can find out about new alerts or vulnerabilities**.
4747
>
48-
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are others! For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they'll see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
48+
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are other methods you can use as well. For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
4949
>
5050
> Your security team can also choose **Incidents** in the navigation pane to view information. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).
5151

defender-business/mdb-firewall.md

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 05/04/2023
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -34,10 +34,29 @@ You can use firewall protection to specify whether to allow or to block connecti
3434

3535
Depending on whether you're using the Microsoft Defender portal or Intune to manage your firewall protection, use one of the following procedures.
3636

37-
| Portal | Procedure |
38-
|:---|:---|
39-
| Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.<br/>2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.<br/>3. Select an operating system tab (such as **Windows clients**).<br/>4. Expand **Firewall** to view your list of policies.<br/>5. Select a policy to view the details. <br/><br/>To make changes or to learn more about policy settings, see the following articles:<br/>- [View or edit device policies](mdb-view-edit-create-policies.md)<br/>- [Firewall settings](mdb-firewall.md)<br/>- [Manage your custom rules for firewall policies](mdb-firewall.md) |
40-
| Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) |1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.<br/>2. Select **Endpoint security**.<br/>3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. <br/><br/>For help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).|
37+
### Use the Microsoft Defender portal to view or edit firewall policies
38+
39+
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
40+
41+
2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.
42+
43+
3. Select an operating system tab (such as **Windows clients**).
44+
45+
4. Expand **Firewall** to view your list of policies.
46+
47+
5. Select a policy to view the details. To make changes or to learn more about policy settings, see the following articles:
48+
49+
- [View or edit device policies](mdb-view-edit-create-policies.md)
50+
- [Firewall settings](mdb-firewall.md)
51+
- [Manage your custom rules for firewall policies](mdb-firewall.md)
52+
53+
### Use the Intune admin center to view or edit firewall policies
54+
55+
1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.
56+
57+
2. Select **Endpoint security**.
58+
59+
3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. To get help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
4160

4261
## Manage your custom rules for firewall policies in Microsoft Defender for Business
4362

@@ -56,10 +75,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
5675
5. To create a custom rule, follow these steps:
5776

5877
1. Under **Custom rules**, choose **+ Add rule**. (You can have up to 150 custom rules.)
78+
5979
2. On the **Create new rule** flyout, specify a name and description for the rule.
80+
6081
3. Select a profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
82+
6183
4. In the **Remote address type** list, select either **IP** or **Application file path**.
84+
6285
5. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6d, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
86+
6387
6. On the **Create new rule** flyout, select **Create rule**.
6488

6589
6. On the **Configuration settings** screen, choose **Next**.
@@ -81,10 +105,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
81105
6. To edit your custom rule, follow these steps:
82106

83107
1. On the **Edit rule** flyout, review and edit the rule's name and description.
108+
84109
2. Review and if necessary, edit the rule's profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
110+
85111
3. In the **Remote address type** list, select either **IP** or **Application file path**.
112+
86113
4. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6c, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
114+
87115
5. Set **Enable rule** to **On** to make the rule active. Or, to disable the rule, set the switch to **Off**.
116+
88117
6. On the **Edit rule** flyout, select **Update rule**.
89118

90119
7. On the **Configuration settings** screen, choose **Next**.

0 commit comments

Comments
 (0)