Skip to content

Commit f4c706a

Browse files
committed
Merge branch 'main' into AttackSim-chrisda
2 parents 9be68a9 + 6208078 commit f4c706a

File tree

255 files changed

+3715
-2287
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

255 files changed

+3715
-2287
lines changed

.acrolinx-config.edn

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
{:changed-files-limit 30
1+
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["defender-xdr/" "exposure-management/" "defender/" "defender-business/" "defender-vulnerability-management/" "defender-office-365/" "defender-endpoint/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,6 @@
55
"redirect_url": "/defender-xdr/advanced-hunting-overview",
66
"redirect_document_id": false
77
},
8-
{
9-
"source_path": "defender-xdr/alerts-incidents-correlation.md",
10-
"redirect_url": "/defender-xdr/incident-response-overview",
11-
"redirect_document_id": false
12-
},
138
{
149
"source_path": "defender-office-365/zero-trust-continuous-access-evaluation-microsoft-365.md",
1510
"redirect_url": "/security/zero-trust/zero-trust-continuous-access-evaluation-microsoft-365",
@@ -194,6 +189,11 @@
194189
"source_path": "defender-endpoint/evaluation-lab.md",
195190
"redirect_url": "/defender-endpoint/evaluate-microsoft-defender-antivirus",
196191
"redirect_document_id": true
192+
},
193+
{
194+
"source_path": "defender-endpoint/collect-diagnostic-data-update-compliance.md",
195+
"redirect_url": "/defender-endpoint/collect-diagnostic-data",
196+
"redirect_document_id": false
197197
}
198198
]
199199
}

defender-business/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
href: trial-playbook-defender-business.md
2626
- name: Visit the Microsoft Defender portal
2727
href: mdb-get-started.md
28-
- name: Try tutorials and simulations
28+
- name: Find training and learning resources
2929
href: mdb-tutorials.md
3030
- name: Set up and configure Defender for Business
3131
items:

defender-business/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@ landingContent:
5656
url: trial-playbook-defender-business.md
5757
- text: Turn on preview features
5858
url: /defender-xdr/preview
59+
- text: Find training and learning resources
60+
url: mdb-tutorials.md
5961

6062
# Card
6163
- title: Setup information

defender-business/mdb-add-users.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 06/07/2024
12+
ms.date: 06/19/2024
1313
ms.collection:
1414
- m365-security
1515
- tier1
@@ -59,8 +59,8 @@ One good way to make sure MFA is enabled for all users is by using [security def
5959

6060
4. On the right side of the screen, in the **Security defaults** pane, see whether security defaults are turned on (**Enabled**) or off (**Disabled**). To turn security defaults on, use the drop-down menu to select **Enabled**.
6161

62-
> [!CAUTION]
63-
> If your organization is using Conditional Access policies, you won't be able to enable security defaults. You'll see a message that indicates you're using classic policies instead. You can use *either* security defaults *or* Conditional Access, but not both. For most organizations, security defaults offer a good level of sign-in security. But if your organization must meet more stringent requirements, you can use Conditional Access policies instead. To learn more, see the following articles:
62+
> [!NOTE]
63+
> If your organization is using Conditional Access policies, don't enable security defaults. In this case, you might see a message that indicates you're using classic policies. To learn more, see the following articles:
6464
> - [Multi-factor authentication](/Microsoft-365/business-premium/m365bp-turn-on-mfa) (in the Microsoft 365 Business Premium documentation)
6565
> - [Security defaults in Microsoft Entra ID](/azure/active-directory/fundamentals/concept-fundamentals-security-defaults)
6666
@@ -69,5 +69,6 @@ One good way to make sure MFA is enabled for all users is by using [security def
6969
## Next steps
7070

7171
- [Step 3: Assign security roles and permissions in Microsoft Defender for Business](mdb-roles-permissions.md).
72+
7273
- [Step 4: Set up email notifications for your security team](mdb-email-notifications.md).
7374

defender-business/mdb-create-edit-device-groups.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/17/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- SMB
@@ -30,7 +30,6 @@ In Defender for Business, policies are applied to devices through certain collec
3030
- [How to view an existing device group](#view-an-existing-device-group)
3131
- [What the Add All Devices option does](#what-does-the-add-all-devices-option-do)
3232

33-
3433
## What is a device group?
3534

3635
A device group is a collection of devices that are grouped together because of certain specified criteria, such as operating system version. Devices that meet the criteria are included in that device group, unless you exclude them. In Defender for Business, policies are applied to devices by using device groups.

defender-business/mdb-email-notifications.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
1212
ms.reviewer: nehabha
13-
ms.date: 05/01/2023
13+
ms.date: 06/19/2024
1414
f1.keywords: NOCSH
1515
ms.collection:
1616
- m365-security
@@ -45,7 +45,7 @@ When you set up email notifications, you can choose from two types, as described
4545
> [!TIP]
4646
> **Email notifications are not the only way your security team can find out about new alerts or vulnerabilities**.
4747
>
48-
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are others! For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they'll see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
48+
> Email notifications are a convenient way to help keep your security team informed, in real time. But there are other methods you can use as well. For example, whenever your security team signs into the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), they see cards highlighting new threats, alerts, and vulnerabilities. Defender for Business is designed to highlight important information that your security team cares about as soon as they sign in.
4949
>
5050
> Your security team can also choose **Incidents** in the navigation pane to view information. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).
5151

defender-business/mdb-firewall.md

Lines changed: 34 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 05/04/2023
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -34,10 +34,29 @@ You can use firewall protection to specify whether to allow or to block connecti
3434

3535
Depending on whether you're using the Microsoft Defender portal or Intune to manage your firewall protection, use one of the following procedures.
3636

37-
| Portal | Procedure |
38-
|:---|:---|
39-
| Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) |1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.<br/>2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.<br/>3. Select an operating system tab (such as **Windows clients**).<br/>4. Expand **Firewall** to view your list of policies.<br/>5. Select a policy to view the details. <br/><br/>To make changes or to learn more about policy settings, see the following articles:<br/>- [View or edit device policies](mdb-view-edit-create-policies.md)<br/>- [Firewall settings](mdb-firewall.md)<br/>- [Manage your custom rules for firewall policies](mdb-firewall.md) |
40-
| Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)) |1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.<br/>2. Select **Endpoint security**.<br/>3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. <br/><br/>For help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).|
37+
### Use the Microsoft Defender portal to view or edit firewall policies
38+
39+
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), and sign in.
40+
41+
2. In the navigation pane, choose **Device configuration**. Policies are organized by operating system and policy type.
42+
43+
3. Select an operating system tab (such as **Windows clients**).
44+
45+
4. Expand **Firewall** to view your list of policies.
46+
47+
5. Select a policy to view the details. To make changes or to learn more about policy settings, see the following articles:
48+
49+
- [View or edit device policies](mdb-view-edit-create-policies.md)
50+
- [Firewall settings](mdb-firewall.md)
51+
- [Manage your custom rules for firewall policies](mdb-firewall.md)
52+
53+
### Use the Intune admin center to view or edit firewall policies
54+
55+
1. Go to [https://intune.microsoft.com](https://intune.microsoft.com) and sign in. You're now in the Intune admin center.
56+
57+
2. Select **Endpoint security**.
58+
59+
3. Select **Firewall** to view your policies in that category. Custom rules that are defined for firewall protection are listed as separate policies. To get help with managing your security settings in Intune, start with [Manage endpoint security in Microsoft Intune](/mem/intune/protect/endpoint-security).
4160

4261
## Manage your custom rules for firewall policies in Microsoft Defender for Business
4362

@@ -56,10 +75,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
5675
5. To create a custom rule, follow these steps:
5776

5877
1. Under **Custom rules**, choose **+ Add rule**. (You can have up to 150 custom rules.)
78+
5979
2. On the **Create new rule** flyout, specify a name and description for the rule.
80+
6081
3. Select a profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
82+
6183
4. In the **Remote address type** list, select either **IP** or **Application file path**.
84+
6285
5. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6d, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
86+
6387
6. On the **Create new rule** flyout, select **Create rule**.
6488

6589
6. On the **Configuration settings** screen, choose **Next**.
@@ -81,10 +105,15 @@ You can use custom rules to define exceptions for your firewall policies. That i
81105
6. To edit your custom rule, follow these steps:
82106

83107
1. On the **Edit rule** flyout, review and edit the rule's name and description.
108+
84109
2. Review and if necessary, edit the rule's profile. (Your options include **Domain network**, **Public network**, or **Private network**.)
110+
85111
3. In the **Remote address type** list, select either **IP** or **Application file path**.
112+
86113
4. In the **Value** box, specify an appropriate value. Depending on what you selected in step 6c, you might specify an IP address, an IP address range, or an application file path. (See [Firewall settings](mdb-firewall.md).)
114+
87115
5. Set **Enable rule** to **On** to make the rule active. Or, to disable the rule, set the switch to **Off**.
116+
88117
6. On the **Edit rule** flyout, select **Update rule**.
89118

90119
7. On the **Configuration settings** screen, choose **Next**.

defender-business/mdb-get-started.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 04/10/2024
12+
ms.date: 07/03/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -37,15 +37,12 @@ Use the navigation bar on the left side of the screen to access your incidents,
3737
| **Incidents & alerts** > **Incidents** | Takes you to your list of recent incidents. As alerts are triggered, incidents are created. An incident can include multiple alerts. Make sure to review your incidents regularly. To learn more, see [View and manage incidents in Defender for Business](mdb-view-manage-incidents.md).|
3838
| **Actions & submissions** > **Action center** | Takes you to your list of response actions, including completed and pending actions.<br/>- Select the **Pending** tab to view actions that require approval to proceed.<br/>- Select the **History** tab to see the actions that were taken. Some actions are taken automatically; others are taken manually or complete after they're approved.<br/><br/>To learn more, see [Review remediation actions in the Action center](mdb-review-remediation-actions.md). |
3939
| **Actions & submissions** > **Submissions** | Takes you to the unified submissions portal, where you can submit files to Microsoft for analysis. To learn more, see [Submit files in Microsoft Defender for Endpoint](/defender-endpoint/admin-submissions-mde) (the process is similar for Defender for Business). |
40-
| **Secure score** | Provides a representation of your company's security position and offers suggestions to improve it. To learn more, see [Microsoft Secure Score for Devices](/defender-vulnerability-management/tvm-microsoft-secure-score-devices). |
41-
| **Learning hub** | Provides access to security training and other resources through learning paths that are included with your subscription. You can filter by product, skill level, role, and more. The Learning hub can help your security team ramp up on security features and capabilities in Defender for Business and more Microsoft offerings, such as [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). |
40+
| **Learning hub** | Security training and other resources are available online at [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). You can filter by product, skill level, role, and more. The Learning hub can help your security team ramp up on security features and capabilities in Defender for Business and more Microsoft offerings, such as [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). |
4241
| **Trials** | Try additional security and compliance capabilities by adding on a trial subscription. If you do not see **Trials** in your navigation bar, and you want to add on another trial, you can take one of the following steps: <br/>- Visit the [Small Business Solutions page](https://www.microsoft.com/en-us/store/b/business?icid=CNavBusinessStore), and choose **Questions? Talk to an expert** to get some help adding on a trial subscription. <br/>- Go to the [Microsoft 365 admin center](https://admin.microsoft.com/?auth_upn=admin%40M365B614031.onmicrosoft.com&source=applauncher#/catalog), and choose **Billing** > **Purchase services**. If you need help, choose **Help & support**. |
4342
| **Partner catalog** | Lists Microsoft partners who provide technical and professional services. |
44-
| **Assets** > **Devices** | Enables you to view devices, such as computers and mobile devices that are enrolled in [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). |
43+
| **Assets** > **Devices** | Takes you to the device inventory view, where you can view devices, such as computers and mobile devices that are enrolled in [Microsoft Intune](/mem/intune/fundamentals/what-is-intune). If no devices are onboarded yet, you can select **Onboard devices** to get started. For more information, see [Onboard devices to Microsoft Defender for Business](mdb-onboard-devices.md). |
4544
| **Endpoints** > **Vulnerability management** | Enables you to access your [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management) capabilities. Provides a dashboard, recommendations, remediation activities, a software inventory, and a list of potential weaknesses within your company. |
46-
| **Endpoints** > **Tutorials** | Provides access to walkthroughs and simulations to help you learn more about how your threat protection features work. Select the **Read the walkthrough** link before attempting to get the simulation file for each tutorial. Some simulations require Office apps, such as Microsoft Word, to read the walkthrough. |
4745
| **Endpoints** > **Configuration management** > **Device configuration** | Lists your security policies by operating system and by type. To learn more about your security policies, see [View or edit policies in Defender for Business](mdb-view-edit-create-policies.md). |
48-
| **Endpoints** > **Configuration management** > **Device management reporting** | Lists devices that are onboarded to Defender for Business, along with their operating system version, sensor health state, and when they were last updated. |
4946
| **Email & collaboration** > **Policies & rules** | If your subscription includes Exchange Online Protection or Microsoft Defender for Office 365, this section is where you'll manage your security policies and settings for email and collaboration services. [Learn more about Office 365 security](/defender-office-365/mdo-about). *The standalone version of Defender for Business does not include email & collaboration policies, but Microsoft 365 Business Premium does include Exchange Online Protection and Defender for Office 365 Plan 1*. |
5047
| **Cloud apps** > **App governance** | If your subscription includes [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps), you can add on [app governance](/defender-cloud-apps/app-governance-manage-app-governance), and this section is where you'll view and access those capabilities. *Defender for Business and Microsoft 365 Business Premium do not include Defender for Cloud Apps*. |
5148
| **Reports** | Lists available security reports. These reports enable you to see your security trends, view details about threat detections and alerts, and learn more about your company's vulnerable devices. |

defender-business/mdb-lighthouse-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: overview
1010
ms.service: defender-business
1111
ms.localizationpriority: medium
12-
ms.date: 09/28/2022
12+
ms.date: 06/19/2024
1313
ms.reviewer: nehabha
1414
f1.keywords: NOCSH
1515
ms.collection:
@@ -34,7 +34,7 @@ If you're a Microsoft Cloud Solution Provider (CSP) or Managed Service Provider
3434

3535
## Learn more about Microsoft 365 Lighthouse
3636

37-
Microsoft 365 Lighthouse enables Microsoft CSPs and MSPs to secure and manage devices, data, and users at scale.
37+
Microsoft 365 Lighthouse enables Microsoft CSPs and MSPs to secure and manage devices, data, and users for customers.
3838

3939
To learn more, see:
4040

0 commit comments

Comments
 (0)