You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/advanced-features.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -184,7 +184,7 @@ After configuring the [Security policy violation indicators](/microsoft-365/comp
184
184
185
185
## Microsoft Intune connection
186
186
187
-
Defender for Endpoint can be integrated with [Microsoft Intune](/intune/what-is-intune) to [enable device risk-based conditional access](/intune/advanced-threat-protection). When you [turn on this feature](configure-conditional-access.md), you'll be able to share Defender for Endpoint device information with Intune, enhancing policy enforcement.
187
+
Defender for Endpoint can be integrated with [Microsoft Intune](/mem/intune/fundamentals/what-is-intune) to [enable device risk-based conditional access](/mem/intune/protect/advanced-threat-protection). When you [turn on this feature](configure-conditional-access.md), you'll be able to share Defender for Endpoint device information with Intune, enhancing policy enforcement.
188
188
189
189
> [!IMPORTANT]
190
190
> You'll need to enable the integration on both Intune and Defender for Endpoint to use this feature. For more information on specific steps, see [Configure Conditional Access in Defender for Endpoint](configure-conditional-access.md).
Copy file name to clipboardExpand all lines: defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ search.appverid: met150
30
30
31
31
## Use Microsoft Intune to configure scanning options
32
32
33
-
For more information, see [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure) and [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus).
33
+
For more information, see [Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure) and [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus).
34
34
35
35
## Use Microsoft Configuration Manager to configure scanning options
36
36
@@ -39,7 +39,10 @@ For details on configuring Microsoft Configuration Manager (current branch), see
39
39
## Use Group Policy to configure scanning options
40
40
41
41
> [!TIP]
42
-
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects. <br/><br/> Here are the most recent versions:
42
+
> Download the Group Policy Reference Spreadsheet, which lists the policy settings for computer and user configurations that are included in the Administrative template files delivered with for Windows. You can configure refer to the spreadsheet when you edit Group Policy Objects.
43
+
>
44
+
> Here are the most recent versions:
45
+
>
43
46
> -[Group Policy Settings Reference Spreadsheet for Windows 10 May 2020 Update (2004)](https://www.microsoft.com/download/details.aspx?id=101451)
44
47
> -[Group Policy Settings Reference Spreadsheet for Windows 11 October 2021 Update (21H2)](https://www.microsoft.com/download/details.aspx?id=103506)
Copy file name to clipboardExpand all lines: defender-endpoint/configure-conditional-access.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,8 +35,8 @@ This section guides you through all the steps you need to take to properly imple
35
35
36
36
You need to make sure that all your devices are enrolled in Intune. You can use any of the following options to enroll devices in Intune:
37
37
38
-
- IT Admin: For more information on how to enable auto-enrollment, see [Windows Enrollment](/intune/windows-enroll#enable-windows-10-automatic-enrollment)
39
-
- End user: For more information on how to enroll your Windows 10 and Windows 11 device in Intune, see [Enroll your Windows 10 device in Intune](/intune/quickstart-enroll-windows-device)
38
+
- IT Admin: For more information on how to enable auto-enrollment, see [Enable Windows automatic enrollment](/mem/intune/enrollment/windows-enroll#enable-windows-automatic-enrollment).
39
+
- End user: For more information on how to enroll your Windows 10 and Windows 11 device in Intune, see [Enroll your Windows device in Intune](/mem/intune/user-help/enroll-windows-10-device).
40
40
- End-user alternative: For more information on joining a Microsoft Entra domain, see [How to: Plan your Microsoft Entra join implementation](/azure/active-directory/devices/azureadjoin-plan).
41
41
42
42
There are steps you'll need to take in the Microsoft Defender portal, the Intune portal, and Microsoft Entra admin center.
@@ -132,7 +132,7 @@ Take the following steps to enable Conditional Access:
132
132
133
133
Applying a Conditional Access policy to All Cloud Apps could inadvertently block user access in some cases, so it's not recommended. Read more about [Conditional Access policies on Cloud Apps](/azure/active-directory/conditional-access/concept-conditional-access-cloud-apps#all-cloud-apps)
134
134
135
-
For more information, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/intune/advanced-threat-protection).
135
+
For more information, see [Enforce compliance for Microsoft Defender for Endpoint with Conditional Access in Intune](/mem/intune/protect/advanced-threat-protection).
136
136
137
137
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-conditionalaccess-belowfoldlink)
Copy file name to clipboardExpand all lines: defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,8 +88,8 @@ You can choose from several methods to define exclusions for Microsoft Defender
88
88
89
89
See the following articles:
90
90
91
-
-[Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure)
92
-
-[Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus)
91
+
-[Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure)
92
+
-[Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus)
93
93
94
94
### Use Configuration Manager to configure file name, folder, or file extension exclusions
Copy file name to clipboardExpand all lines: defender-endpoint/configure-machines-onboarding.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ From the device compliance page, create a configuration profile specifically for
69
69
- Select **Create a device configuration profile to configure ATP sensor** to start with a predefined device configuration profile.
70
70
- Create the device configuration profile from scratch.
71
71
72
-
For more information, [read about using Intune device configuration profiles to onboard devices to Defender for Endpoint](/intune/advanced-threat-protection#onboard-devices-by-using-a-configuration-profile).
72
+
For more information, [read about using Intune device configuration profiles to onboard devices to Defender for Endpoint](/mem/intune/protect/advanced-threat-protection#onboard-devices).
73
73
74
74
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
Copy file name to clipboardExpand all lines: defender-endpoint/configure-machines-security-baseline.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ ms.date: 12/18/2020
29
29
30
30
Security baselines ensure that security features are configured according to guidance from both security experts and expert Windows system administrators. When deployed, the Defender for Endpoint security baseline sets Defender for Endpoint security controls to provide optimal protection.
31
31
32
-
To understand security baselines and how they're assigned on Intune using configuration profiles, [read this FAQ](/intune/security-baselines#q--a).
32
+
To understand security baselines and how they're assigned on Intune using configuration profiles, [read this FAQ](/mem/intune/protect/security-baselines#q--a).
33
33
34
34
Before you can deploy and track compliance to security baselines:
35
35
@@ -40,8 +40,8 @@ Before you can deploy and track compliance to security baselines:
40
40
41
41
The Windows Intune security baseline provides a comprehensive set of recommended settings needed to securely configure devices running Windows, including browser settings, PowerShell settings, and settings for some security features like Microsoft Defender Antivirus. In contrast, the Defender for Endpoint baseline provides settings that optimize all the security controls in the Defender for Endpoint stack, including settings for endpoint detection and response (EDR) and settings also found in the Windows Intune security baseline. For more information about each baseline, see:
42
42
43
-
-[Windows security baseline settings for Intune](/intune/security-baseline-settings-windows)
44
-
-[Microsoft Defender for Endpoint baseline settings for Intune](/intune/security-baseline-settings-defender-atp)
43
+
-[Windows security baseline settings for Intune](/mem/intune/protect/security-baseline-settings-mdm-all)
44
+
-[Microsoft Defender for Endpoint baseline settings for Intune](/mem/intune/protect/security-baseline-settings-defender)
45
45
46
46
Ideally, devices onboarded to Defender for Endpoint are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Defender for Endpoint security baseline layered on top to optimally configure the Defender for Endpoint security controls. To benefit from the latest data on risks and threats and to minimize conflicts as baselines evolve, always apply the latest versions of the baselines across all products as soon as they're released.
47
47
@@ -98,7 +98,7 @@ Device configuration management monitors baseline compliance only of Windows 10
98
98
*Creating the security baseline profile on Intune*
99
99
100
100
> [!TIP]
101
-
> Security baselines on Intune provide a convenient way to comprehensively secure and protect your devices. [Learn more about security baselines on Intune](/intune/security-baselines).
101
+
> Security baselines on Intune provide a convenient way to comprehensively secure and protect your devices. [Learn more about security baselines on Intune](/mem/intune/protect/security-baselines).
102
102
103
103
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
Copy file name to clipboardExpand all lines: defender-endpoint/configure-machines.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,13 +53,13 @@ In doing so, you benefit from:
53
53
54
54
Device configuration management works closely with Intune device management to establish the inventory of the devices in your organization and the baseline security configuration. You will be able to track and manage configuration issues on Intune-managed Windows devices.
55
55
56
-
Before you can ensure your devices are configured properly, enroll them to Intune management. Intune enrollment is robust and has several enrollment options for Windows devices. For more information about Intune enrollment options, read about [setting up enrollment for Windows devices](/intune/windows-enroll).
56
+
Before you can ensure your devices are configured properly, enroll them to Intune management. Intune enrollment is robust and has several enrollment options for Windows devices. For more information about Intune enrollment options, read about [setting up enrollment for Windows devices](/mem/intune/enrollment/windows-enroll).
57
57
58
58
> [!NOTE]
59
-
> To enroll Windows devices to Intune, administrators must have already been assigned licenses. [Read about assigning licenses for device enrollment](/intune/licenses-assign).
59
+
> To enroll Windows devices to Intune, administrators must have already been assigned licenses. [Read about assigning licenses for device enrollment](/mem/intune/fundamentals/licenses-assign).
60
60
61
61
> [!TIP]
62
-
> To optimize device management through Intune, [connect Intune to Defender for Endpoint](/intune/advanced-threat-protection#enable-windows-defender-atp-in-intune).
62
+
> To optimize device management through Intune, [connect Intune to Defender for Endpoint](/mem/intune/protect/advanced-threat-protection-configure#connect-microsoft-defender-for-endpoint-to-intune).
63
63
64
64
## Obtain required permissions
65
65
@@ -80,7 +80,7 @@ If you have been assigned other roles, ensure you have the necessary permissions
80
80
*Device configuration permissions on Intune*
81
81
82
82
> [!TIP]
83
-
> To learn more about assigning permissions on Intune, [read about creating custom roles](/intune/create-custom-role#to-create-a-custom-role).
83
+
> To learn more about assigning permissions on Intune, [read about creating custom roles](/mem/intune/fundamentals/create-custom-role#to-create-a-custom-role).
Copy file name to clipboardExpand all lines: defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -94,7 +94,7 @@ Note that a process exclusion may also be defined via a [Contextual exclusion](c
94
94
95
95
### Use Microsoft Intune to exclude files that have been opened by specified processes from scans
96
96
97
-
For more information, see [Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure) and [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus).
97
+
For more information, see [Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure) and [Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus).
98
98
99
99
### Use Microsoft Configuration Manager to exclude files that have been opened by specified processes from scans
100
100
@@ -162,7 +162,7 @@ Follow the instructions in [Add exclusions in the Windows Security app](microsof
162
162
163
163
## Review the list of exclusions
164
164
165
-
You can retrieve the items in the exclusion list with MpCmdRun, PowerShell, [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), [Intune](/intune/device-restrictions-configure), or the [Windows Security app](microsoft-defender-security-center-antivirus.md).
165
+
You can retrieve the items in the exclusion list with MpCmdRun, PowerShell, [Microsoft Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings), [Intune](/mem/intune/configuration/device-restrictions-configure), or the [Windows Security app](microsoft-defender-security-center-antivirus.md).
166
166
167
167
If you use PowerShell, you can retrieve the list in two ways:
Copy file name to clipboardExpand all lines: defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,8 +115,8 @@ See the following articles:
115
115
116
116
See the following articles:
117
117
118
-
-[Configure device restriction settings in Microsoft Intune](/intune/device-restrictions-configure)
119
-
-[Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/intune/device-restrictions-windows-10#microsoft-defender-antivirus)
118
+
-[Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure)
119
+
-[Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune](/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus)
120
120
121
121
### Use Configuration Manager to configure PUA protection
0 commit comments