Skip to content

Commit f896730

Browse files
Merge pull request #4664 from MicrosoftDocs/main
[AutoPublish] main to live - 08/05 01:36 PDT | 08/05 14:06 IST
2 parents 0678b2d + cdc0a24 commit f896730

10 files changed

+21
-36
lines changed

defender-endpoint/gov.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,7 @@ These are the known gaps:
160160
|Microsoft Defender for Endpoint Security Configuration Management|:::image type="icon" source="media/svg/check-yes.svg" border="false":::|:::image type="icon" source="media/svg/check-yes.svg" border="false":::|:::image type="icon" source="media/svg/check-yes.svg" border="false":::|
161161
|Microsoft Defender for IoT enterprise IoT security|:::image type="icon" source="media/svg/check-no.svg" border="false":::|:::image type="icon" source="media/svg/check-no.svg" border="false":::|:::image type="icon" source="media/svg/check-no.svg" border="false":::|
162162

163+
163164
> [!NOTE]
164165
> While Microsoft Secure Score is available for GCC, GCC High and DoD customers, there are some security recommendations that aren't available.
165166

defender-endpoint/mac-install-with-intune.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -488,6 +488,7 @@ To download the onboarding package from the Microsoft Defender portal:
488488

489489
1. Select **Download onboarding package**. Save it as _GatewayWindowsDefenderATPOnboardingPackage.zip_ to the same directory.
490490

491+
491492
1. Extract the contents of the .zip file:
492493

493494
```bash

defender-for-cloud/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +0,0 @@
1-
- name: Index
2-
href: index.md

defender-for-cloud/index.md

Lines changed: 0 additions & 16 deletions
This file was deleted.

defender-office-365/anti-malware-protection-for-spo-odfb-teams-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ By default, users can download infected files from SharePoint or OneDrive. Here'
5353
1. In a web browser, a user tries to download a file from SharePoint or OneDrive that happens to be infected.
5454
2. The user is shown a warning that a virus was detected in the file. The user is given the option to proceed with the download and attempt to clean it using anti-virus software on their device.
5555

56-
To change this behavior so users can't download infected files from SharePoint or OneDrive, even from the anti-virus warning window, admins can use the *DisallowInfectedFileDownload* parameter on the **[Set-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant)** cmdlet in SharePoint Online PowerShell. The value $true for the *DisallowInfectedFileDownload* parameter completely blocks access to detected/blocked files for users.
56+
To change this behavior so users can't download infected files from SharePoint or OneDrive, even from the anti-virus warning window, admins can use the *DisallowInfectedFileDownload* parameter on the **[Set-SPOTenant](/powershell/module/microsoft.online.sharepoint.powershell/set-spotenant)** cmdlet in SharePoint Online PowerShell. The value $true for the *DisallowInfectedFileDownload* parameter completely blocks access to detected/blocked files for users.
5757

5858
For instructions, see [Use SharePoint Online PowerShell to prevent users from downloading malicious files](safe-attachments-for-spo-odfb-teams-configure.md#step-2-recommended-use-sharepoint-online-powershell-to-prevent-users-from-downloading-malicious-files).
5959

defender-office-365/safe-attachments-for-spo-odfb-teams-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ Set-SPOTenant -DisallowInfectedFileDownload $true
9595
- This setting affects both users and admins.
9696
- People can still delete malicious files.
9797

98-
For detailed syntax and parameter information, see [Set-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant).
98+
For detailed syntax and parameter information, see [Set-SPOTenant](/powershell/module/microsoft.online.sharepoint.powershell/set-spotenant).
9999

100100
## Step 3 (Recommended) Use the Microsoft Defender portal to create an alert policy for detected files
101101

@@ -169,7 +169,7 @@ For detailed syntax and parameter information, see [New-ActivityAlert](/powershe
169169
Get-SPOTenant | Format-List DisallowInfectedFileDownload
170170
```
171171

172-
For detailed syntax and parameter information, see [Get-SPOTenant](/powershell/module/sharepoint-online/Set-SPOTenant).
172+
For detailed syntax and parameter information, see [Get-SPOTenant](/powershell/module/microsoft.online.sharepoint.powershell/get-spotenant).
173173

174174
- To verify you successfully configured an alert policy for detected files, use either of the following methods:
175175
- In the Microsoft Defender portal at <https://security.microsoft.com/alertpolicies>, select the alert policy, and verify the settings.

defender-xdr/advanced-hunting-fileprofile-function.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: FileProfile() function in advanced hunting for Microsoft Defender XDR
3-
description: Learn how to use the FileProfile() to enrich information about files in your advanced hunting query results
3+
description: Learn how to use the FileProfile() to enrich information about files in your advanced hunting query results.
44
search.appverid: met150
55
ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 03/28/2025
24+
ms.date: 08/05/2025
2525
---
2626

2727
# FileProfile()
@@ -51,7 +51,7 @@ The `FileProfile()` function is an enrichment function in [advanced hunting](adv
5151
| `ThreatName` | `string` | Detection name for any malware or other threats found |
5252
| `Publisher` | `string` | Name of the organization that published the file |
5353
| `SoftwareName` | `string` | Name of the software product |
54-
| `ProfileAvailability` | `string` | Indicates the availability status of the profile data for the file: Available - profile was successfully queried and file data returned, Missing - profile was successfully queried but no file info was found, Error - error in querying the file info or maximum allotted time was exceeded before query could be completed, or an empty value - if file ID is invalid or the maximum number of files was reached |
54+
| `ProfileAvailability` | `string` | Indicates the availability status of the profile data for the file: Available - profile was successfully queried and file data returned, Missing - profile was successfully queried but no file info was found, Error - error in querying the file info or maximum allotted time was exceeded before query could be completed, or an empty value - if file ID is invalid or the maximum number of files was reached<br><br>If this column's value is Missing or is empty, the value of the `GlobalPrevalance` column would be null. |
5555

5656

5757

@@ -69,7 +69,7 @@ invoke FileProfile(x,y)
6969

7070

7171
> [!TIP]
72-
> Enrichment functions will show supplemental information only when they are available. Availability of information is varied and depends on a lot of factors. Make sure to consider this when using FileProfile() in your queries or in creating custom detections. For best results, we recommend using the FileProfile() function with SHA1.
72+
> Enrichment functions will show supplemental information only when they're available. Availability of information is varied and depends on numerous factors. Make sure to consider this when using FileProfile() in your queries or in creating custom detections. For best results, we recommend using the FileProfile() function with SHA1.
7373
7474
## Examples
7575

defender-xdr/advanced-hunting-limits.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: how-to
24-
ms.date: 07/28/2025
24+
ms.date: 08/04/2025
2525
---
2626

2727
# Use the advanced hunting query resource report

defender-xdr/advanced-hunting-query-results.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: how-to
21-
ms.date: 07/28/2025
21+
ms.date: 08/04/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal

defender-xdr/advanced-hunting-seenby-function.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
---
22
title: SeenBy() function in advanced hunting for Microsoft Defender XDR
3-
description: Learn how to use the SeenBy() function to look for which onboarded devices discovered a certain device
3+
description: Learn how to use the SeenBy() function to look for which onboarded devices discovered a certain device.
44
search.appverid: met150
55
ms.service: defender-xdr
66
ms.subservice: adv-hunting
77
f1.keywords:
88
- NOCSH
9-
ms.author: maccruz
10-
author: schmurky
9+
ms.author: pauloliveria
10+
author: poliveria
1111
ms.localizationpriority: medium
12-
manager: dansimp
12+
manager: orspodek
1313
audience: ITPro
1414
ms.collection:
1515
- m365-security
@@ -21,7 +21,7 @@ appliesto:
2121
- Microsoft Defender XDR
2222
- Microsoft Sentinel in the Microsoft Defender portal
2323
ms.topic: reference
24-
ms.date: 03/28/2025
24+
ms.date: 08/05/2025
2525
---
2626

2727
# SeenBy()
@@ -39,7 +39,7 @@ This function returns a table that has the following column:
3939
|------------|---------------|-------------|
4040
| `DeviceId` | `string` | Unique identifier for the device in the service |
4141

42-
Up to 1,000 results are returned.
42+
You can enter up to 1,000 devices in this function.
4343

4444
## Syntax
4545

@@ -65,4 +65,5 @@ DeviceInfo
6565
- [Learn the query language](advanced-hunting-query-language.md)
6666
- [Understand the schema](advanced-hunting-schema-tables.md)
6767
- [Get more query examples](advanced-hunting-shared-queries.md)
68+
6869
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)