Skip to content

Commit f8c39e6

Browse files
committed
updated TOC and whatsnew
1 parent 87a01a9 commit f8c39e6

File tree

3 files changed

+6
-0
lines changed

3 files changed

+6
-0
lines changed

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -522,6 +522,8 @@
522522
href: mto-dashboard.md
523523
- name: Manage tenants
524524
href: mto-tenants.md
525+
- name: Manage endpoint security policies
526+
href: mto-endpoint-security-policy.md
525527
- name: Reference
526528
items:
527529
- name: Manage roles and permissions

defender-xdr/mto-endpoint-security-policy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ appliesto:
1919

2020
# Endpoint security policies in multitenant management
2121

22+
[!INCLUDE [Prerelease](../includes/prerelease.md)]
23+
2224
> [!IMPORTANT]
2325
> The Endpoint security policies page is available only for [users with the security administrator role in Microsoft Defender XDR](/defender-endpoint/assign-portal-access). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and Microsoft Defender XDR.
2426

defender-xdr/whats-new.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ You can also get product updates and important notifications through the [messag
3131

3232
## April 2024
3333

34+
- (Preview) **Endpoint security policies** in multitenant management are now available. Security administrators can manage security settings on their tenants' devices through the Endpoint security policies page in multitenant management. For more information, see [Endpoint security policies in multitenant management](mto-endpoint-security-policy.md).
3435
- (Preview) The **unified security operations platform** in the Microsoft Defender portal is now available. This release brings together the full capabilities of Microsoft Sentinel, Microsoft Defender XDR, and Microsoft Copilot in Microsoft Defender. For more information, see the following resources:
3536

3637
- Blog announcement: [Unified security operations platform ready to revolutionize protection and efficiency](https://aka.ms/unified-soc-announcement)
@@ -46,6 +47,7 @@ You can also get product updates and important notifications through the [messag
4647
## February 2024
4748

4849
- (GA) **Dark mode** is now available in the Microsoft Defender portal. In the Defender portal, on the top right-hand side of the homepage, select **Dark mode**. Select **Light mode** to change the color mode back to the default.
50+
4951
- (GA) **Assigning severity to incidents**, **assigning an incident to a group**, and the ***go hunt*** option from the attack story graph are now generally available. Guides to learn how to [assign or change incident severity](manage-incidents.md#assign-or-change-incident-severity) and [assign an incident to a group](manage-incidents.md#assign-an-incident) are in the [Manage incidents](manage-incidents.md) page. Learn how you can use the *go hunt* option by exploring [attack story](investigate-incidents.md#attack-story).
5052

5153
- (Preview) **[Custom detection rules in Microsoft Graph security API](/graph/api/resources/security-api-overview?view=graph-rest-beta&preserve-view=true#custom-detections)** are now available. Create advanced hunting custom detection rules specific to your org to proactively monitor for threats and take action.

0 commit comments

Comments
 (0)