Skip to content

Commit fa9c383

Browse files
authored
Merge pull request #794 from MicrosoftDocs/deniseb-globaladmin
deniseb globaladmin
2 parents 5e31786 + 5e368f1 commit fa9c383

File tree

4 files changed

+52
-38
lines changed

4 files changed

+52
-38
lines changed

defender-endpoint/configure-endpoints-non-windows.md

Lines changed: 19 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier1
1414
ms.topic: conceptual
1515
ms.subservice: onboard
16-
ms.date: 01/18/2024
16+
ms.date: 06/25/2024
1717
---
1818

1919
# Onboard non-Windows devices
@@ -41,22 +41,27 @@ You'll need to know the exact Linux distros and macOS versions that are compatib
4141

4242
## Onboarding non-Windows devices
4343

44-
You can choose to onboard non-Windows devices through Microsoft Defender for Endpoint or through a third-party solution.
44+
You can choose to onboard non-Windows devices through Microsoft Defender for Endpoint or through a third-party (non-Microsoft) solution.
4545

46-
[!INCLUDE [Defender for Endpoint repackaging warning](../includes/repackaging-warning.md)]
46+
- To onboard macOS devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md).
47+
48+
- To onboard Linux devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
49+
50+
- To onboard non-windows devices using a non-Microsoft solution:
4751

48-
You'll need to take the following steps:
52+
1. In the navigation pane, select **Partners and APIs** > **Connected Applications**. Make sure the non-Microsoft solution is listed.
53+
54+
2. In the **Connected Applications** page, select the partner that supports your non-Windows devices.
55+
56+
3. Select **View** to open the partner's page. Follow the instructions provided on the page.
57+
58+
4. After creating an account or subscribing to the partner solution, you should get to a stage where a tenant admin (or Global Administrator) is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
4959

50-
1. Select your preferred method of onboarding:
51-
- To onboard macOS devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md).
52-
- To onboard Linux devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
53-
- To onboard non-windows devices using third party solution:
54-
1. In the navigation pane, select **Partners and APIs > Connected Applications**. Make sure the third-party solution is listed.
55-
2. In the **Connected Applications** page, select the partner that supports your non-Windows devices.
56-
3. Select **View** to open the partner's page. Follow the instructions provided on the page.
57-
4. After creating an account or subscribing to the partner solution, you should get to a stage where a tenant Global Admin in your organization is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
60+
> [!IMPORTANT]
61+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
5862
59-
2. Run a detection test by following the instructions of the third-party solution.
63+
64+
[!INCLUDE [Defender for Endpoint repackaging warning](../includes/repackaging-warning.md)]
6065

6166
## Offboard non-Windows devices
6267

@@ -72,5 +77,6 @@ You can also offboard non-Windows devices by disabling the third-party integrati
7277
- [Onboard servers](configure-server-endpoints.md)
7378
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
7479
- [Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
80+
7581
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
7682

defender-endpoint/configure-machines.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: admindeeplinkDEFENDER
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 04/04/2024
17+
ms.date: 06/25/2024
1818
---
1919

2020
# Ensure your devices are configured properly
@@ -34,11 +34,11 @@ With properly configured devices, you can boost overall resilience against threa
3434
- Meet or exceed the Defender for Endpoint security baseline configuration
3535
- Have strategic attack surface mitigations in place
3636

37-
Click **Configuration management** from the navigation menu to open the Device configuration management page.
37+
In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Configuration management** > **Dashboard**.
3838

3939
:::image type="content" source="media/secconmgmt-main.png" alt-text="The Security configuration management page" lightbox="media/secconmgmt-main.png":::
4040

41-
*Device configuration management page*
41+
*The device configuration management page*
4242

4343
You can track configuration status at an organizational level and quickly take action in response to poor onboarding coverage, compliance issues, and poorly optimized attack surface mitigations through direct, deep links to device management pages on Microsoft Intune and <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
4444

@@ -65,6 +65,9 @@ Before you can ensure your devices are configured properly, enroll them to Intun
6565

6666
By default, only users who have been assigned the Global Administrator or the Intune Service Administrator role on Microsoft Entra ID can manage and assign the device configuration profiles needed for onboarding devices and deploying the security baseline.
6767

68+
> [!IMPORTANT]
69+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
70+
6871
If you have been assigned other roles, ensure you have the necessary permissions:
6972

7073
- Full permissions to device configurations
@@ -79,13 +82,12 @@ If you have been assigned other roles, ensure you have the necessary permissions
7982
> [!TIP]
8083
> To learn more about assigning permissions on Intune, [read about creating custom roles](/intune/create-custom-role#to-create-a-custom-role).
8184
82-
## In this section
85+
## More information
8386

84-
Topic|Description
85-
:---|:---
86-
[Get devices onboarded to Defender for Endpoint](configure-machines-onboarding.md)|Track onboarding status of Intune-managed devices and onboard more devices through Intune.
87-
[Increase compliance to the Defender for Endpoint security baseline](configure-machines-security-baseline.md)|Track baseline compliance and noncompliance. Deploy the security baseline to more Intune-managed devices.
88-
[Optimize ASR rule deployment and detections](configure-machines-asr.md)|Review rule deployment and tweak detections using impact analysis tools in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>.
87+
|Article |Description
88+
|:---|:---
89+
|[Get devices onboarded to Defender for Endpoint](configure-machines-onboarding.md)|Track onboarding status of Intune-managed devices and onboard more devices through Intune. |
90+
|[Increase compliance to the Defender for Endpoint security baseline](configure-machines-security-baseline.md)|Track baseline compliance and noncompliance. Deploy the security baseline to more Intune-managed devices. |
91+
| [Optimize ASR rule deployment and detections](configure-machines-asr.md)|Review rule deployment and tweak detections using impact analysis tools in <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. |
8992

90-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
9193
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/configure-vulnerability-email-notifications.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 02/02/2021
15+
ms.date: 06/25/2024
1616
---
1717

1818
# Configure vulnerability email notifications in Microsoft Defender for Endpoint
@@ -27,10 +27,10 @@ ms.date: 02/02/2021
2727
2828
Configure Microsoft Defender for Endpoint to send email notifications to specified recipients for new vulnerability events. This feature enables you to identify a group of individuals who will immediately be informed and can act on the notifications based on the event. The vulnerability information comes from [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management).
2929

30-
If you're using [Defender for Business](/defender-business/mdb-overview), you can set up vulnerability notifications for specific users (not roles or groups).
30+
If you're using [Defender for Business](/defender-business/mdb-overview), you can set up vulnerability notifications for specific users only (not roles or groups).
3131

3232
> [!NOTE]
33-
> - Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. [Learn more about permission options](user-roles.md)
33+
> - Only users with `Manage security settings` permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. [Learn more about permission options](user-roles.md)
3434
> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
3535
3636
The notification rules allow you to set the vulnerability events that trigger notifications, and add or remove email notification recipients. New recipients get notified about vulnerabilities after they're added.
@@ -39,11 +39,14 @@ If you're using role-based access control (RBAC), recipients will only receive n
3939

4040
The email notification includes basic information about the vulnerability event. There are also links to filtered views in the Defender Vulnerability Management [Security recommendations](api/ti-indicator.md) and [Weaknesses](/defender-vulnerability-management/tvm-weaknesses) pages in the portal so you can further investigate. For example, you could get a list of all exposed devices or get additional details about the vulnerability.
4141

42+
> [!IMPORTANT]
43+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
44+
4245
## Create rules for alert notifications
4346

4447
Create a notification rule to send an email when there are certain exploit or vulnerability events, such as a new public exploit. For each rule, multiple event types can be selected.
4548

46-
1. Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
49+
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and using an account with the Security administrator or Global administrator role assigned.
4750

4851
2. In the navigation pane, go to **Settings** \> **Endpoints** \> **Email notifications** \> **Vulnerabilities**.
4952

@@ -93,7 +96,9 @@ This section lists various issues that you may encounter when using email notifi
9396
**Solution:** Make sure that the notifications aren't blocked by email filters:
9497

9598
1. Check that the Defender for Endpoint email notifications aren't sent to the Junk Email folder. Mark them as Not junk.
99+
96100
2. Check that your email security product isn't blocking the email notifications from Defender for Endpoint.
101+
97102
3. Check your email application rules that might be catching and moving your Defender for Endpoint email notifications.
98103

99104
## Related articles
@@ -102,4 +107,5 @@ This section lists various issues that you may encounter when using email notifi
102107
- [Security recommendations](api/ti-indicator.md)
103108
- [Weaknesses](/defender-vulnerability-management/tvm-weaknesses)
104109
- [Event timeline](/defender-vulnerability-management/threat-and-vuln-mgt-event-timeline)
110+
105111
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/defender-endpoint-subscription-settings.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: siosulli
77
manager: deniseb
88
audience: ITPro
99
ms.topic: overview
10-
ms.date: 02/21/2024
10+
ms.date: 06/25/2024
1111
ms.service: defender-endpoint
1212
ms.subservice: onboard
1313
ms.localizationpriority: medium
@@ -47,9 +47,8 @@ You can also use a newly added license usage report to track status.
4747
> - **Make sure to follow the procedures in this article to try mixed-license scenarios in your environment**. Assigning user licenses in the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) doesn't set your tenant to mixed mode.
4848
> - **You should have active trial or paid licenses for both Defender for Endpoint Plan 1 and Plan 2**.
4949
> - To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
50-
> - Global Admin
51-
> - Security Admin
52-
> - License Admin + MDE Admin
50+
> - Security Administrator
51+
> - License Administrator and Defender for Endpoint Administrator
5352
5453
1. As an admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
5554

@@ -104,11 +103,10 @@ For example, suppose that you want to use a tag called `VIP` for all the devices
104103

105104
> [!IMPORTANT]
106105
> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
107-
> - Global Admin
108-
> - Security Admin
109-
> - License Admin + MDE Admin
106+
> - Security Administrator
107+
> - License Administrator and Defender for Endpoint Administrator
110108
111-
1. As a Security Admin or Global Admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
109+
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in as a Security Administrator.
112110

113111
2. Go to **Settings** > **Endpoints** > **Licenses**.
114112

@@ -125,6 +123,9 @@ For example, suppose that you want to use a tag called `VIP` for all the devices
125123

126124
---
127125

126+
> [!IMPORTANT]
127+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
128+
128129
## Validate that a device is receiving only Defender for Endpoint Plan 1 capabilities
129130

130131
After you have assigned Defender for Endpoint Plan 1 capabilities to some or all devices, you can verify that an individual device is receiving those capabilities.
@@ -144,9 +145,8 @@ To reduce management overhead, there's no requirement for device-to-user mapping
144145

145146
> [!IMPORTANT]
146147
> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
147-
> - Security Admin
148-
> - Global Admin
149-
> - License Admin + MDE Admin
148+
> - Security Administrator
149+
> - License Administrator and Defender for Endpoint Administrator
150150
151151
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
152152

0 commit comments

Comments
 (0)