You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-non-windows.md
+19-13Lines changed: 19 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- tier1
14
14
ms.topic: conceptual
15
15
ms.subservice: onboard
16
-
ms.date: 01/18/2024
16
+
ms.date: 06/25/2024
17
17
---
18
18
19
19
# Onboard non-Windows devices
@@ -41,22 +41,27 @@ You'll need to know the exact Linux distros and macOS versions that are compatib
41
41
42
42
## Onboarding non-Windows devices
43
43
44
-
You can choose to onboard non-Windows devices through Microsoft Defender for Endpoint or through a third-party solution.
44
+
You can choose to onboard non-Windows devices through Microsoft Defender for Endpoint or through a third-party (non-Microsoft) solution.
45
45
46
-
[!INCLUDE [Defender for Endpoint repackaging warning](../includes/repackaging-warning.md)]
46
+
- To onboard macOS devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md).
47
+
48
+
- To onboard Linux devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
49
+
50
+
- To onboard non-windows devices using a non-Microsoft solution:
47
51
48
-
You'll need to take the following steps:
52
+
1. In the navigation pane, select **Partners and APIs** > **Connected Applications**. Make sure the non-Microsoft solution is listed.
53
+
54
+
2. In the **Connected Applications** page, select the partner that supports your non-Windows devices.
55
+
56
+
3. Select **View** to open the partner's page. Follow the instructions provided on the page.
57
+
58
+
4. After creating an account or subscribing to the partner solution, you should get to a stage where a tenant admin (or Global Administrator) is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
49
59
50
-
1. Select your preferred method of onboarding:
51
-
- To onboard macOS devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md).
52
-
- To onboard Linux devices using Microsoft Defender for Endpoint, see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).
53
-
- To onboard non-windows devices using third party solution:
54
-
1. In the navigation pane, select **Partners and APIs > Connected Applications**. Make sure the third-party solution is listed.
55
-
2. In the **Connected Applications** page, select the partner that supports your non-Windows devices.
56
-
3. Select **View** to open the partner's page. Follow the instructions provided on the page.
57
-
4. After creating an account or subscribing to the partner solution, you should get to a stage where a tenant Global Admin in your organization is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it's aligned with the service that you require.
60
+
> [!IMPORTANT]
61
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
58
62
59
-
2. Run a detection test by following the instructions of the third-party solution.
63
+
64
+
[!INCLUDE [Defender for Endpoint repackaging warning](../includes/repackaging-warning.md)]
60
65
61
66
## Offboard non-Windows devices
62
67
@@ -72,5 +77,6 @@ You can also offboard non-Windows devices by disabling the third-party integrati
72
77
-[Onboard servers](configure-server-endpoints.md)
73
78
-[Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
74
79
-[Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
80
+
75
81
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
You can track configuration status at an organizational level and quickly take action in response to poor onboarding coverage, compliance issues, and poorly optimized attack surface mitigations through direct, deep links to device management pages on Microsoft Intune and <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
44
44
@@ -65,6 +65,9 @@ Before you can ensure your devices are configured properly, enroll them to Intun
65
65
66
66
By default, only users who have been assigned the Global Administrator or the Intune Service Administrator role on Microsoft Entra ID can manage and assign the device configuration profiles needed for onboarding devices and deploying the security baseline.
67
67
68
+
> [!IMPORTANT]
69
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
70
+
68
71
If you have been assigned other roles, ensure you have the necessary permissions:
69
72
70
73
- Full permissions to device configurations
@@ -79,13 +82,12 @@ If you have been assigned other roles, ensure you have the necessary permissions
79
82
> [!TIP]
80
83
> To learn more about assigning permissions on Intune, [read about creating custom roles](/intune/create-custom-role#to-create-a-custom-role).
81
84
82
-
## In this section
85
+
## More information
83
86
84
-
Topic|Description
85
-
:---|:---
86
-
[Get devices onboarded to Defender for Endpoint](configure-machines-onboarding.md)|Track onboarding status of Intune-managed devices and onboard more devices through Intune.
87
-
[Increase compliance to the Defender for Endpoint security baseline](configure-machines-security-baseline.md)|Track baseline compliance and noncompliance. Deploy the security baseline to more Intune-managed devices.
88
-
[Optimize ASR rule deployment and detections](configure-machines-asr.md)|Review rule deployment and tweak detections using impact analysis tools in <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.
87
+
|Article |Description
88
+
|:---|:---
89
+
|[Get devices onboarded to Defender for Endpoint](configure-machines-onboarding.md)|Track onboarding status of Intune-managed devices and onboard more devices through Intune. |
90
+
|[Increase compliance to the Defender for Endpoint security baseline](configure-machines-security-baseline.md)|Track baseline compliance and noncompliance. Deploy the security baseline to more Intune-managed devices.|
91
+
|[Optimize ASR rule deployment and detections](configure-machines-asr.md)|Review rule deployment and tweak detections using impact analysis tools in <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>.|
89
92
90
-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-onboardconfigure-belowfoldlink)
91
93
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/configure-vulnerability-email-notifications.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 02/02/2021
15
+
ms.date: 06/25/2024
16
16
---
17
17
18
18
# Configure vulnerability email notifications in Microsoft Defender for Endpoint
@@ -27,10 +27,10 @@ ms.date: 02/02/2021
27
27
28
28
Configure Microsoft Defender for Endpoint to send email notifications to specified recipients for new vulnerability events. This feature enables you to identify a group of individuals who will immediately be informed and can act on the notifications based on the event. The vulnerability information comes from [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management).
29
29
30
-
If you're using [Defender for Business](/defender-business/mdb-overview), you can set up vulnerability notifications for specific users (not roles or groups).
30
+
If you're using [Defender for Business](/defender-business/mdb-overview), you can set up vulnerability notifications for specific users only (not roles or groups).
31
31
32
32
> [!NOTE]
33
-
> - Only users with 'Manage security settings' permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. [Learn more about permission options](user-roles.md)
33
+
> - Only users with `Manage security settings` permissions can configure email notifications. If you've chosen to use basic permissions management, users with Security Administrator or Global Administrator roles can configure email notifications. [Learn more about permission options](user-roles.md)
34
34
> - Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
35
35
36
36
The notification rules allow you to set the vulnerability events that trigger notifications, and add or remove email notification recipients. New recipients get notified about vulnerabilities after they're added.
@@ -39,11 +39,14 @@ If you're using role-based access control (RBAC), recipients will only receive n
39
39
40
40
The email notification includes basic information about the vulnerability event. There are also links to filtered views in the Defender Vulnerability Management [Security recommendations](api/ti-indicator.md) and [Weaknesses](/defender-vulnerability-management/tvm-weaknesses) pages in the portal so you can further investigate. For example, you could get a list of all exposed devices or get additional details about the vulnerability.
41
41
42
+
> [!IMPORTANT]
43
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
44
+
42
45
## Create rules for alert notifications
43
46
44
47
Create a notification rule to send an email when there are certain exploit or vulnerability events, such as a new public exploit. For each rule, multiple event types can be selected.
45
48
46
-
1.Go to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with the Security administrator or Global administrator role assigned.
49
+
1.Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and using an account with the Security administrator or Global administrator role assigned.
47
50
48
51
2. In the navigation pane, go to **Settings**\>**Endpoints**\>**Email notifications**\>**Vulnerabilities**.
49
52
@@ -93,7 +96,9 @@ This section lists various issues that you may encounter when using email notifi
93
96
**Solution:** Make sure that the notifications aren't blocked by email filters:
94
97
95
98
1. Check that the Defender for Endpoint email notifications aren't sent to the Junk Email folder. Mark them as Not junk.
99
+
96
100
2. Check that your email security product isn't blocking the email notifications from Defender for Endpoint.
101
+
97
102
3. Check your email application rules that might be catching and moving your Defender for Endpoint email notifications.
98
103
99
104
## Related articles
@@ -102,4 +107,5 @@ This section lists various issues that you may encounter when using email notifi
Copy file name to clipboardExpand all lines: defender-endpoint/defender-endpoint-subscription-settings.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.author: siosulli
7
7
manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: overview
10
-
ms.date: 02/21/2024
10
+
ms.date: 06/25/2024
11
11
ms.service: defender-endpoint
12
12
ms.subservice: onboard
13
13
ms.localizationpriority: medium
@@ -47,9 +47,8 @@ You can also use a newly added license usage report to track status.
47
47
> -**Make sure to follow the procedures in this article to try mixed-license scenarios in your environment**. Assigning user licenses in the Microsoft 365 admin center ([https://admin.microsoft.com](https://admin.microsoft.com)) doesn't set your tenant to mixed mode.
48
48
> -**You should have active trial or paid licenses for both Defender for Endpoint Plan 1 and Plan 2**.
49
49
> - To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
50
-
> - Global Admin
51
-
> - Security Admin
52
-
> - License Admin + MDE Admin
50
+
> - Security Administrator
51
+
> - License Administrator and Defender for Endpoint Administrator
53
52
54
53
1. As an admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
55
54
@@ -104,11 +103,10 @@ For example, suppose that you want to use a tag called `VIP` for all the devices
104
103
105
104
> [!IMPORTANT]
106
105
> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
107
-
> - Global Admin
108
-
> - Security Admin
109
-
> - License Admin + MDE Admin
106
+
> - Security Administrator
107
+
> - License Administrator and Defender for Endpoint Administrator
110
108
111
-
1.As a Security Admin or Global Admin, go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
109
+
1.Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in as a Security Administrator.
112
110
113
111
2. Go to **Settings** > **Endpoints** > **Licenses**.
114
112
@@ -125,6 +123,9 @@ For example, suppose that you want to use a tag called `VIP` for all the devices
125
123
126
124
---
127
125
126
+
> [!IMPORTANT]
127
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
128
+
128
129
## Validate that a device is receiving only Defender for Endpoint Plan 1 capabilities
129
130
130
131
After you have assigned Defender for Endpoint Plan 1 capabilities to some or all devices, you can verify that an individual device is receiving those capabilities.
@@ -144,9 +145,8 @@ To reduce management overhead, there's no requirement for device-to-user mapping
144
145
145
146
> [!IMPORTANT]
146
147
> To access license information, you must have one of the following roles assigned in Microsoft Entra ID:
147
-
> - Security Admin
148
-
> - Global Admin
149
-
> - License Admin + MDE Admin
148
+
> - Security Administrator
149
+
> - License Administrator and Defender for Endpoint Administrator
150
150
151
151
1. Go to the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) and sign in.
0 commit comments