Skip to content

Commit fbcd93d

Browse files
authored
Merge pull request #1026 from MicrosoftDocs/deniseb-fix
MDE fix - endpoint.microsoft.com -> intune.microsoft.com
2 parents 8204697 + 1c37077 commit fbcd93d

19 files changed

+48
-49
lines changed

defender-endpoint/android-configure-mam.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-android
1515
ms.topic: conceptual
1616
ms.subservice: android
17-
ms.date: 01/13/2023
17+
ms.date: 07/25/2024
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on Android risk signals using App Protection Policies (MAM)
@@ -138,7 +138,7 @@ End users also need to take steps to install Microsoft Defender for Endpoint on
138138

139139
## Configure Web protection
140140

141-
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://endpoint.microsoft.com).
141+
Defender for Endpoint on Android allows IT Administrators to configure web protection. Web protection is available within the [Microsoft Intune admin center](https://intune.microsoft.com).
142142

143143
Web protection helps to secure devices against web threats and protect users from phishing attacks. Note that anti-phishing and custom indicators (URL and IP addresses) are supported as part of web protection. Web content filtering is currently not supported on mobile platforms.
144144

defender-endpoint/android-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: partner-contribution
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 05/22/2024
18+
ms.date: 07/25/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune
@@ -293,7 +293,7 @@ Android low touch onboarding is disabled by default. Admins can enable it throug
293293

294294
### Set up Microsoft Defender in Personal Profile
295295

296-
Admins can go to the [Microsoft Endpoint Management admin center](https://endpoint.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
296+
Admins can go to the [Microsoft Endpoint Management admin center](https://intune.microsoft.com) to set up and configure Microsoft Defender support in personal profiles by following these steps:
297297

298298
1. Go to **Apps> App configuration policies** and click on **Add**. Select **Managed Devices**.
299299

defender-endpoint/attack-surface-reduction-rules-deployment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
- highpri
1818
- tier1
1919
- mde-asr
20-
ms.date: 07/13/2023
20+
ms.date: 07/25/2024
2121
search.appverid: met150
2222
---
2323

@@ -199,7 +199,7 @@ Some rules don't work well if unsigned, internally developed application and scr
199199

200200
### Management sites
201201

202-
[Microsoft Intune admin center](https://endpoint.microsoft.com/#home)
202+
[Microsoft Intune admin center](https://intune.microsoft.com/#home)
203203

204204
[Attack surface reduction](https://security.microsoft.com/asr?viewid=detections)
205205

defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: siosulli
88
ms.reviewer: marcmcc
99
manager: deniseb
1010
ms.custom: nextgen
11-
ms.date: 02/16/2024
11+
ms.date: 07/25/2024
1212
ms.subservice: ngp
1313
ms.topic: conceptual
1414
ms.collection:
@@ -69,7 +69,7 @@ Microsoft Defender Antivirus uses multiple detection and prevention technologies
6969

7070
## Turn on block at first sight with Microsoft Intune
7171

72-
1. In the Microsoft Intune admin center (<https://endpoint.microsoft.com>), go to **Endpoint security** \> **Antivirus**.
72+
1. In the Microsoft Intune admin center (<https://intune.microsoft.com>), go to **Endpoint security** \> **Antivirus**.
7373

7474
2. Select an existing policy, or create a new policy using the **Microsoft Defender Antivirus** profile type. In our example, we selected **Windows 10, Windows 11, or Windows Server** for the platform.
7575

@@ -128,7 +128,7 @@ You can confirm that block at first sight is enabled on individual client device
128128
129129
### Turn off block at first sight with Microsoft Intune
130130

131-
1. Go to the Microsoft Intune admin center (<https://endpoint.microsoft.com>) and sign in.
131+
1. Go to the Microsoft Intune admin center (<https://intune.microsoft.com>) and sign in.
132132

133133
2. Go to **Endpoint security** \> **Antivirus**, and then select your Microsoft Defender Antivirus policy.
134134

defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.reviewer: yongrhee
1010
manager: deniseb
1111
ms.subservice: ngp
1212
ms.topic: conceptual
13-
ms.date: 02/18/2024
13+
ms.date: 07/25/2024
1414
ms.collection:
1515
- m365-security
1616
- tier2
@@ -58,7 +58,7 @@ To specify the cloud block timeout period with Microsoft Defender for Endpoint S
5858

5959
You can specify the cloud block timeout period with an [endpoint security policy in Microsoft Intune](/mem/intune/protect/endpoint-security-policy).
6060

61-
1. Go to the Intune admin center ([https://endpoint.microsoft.com/](https://endpoint.microsoft.com/)) and sign in.
61+
1. Go to the Intune admin center ([https://intune.microsoft.com/](https://intune.microsoft.com/)) and sign in.
6262

6363
2. Select **Endpoint security**, and then under **Manage**, choose **Antivirus**.
6464

defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: siosulli
88
ms.author: siosulli
99
ms.topic: conceptual
1010
ms.custom: nextgen
11-
ms.date: 07/13/2023
11+
ms.date: 07/25/2024
1212
ms.reviewer:
1313
manager: deniseb
1414
ms.collection:
@@ -92,7 +92,7 @@ By default, lists that have been configured in local group policy and the Window
9292
9393
### Use Microsoft Intune to disable local list merging
9494

95-
1. In the [Microsoft Intune admin center](https://endpoint.microsoft.com), select **Endpoint security** > **Antivirus**.
95+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), select **Endpoint security** > **Antivirus**.
9696

9797
2. Choose **Create Policy**, or modify an existing Microsoft Defender Antivirus policy.
9898

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 05/15/2024
7+
ms.date: 07/25/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -147,7 +147,7 @@ In the **Add Row** pane, specify the following settings:
147147

148148
In Intune, device control groups appear as reusable settings.
149149

150-
1. Go to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and sign in.
150+
1. Go to the [Microsoft Intune admin center](https://intune.microsoft.com) and sign in.
151151

152152
2. Go to **Endpoint Security** > **Attack Surface Reduction**.
153153

defender-endpoint/enable-controlled-folders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier3
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 07/17/2024
18+
ms.date: 07/25/2024
1919
---
2020

2121
# Enable controlled folder access
@@ -69,7 +69,7 @@ For more information about disabling local list merging, see [Prevent or allow u
6969
7070
## Microsoft Intune
7171

72-
1. Sign in to the [Microsoft Intune admin center](https://endpoint.microsoft.com) and open **Endpoint Security**.
72+
1. Sign in to the [Microsoft Intune admin center](https://intune.microsoft.com) and open **Endpoint Security**.
7373

7474
2. Go to **Attack Surface Reduction** > **Policy**.
7575

defender-endpoint/enable-network-protection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 04/03/2024
6+
ms.date: 07/25/2024
77
ms.topic: conceptual
88
author: denisebmsft
99
ms.author: deniseb
@@ -99,7 +99,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/
9999
100100
#### Microsoft Defender for Endpoint Baseline method
101101
102-
1. Sign into the [Microsoft Intune admin center](https://endpoint.microsoft.com).
102+
1. Sign into the [Microsoft Intune admin center](https://intune.microsoft.com).
103103
104104
2. Go to **Endpoint security** > **Security baselines** > **Microsoft Defender for Endpoint Baseline**.
105105
@@ -113,7 +113,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/
113113
114114
#### Antivirus policy method
115115
116-
1. Sign into the [Microsoft Intune admin center](https://endpoint.microsoft.com).
116+
1. Sign into the [Microsoft Intune admin center](https://intune.microsoft.com).
117117
118118
2. Go to **Endpoint security** > **Antivirus**.
119119
@@ -133,7 +133,7 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/
133133
134134
#### Configuration profile method
135135
136-
1. Sign into the Microsoft Intune admin center (https://endpoint.microsoft.com).
136+
1. Sign into the Microsoft Intune admin center (https://intune.microsoft.com).
137137
138138
2. Go to **Devices** > **Configuration profiles** > **Create profile**.
139139

defender-endpoint/mac-device-control-intune.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 04/30/2024
17+
ms.date: 07/25/2024
1818
---
1919

2020
# Deploy and manage Device Control using Intune
@@ -48,7 +48,7 @@ Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file w
4848
4949
### Deploy the mobileconfig file using Intune
5050

51-
You can deploy the mobileconfig file through [**https://endpoint.microsoft.com/**](https://endpoint.microsoft.com/) > **Devices** > **macOS**:
51+
You can deploy the mobileconfig file through [**https://intune.microsoft.com/**](https://intune.microsoft.com/) > **Devices** > **macOS**:
5252

5353
- select 'Create profile'
5454
- select 'Templates' and 'Custom'

0 commit comments

Comments
 (0)