Skip to content

Commit bb24dd5

Browse files
authored
Merge branch 'main' into patch-2
2 parents aeee334 + 6d7ef0c commit bb24dd5

File tree

106 files changed

+1784
-218
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

106 files changed

+1784
-218
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,6 @@
2020
"redirect_url": "/defender-endpoint/evaluate-mdav-using-gp",
2121
"redirect_document_id": false
2222
},
23-
{
24-
"source_path": "defender-endpoint/linux-install-with-activator.md",
25-
"redirect_url": "/defender-endpoint/linux-custom-location-installation",
26-
"redirect_document_id": false
27-
},
2823
{
2924
"source_path": "defender-endpoint/preview.md",
3025
"redirect_url": "/defender-xdr/preview",
@@ -155,6 +150,11 @@
155150
"redirect_url": "/defender-endpoint/onboard-server",
156151
"redirect_document_id": false
157152
},
153+
{
154+
"source_path": "defender-endpoint/linux-install-with-activator.md",
155+
"redirect_url": "/defender-endpoint/linux-install-with-defender-deployment-tool",
156+
"redirect_document_id": false
157+
},
158158
{
159159
"source_path": "defender-endpoint/mde-linux-arm.md",
160160
"redirect_url": "/defender-endpoint/microsoft-defender-endpoint-linux",

defender-endpoint/TOC.yml

Lines changed: 16 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -135,6 +135,8 @@
135135
href: streamlined-device-connectivity-urls-gov.md
136136
- name: Onboard client devices
137137
items:
138+
- name: Onboard Windows devices using the Defender deployment tool
139+
href: defender-deployment-tool-windows.md
138140
- name: Onboard client devices running Windows or macOS
139141
href: onboard-client.md
140142
- name: Defender for Endpoint plug-in for WSL
@@ -174,6 +176,7 @@
174176
href: mde-linux-deployment-on-sap.md
175177
- name: Use custom detection rules to protect SAPXPG
176178
href: mde-sap-custom-detection-rules.md
179+
177180
- name: Defender for Endpoint on macOS
178181
items:
179182
- name: Deploy Defender for Endpoint on macOS
@@ -267,6 +270,8 @@
267270
items:
268271
- name: Enabling deployment to a custom location
269272
href: linux-custom-location-installation.md
273+
- name: Deployment tool based deployment
274+
href: linux-install-with-defender-deployment-tool.md
270275
- name: Installer script based deployment
271276
href: linux-installer-script.md
272277
- name: Ansible based deployment
@@ -625,6 +630,12 @@
625630
href: exclude-devices.md
626631
- name: Identifying transient devices
627632
href: transient-device-tagging.md
633+
- name: Collect custom device data
634+
items:
635+
- name: Overview
636+
href: custom-data-collection.md
637+
- name: Create custom data collection rules
638+
href: create-custom-data-collection-rules.md
628639
- name: Internet facing devices
629640
href: internet-facing-devices.md
630641
- name: Device timeline
@@ -1062,6 +1073,10 @@
10621073
href: respond-machine-alerts.md#contain-devices-from-the-network
10631074
- name: Contain user from the network
10641075
href: respond-machine-alerts.md#contain-user-from-the-network
1076+
- name: Automatically apply GPO hardening (predictive shielding)
1077+
href: respond-machine-alerts.md#gpo-hardening
1078+
- name: Automatically apply Safeboot hardening (predictive shielding)
1079+
href: respond-machine-alerts.md#safeboot-hardening
10651080
- name: Consult a threat expert
10661081
href: respond-machine-alerts.md#consult-a-threat-expert
10671082
- name: Check activity details in Action center
@@ -1098,10 +1113,7 @@
10981113
href: live-response-command-examples.md
10991114

11001115
- name: Use sensitivity labels to prioritize incident response
1101-
href: information-protection-investigation.md
1102-
1103-
- name: Advanced hunting
1104-
href: /defender-xdr/advanced-hunting-overview?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
1116+
href: information-protection-investigation.md
11051117

11061118
- name: Threat analytics
11071119
items:

defender-endpoint/android-whatsnew.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3535

3636
**What's New**
3737

38-
- Performance improvement and accessibility bug fixes
38+
- Native Root Detection for Microsoft Defender is now in preview. See the [Blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/native-root-detection-support-for-microsoft-defender-on-android/4461576) for more details.
3939

40-
#### November 2025
40+
- Performance improvement and bug fixes.
4141

4242
| Build| 1.0.8303.0101|
4343
| -------- | -------- |
@@ -51,6 +51,8 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
5151

5252
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
5353

54+
- Fixed the bug where feedback sending wasn’t disabled in Defender app despite 'Control Feedback Sending' key being disabled (set as 0) in Intune app configuration.
55+
5456
#### October 2025
5557

5658
| Build| 1.0.8217.0101 |
@@ -324,10 +326,11 @@ Notify your users and help desk (as applicable) that end users must accept the n
324326
1. Tap the toggle for **Allow access to manage all files**.
325327

326328
The device is now protected.
327-
329+
328330
> [!NOTE]
331+
>
329332
> This permission allows Microsoft Defender for Endpoint to access storage on user's device, which helps detect and remove malicious and unwanted apps. Microsoft Defender for Endpoint accesses/scans Android app package file (.apk) only. On devices with a Work Profile, Defender for Endpoint only scans work-related files.
330-
333+
331334
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
332335

333336
## See also

defender-endpoint/configure-endpoints-gp.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Onboard Windows Servers to Microsoft Defender for Endpoint via Group Policy
33
description: Use Group Policy to deploy the configuration package on Windows devices so that they're onboarded to the service.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier1
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
15-
ms.date: 10/13/2025
15+
ms.date: 11/17/2025
1616
ms.subservice: onboard
1717
search.appverid: met150
1818
appliesto:
@@ -23,6 +23,8 @@ appliesto:
2323

2424
# Onboard Windows devices using Group Policy
2525

26+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
27+
2628
## Prerequisites
2729

2830
- To use Group Policy (GP) updates to deploy the package, you must be on Windows Server 2008 R2 or later.

defender-endpoint/configure-endpoints-mdm.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Onboard Windows devices to Defender for Endpoint using Intune
33
description: Use Microsoft Intune to deploy the configuration package on devices so that they're onboarded to the Defender for Endpoint service.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -14,14 +14,15 @@ ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 10/31/2024
17+
ms.date: 11/17/2025
1818
appliesto:
1919
- Microsoft Defender for Endpoint Plan 1
2020
- Microsoft Defender for Endpoint Plan 2
2121

2222
---
2323
# Onboard Windows devices to Defender for Endpoint using Intune
2424

25+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
2526

2627
You can use mobile device management (MDM) solutions to configure Windows 10 devices. Defender for Endpoint supports MDMs by providing OMA-URIs to create policies to manage devices.
2728

defender-endpoint/configure-endpoints-sccm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,13 @@ ms.collection:
1212
- tier1
1313
ms.custom: admindeeplinkDEFENDER
1414
ms.topic: install-set-up-deploy
15-
ms.date: 10/27/2025
15+
ms.date: 11/17/2025
1616
ms.subservice: onboard
1717
search.appverid: met150
1818
---
1919

2020
# Onboard Windows devices using Configuration Manager
2121

22-
2322
You can use Configuration Manager to onboard endpoints to the Microsoft Defender for Endpoint service.
2423

2524
There are several options you can use to onboard devices using Configuration Manager:
@@ -32,6 +31,7 @@ There are several options you can use to onboard devices using Configuration Man
3231
3332
You can create a detection rule on a Configuration Manager application to continuously check if a device has been onboarded. An application is a different type of object than a package and program. If a device is not yet onboarded (due to pending OOBE completion or any other reason), Configuration Manager reattempts to onboard the device until the rule detects the status change. For more information, see [Configure Detection Methods in System Center 2012 R2 Configuration Manager](/previous-versions/system-center/system-center-2012-R2/gg682159\(v=technet.10\)#step-4-configure-detection-methods-to-indicate-the-presence-of-the-deployment-type).
3433

34+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
3535

3636
## Prerequisites
3737

defender-endpoint/configure-endpoints-script.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Onboard Windows Servers using a local script
33
description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: bagol
7-
author: batamig
6+
ms.author: painbar
7+
author: paulinbar
88
ms.reviewer: pahuijbr
99
ms.localizationpriority: medium
1010
manager: bagol
@@ -15,22 +15,23 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: install-set-up-deploy
1717
ms.subservice: onboard
18-
ms.date: 04/16/2025
18+
ms.date: 11/17/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
2222

2323
---
2424
# Onboard Windows devices using a local script
2525

26-
2726
You can also manually onboard individual devices to Defender for Endpoint. You might want to onboard some devices when you're testing the service before you commit to onboarding all devices in your network.
2827

2928
> [!IMPORTANT]
3029
> The script described in this article is recommended for manually onboarding devices to Defender for Endpoint. It should only be used on a limited number of devices. If you're deploying to a production environment, see [other deployment options](onboard-client.md), such as Intune, Group Policy, or Configuration Manager.
3130
3231
Check out [Identify Defender for Endpoint architecture and deployment method](deployment-strategy.md) to see the various paths in deploying Defender for Endpoint.
3332

33+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
34+
3435
## Onboard devices
3536

3637
1. Open the configuration package .zip file (*WindowsDefenderATPOnboardingPackage.zip*) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Onboard non-persistent virtual desktop infrastructure (VDI) devices
33
description: Deploy the configuration package on virtual desktop infrastructure (VDI) device so that they're onboarded to Microsoft Defender for Endpoint service.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: bagol
7-
author: batamig
6+
ms.author: painbar
7+
author: paulinbar
88
ms.reviewer: pahuijbr; yonghree
99
ms.localizationpriority: medium
1010
manager: bagol
@@ -14,18 +14,15 @@ ms.collection:
1414
- tier2
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: install-set-up-deploy
17-
ms.date: 03/11/2025
17+
ms.date: 11/17/2025
1818
ms.subservice: onboard
1919
appliesto:
2020
- Microsoft Defender for Endpoint Plan 1
2121
- Microsoft Defender for Endpoint Plan 2
2222

2323
---
24-
# Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR
25-
26-
27-
2824

25+
# Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR
2926

3027
Virtual desktop infrastructure (VDI) is an IT infrastructure concept that lets end users access enterprise virtual desktops instances from almost any device (such as your personal computer, smartphone, or tablet), eliminating the need for organization to provide users with physical machines. Using VDI devices reduces costs, as IT departments are no longer responsible for managing, repairing, and replacing physical endpoints. Authorized users can access the same company servers, files, apps, and services from any approved device through a secure desktop client or browser.
3128

@@ -34,6 +31,8 @@ Like any other system in an IT environment, VDI devices should have an endpoint
3431
> [!NOTE]
3532
> **Persistent VDI's** - Onboarding a persistent VDI machine into Microsoft Defender for Endpoint is handled the same way you would onboard a physical machine, such as a desktop or laptop. Group policy, Microsoft Configuration Manager, and other methods can be used to onboard a persistent machine. In the Microsoft Defender portal, (https://security.microsoft.com) under onboarding, select your preferred onboarding method, and follow the instructions for that type. For more information, see [Onboarding Windows client](onboard-client.md).
3633
34+
[!INCLUDE [Microsoft Defender deployment tool preview](./includes/defender-deployment-tool-preview.md)]
35+
3736
## Onboarding non-persistent virtual desktop infrastructure (VDI) devices
3837

3938
Defender for Endpoint supports non-persistent VDI session onboarding. There might be associated challenges when onboarding VDI instances. The following are typical challenges for this scenario:

0 commit comments

Comments
 (0)