You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Learn more:
35
35
|---------|------------|-------------|
36
36
|New predictive shielding response actions. |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
37
37
|[Custom data collection](custom-data-collection.md)|Preview |Custom data collection enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. |
38
-
|[Defender deployment tool](./defender-deployment-tool-windows.md)| Preview | The new Defender deployment tool is a lightweight, self-updating application that streamlines onboarding devices to the Defender endpoint security solution. The tool takes care of prerequisites, automates migrations from older solutions, and removes the need for complex onboarding scripts, separate downloads, and manual installations. It currently supports Windows and Linux devices. |
38
+
| Defender deployment tool<br/>- [for Windows devices](./defender-deployment-tool-windows.md)<br/>- [for Linux devices](./linux-install-with-defender-deployment-tool.md)| Preview | The new Defender deployment tool is a lightweight, self-updating application that streamlines onboarding devices to the Defender endpoint security solution. The tool takes care of prerequisites, automates migrations from older solutions, and removes the need for complex onboarding scripts, separate downloads, and manual installations. It currently supports Windows and Linux devices. |
39
39
|[Defender endpoint security solution for Windows 7 SP1 and Windows Server 2008 R2 SP1](./onboard-downlevel.md#use-the-defender-deployment-tool-to-deploy-defender-endpoint-security)| Preview | A Defender for endpoint security solution is now available for legacy Windows 7 SP1 and Windows Server 2008 R2 SP1 devices. The solution provides advanced protection capabilities and improved functionality for these devices compared to other solutions. The new solution is available using the new [Defender deployment tool](./defender-deployment-tool-windows.md). |
Copy file name to clipboardExpand all lines: defender-for-identity/configure-scoped-access.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ The following table lists the current limitations and supported scenarios for sc
56
56
57
57
> [!NOTE]
58
58
> - Custom roles apply only to new alerts and activities. Alerts and activities triggered before a custom role was created aren't retroactively tagged or filtered.
59
-
>
59
+
>- The Exposure Management section in the Defender Portal is not visible to users with an MDI scope assignment.
60
60
> - Microsoft Entra ID IP alerts aren't included within scoped MDI detections.
61
61
62
62
|Defender for Identity experience |Scoping by OU's|Scoping by AD domain|
Copy file name to clipboardExpand all lines: defender-for-identity/whats-new.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ For updates about versions and features released six months ago or earlier, see
31
31
32
32
### Automatic Windows event auditing configuration for Defender for Identity sensors v3.x
33
33
34
-
Defender for Identity now offers automatic Windows event-auditing configuration for Defender for Identity sensors v3.x. Automatic event auditing streamlines deployment by applying required Windows auditing settings to new sensors and fixing any misconfigurations on existing sensors. Admins can enable the option in the Defender portal or using Graph API.
34
+
Defender for Identity offers automatic Windows event-auditing configuration for sensors v3.x, streamlining deployment by applying required auditing settings to new sensors and fixing misconfigurations on existing ones; admins can enable it in the Defender portal or via the Graph API, and the feature, along with its related health alerts, will roll out gradually over the next few weeks.
35
35
36
36
### Identity Inventory enhancements: Accounts tab, manual account linking and unlinking, and expanded remediation actions
37
37
@@ -301,7 +301,7 @@ New [health issue](health-alerts.md) for cases where sensors running on VMware h
301
301
Identities listed in the [Identity inventory](identity-inventory.md) in Microsoft Defender portal now include a **“Privileged account”** tag for accounts managed by a **Privileged Identity Management (PIM)** service.
302
302
Privileged accounts are prime targets for attackers. Tagging them in the inventory helps you quickly identify high-risk or high-value accounts, prioritize investigation and mitigation efforts, and streamline incident response workflows.
303
303
304
-
Learn more about [Privileged Identity Management](/entra/id-governance/privileged-identity-management/pim-configure)
304
+
Learn more about [Privileged Identity Management.](/entra/id-governance/privileged-identity-management/pim-configure)
Copy file name to clipboardExpand all lines: defender-office-365/mdo-about.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,7 +133,7 @@ This quick-reference section summarizes the different capabilities between Defen
133
133
134
134
|Defender for Office 365 Plan 1|Defender for Office 365 Plan 2|
135
135
|---|---|
136
-
|Prevent and detect capabilities: <ul><li>[Anti-phishing policies with impersonation protection and phishing email thresholds](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>[Safe Attachments](safe-attachments-about.md), including [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li><li>[Safe Links](safe-links-about.md)</li><li>[Priority account protection](priority-accounts-turn-on-priority-account-protection.md)</li></ul> <br/> Investigate and respond capabilities: <ul><li>[Real-time detections](threat-explorer-real-time-detections-about.md)</li><li>[User tags, including Priority account](user-tags-about.md)</li><li>[The Email entity page](mdo-email-entity-page.md)</li></ul>|Everything in Defender for Office 365 Plan 1 <br/><br/> --- plus --- <br/><br/> Prevent and detect capabilities: <ul><li>[Attack simulation training](attack-simulation-training-simulations.md)</li></ul> <br/> Investigate and respond capabilities: <ul><li>[Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md)</li><li>[Threat Trackers](threat-trackers.md)</li><li>[AIR](air-about.md)</li><li>[Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview)</li><li>[Investigate incidents in Microsoft Defender XDR](/defender-xdr/investigate-incidents)</li><li>[Investigate alerts in Microsoft Defender XDR](/defender-xdr/investigate-alerts)</li></ul>|
136
+
|Prevent and detect capabilities: <ul><li>[Anti-phishing policies with impersonation protection and phishing email thresholds](anti-phishing-policies-about.md#exclusive-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>[Safe Attachments](safe-attachments-about.md), including [Safe Attachments for SharePoint, OneDrive, and Microsoft Teams](safe-attachments-for-spo-odfb-teams-about.md)</li><li>[Safe Links](safe-links-about.md)</li></ul> <br/> Investigate and respond capabilities: <ul><li>[Real-time detections](threat-explorer-real-time-detections-about.md)</li><li>[User tags, including Priority account](user-tags-about.md)</li><li>[The Email entity page](mdo-email-entity-page.md)</li></ul>|Everything in Defender for Office 365 Plan 1 <br/><br/> --- plus --- <br/><br/> Prevent and detect capabilities: <ul><li>[Attack simulation training](attack-simulation-training-simulations.md) </li><li>[Priority account protection](priority-accounts-turn-on-priority-account-protection.md)</li></ul> <br/> Investigate and respond capabilities: <ul><li>[Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md)</li><li>[Threat Trackers](threat-trackers.md)</li><li>[AIR](air-about.md)</li><li>[Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview)</li><li>[Investigate incidents in Microsoft Defender XDR](/defender-xdr/investigate-incidents)</li><li>[Investigate alerts in Microsoft Defender XDR](/defender-xdr/investigate-alerts)</li></ul>|
137
137
138
138
- For more information, see [Feature availability across Defender for Office 365 plans](/office365/servicedescriptions/office-365-advanced-threat-protection-service-description#feature-availability).
139
139
-[Safe Documents](safe-documents-in-e5-plus-security-about.md) is available to users with the Microsoft 365 A5 or Microsoft Defender Suite licenses (not included in Defender for Office 365 plans).
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-email-spoof-configure.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,7 +115,7 @@ To create allow entries for domains and email addresses, use either of the follo
115
115
116
116
#### Use the Microsoft Defender portal to create allow entries for domains and email addresses in the Tenant Allow/Block List
117
117
118
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
118
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
119
119
120
120
2. On the **Tenant Allow/Block Lists** page, verify that the **Domains & addresses** tab is selected.
121
121
@@ -172,7 +172,7 @@ Email from these blocked senders is marked as *high confidence phishing* and qua
172
172
173
173
#### Use the Microsoft Defender portal to create block entries for domains and email addresses in the Tenant Allow/Block List
174
174
175
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
175
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
176
176
177
177
2. On the **Tenant Allow/Block Lists** page, verify that the **Domains & addresses** tab is selected.
178
178
@@ -272,7 +272,7 @@ For detailed syntax and parameter information, see [Get-TenantAllowBlockListItem
272
272
273
273
In existing domain and email address entries, you can change the expiration date and note.
274
274
275
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
275
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
276
276
277
277
2. Verify the **Domains & addresses** tab is selected.
278
278
@@ -319,7 +319,7 @@ For detailed syntax and parameter information, see [Set-TenantAllowBlockListItem
319
319
320
320
### Use the Microsoft Defender portal to remove entries for domains and email addresses from the Tenant Allow/Block List
321
321
322
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
322
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
323
323
324
324
2. Verify the **Domains & addresses** tab is selected.
325
325
@@ -378,7 +378,7 @@ To create allow entries for *spoofed senders*, use any of the following methods:
378
378
379
379
In the Tenant Allow/Block List, you can create allow entries for spoofed senders before [spoof intelligence](anti-spoofing-spoof-intelligence.md) detects and blocks them.
380
380
381
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
381
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
382
382
383
383
2. On the **Tenant Allow/Block Lists** page, select the **Spoofed senders** tab.
384
384
@@ -516,7 +516,7 @@ For detailed syntax and parameter information, see [Get-TenantAllowBlockListSpoo
516
516
517
517
When you modify an allow or block entry for spoofed senders in the Tenant Allow/Block list, you can only change the entry from **Allow** to **Block**, or vice-versa.
518
518
519
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
519
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
520
520
521
521
2. Select the **Spoofed senders** tab.
522
522
@@ -542,7 +542,7 @@ For detailed syntax and parameter information, see [Set-TenantAllowBlockListSpoo
542
542
543
543
### Use the Microsoft Defender portal to remove entries for spoofed senders from the Tenant Allow/Block List
544
544
545
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
545
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
Copy file name to clipboardExpand all lines: defender-office-365/tenant-allow-block-list-files-configure.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,7 +104,7 @@ To create block entries for files, use either of the following methods:
104
104
105
105
### Use the Microsoft Defender portal to create block entries for files in the Tenant Allow/Block List
106
106
107
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
107
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
108
108
109
109
2. On the **Tenant Allow/Block Lists** page, select the **Files** tab.
110
110
@@ -207,7 +207,7 @@ For detailed syntax and parameter information, see [Get-TenantAllowBlockListItem
207
207
208
208
In existing file entries, you can change the expiration date and note.
209
209
210
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
210
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
211
211
212
212
2. Select the **Files** tab
213
213
@@ -254,7 +254,7 @@ For detailed syntax and parameter information, see [Set-TenantAllowBlockListItem
254
254
255
255
## Use the Microsoft Defender portal to remove entries for files from the Tenant Allow/Block List
256
256
257
-
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
257
+
1. In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Policies & rules**\>**Threat Policies**\>**Rules** section \>**Tenant Allow/Block Lists**. Or, to go directly to the **Tenant Allow/Block Lists** page, use <https://security.microsoft.com/tenantAllowBlockList>.
0 commit comments