You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -292,7 +292,7 @@ A device with a safeguard hold appears as a device with an error in the report.
292
292
293
293
Microsoft occasionally places safeguard holds to block installation of an update on a device when something detected on that device is known to result in a poor post-update experience. For example, software or drivers are common reasons to place a safeguard hold. The hold remains in place until the underlying issue is resolved, and the update is safe to install.
294
294
295
-
To learn more about active safeguard holds and expectations for their resolution, go to the Windows release health dashboard at [https://aka.ms/WindowsReleaseHealth](https://aka.ms/WindowsReleaseHealth).
295
+
To learn more about active safeguard holds and expectations for their resolution, go to the Windows release health dashboard at [https://aka.ms/WindowsReleaseHealth](/windows/release-health/).
296
296
297
297
#### Improvements for managing Windows Updates for pre-release builds<!-- 9231846 -->
298
298
We've improved the experience of using [Update rings for Windows 10 and later](../protect/windows-10-update-rings.md) to manage Windows updates for pre-release builds. The improvements include the following:
@@ -2408,4 +2408,4 @@ For previous months, see the [What's New archive](whats-new-archive.md).
Copy file name to clipboardExpand all lines: memdocs/intune/protect/encrypt-devices.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -184,7 +184,7 @@ All BitLocker recovery key accesses are audited. For more information on Audit L
184
184
185
185
When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager can display recovery key data for tenant attached devices.
186
186
187
-
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](/mem/configmgr/hotfix/2107/11121541).
187
+
- To support the display of recovery keys for tenant attached devices, your Configuration Manager sites must run version 2107 or later. For sites that run 2107, you must install an update rollup to support Azure AD joined devices:. See [KB11121541](../../configmgr/hotfix/2107/11121541.md).
188
188
189
189
- To view the recovery keys, your Intune account must have the Intune RBAC permissions to view BitLocker keys, and must be associated with an on-premises user that has the related permissions for Configuration Manager of Collection Role, with Read Permission > Read BitLocker Recovery Key Permission. For more information, see [Configure role-based administration for Configuration Manager](/configmgr/core/servers/deploy/configure/configure-role-based-administration).
190
190
@@ -224,4 +224,4 @@ For information about BitLocker deployments and requirements, see the [BitLocker
Copy file name to clipboardExpand all lines: memdocs/intune/protect/includes/security-config-mgt-prerequisites.md
-62Lines changed: 0 additions & 62 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,57 +7,37 @@ ms.author: brenduns
7
7
ms.date: 01/24/2022
8
8
ms.topic: include
9
9
---
10
-
11
-
12
-
13
10
## Prerequisites
14
-
15
11
Review the following sections for requirements for the Security Management for Microsoft Defender for Endpoint Scenario:
16
-
17
12
### Environment
18
-
19
13
When a device onboards to Microsoft Defender for Endpoint:
20
-
21
-
22
14
- The device is surveyed for an existing Endpoint Manager presence, which is a mobile device management (MDM) enrollment to Intune
23
15
- Devices without an Endpoint Manager presence enable the Security Management feature
24
16
- A trust is created with Azure Active Directory if one doesn't already exist
25
17
- Azure Active Directory trust is used to communicate with Endpoint Manager (Intune) and retrieve policies
26
18
- Policy retrieve from Endpoint Manager is enforced on the device by Microsoft Defender for Endpoint
27
-
28
19
### Active Directory requirements
29
-
30
20
When a device that is domain joined creates a trust with Azure Active Directory, this scenario is referred to as a *Hybrid Azure Active Directory Join* scenario. The Security Management for Microsoft Defender for Endpoint fully supports this scenario with the following requirements:
31
-
32
21
- Azure Active Directory Connect (AAD Connect) must be synchronized to the tenant that is used from Microsoft Defender for Endpoint
33
22
- Hybrid Azure Active Directory Join must be configured in your environment (either through Federation or AAD Connect Sync)
34
23
- AAD Connect Sync must include the device objects *in scope* for synchronization with Azure Active Directory (when needed for join)
35
24
- AAD Connect rules for sync must be modified for Server 2012 R2 (when support for Server 2012 R2 is needed)
36
25
- All devices must register in the Azure Active Directory of the tenant that hosts Microsoft Defender for Endpoint. Cross-tenant scenarios are not supported.
37
-
38
26
### Connectivity requirements
39
-
40
27
Devices must have access to the following endpoints:
41
-
42
28
-`enterpriseregistration.windows.net` - For Azure AD registration.
43
29
-`login.microsoftonline.com` - For Azure AD registration.
44
30
-`*.dm.microsoft.com` - The use of a wildcard supports the cloud-service endpoints that are used for enrollment, check-in, and reporting, and which can change as the service scales.
45
-
46
31
> [!Note]
47
32
> If your organization users Secure Socket Layer (SSL) inspection, the endpoints should be excluded from inspection.
48
-
49
33
### Supported platforms
50
-
51
34
Policies for Microsoft Defender for Endpoint security management are supported for the following device platforms:
52
-
53
35
- Windows 10 Professional/Enterprise (with [KB5006738](https://support.microsoft.com/topic/october-26-2021-kb5006738-os-builds-19041-1320-19042-1320-and-19043-1320-preview-ccbce6bf-ae00-4e66-9789-ce8e7ea35541))
54
36
- Windows Server 2012 R2 with [Microsoft Defender for Down-Level Devices](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
55
37
- Windows Server 2016 with [Microsoft Defender for Down-Level Devices](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
56
38
- Windows Server 2019 (with [KB5006744](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0))
57
39
- Windows Server 2022 (with [KB5006745](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c))
58
-
59
40
### Licensing and subscriptions
60
-
61
41
To use security management for Microsoft Defender for Endpoint, you need:
62
42
63
43
- A subscription that grants licenses for Microsoft Defender for Endpoint, like Microsoft 365, or a standalone license for only Microsoft Defender for Endpoint. A subscription that grants Microsoft Defender for Endpoint licenses also grants your tenant access to the Endpoint security node of the Microsoft Endpoint Manager admin center.
@@ -70,19 +50,12 @@ To use security management for Microsoft Defender for Endpoint, you need:
70
50
For current information about options, see [Minimum requirements for Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/minimum-requirements?view=o365-worldwide&preserve-view=true).
71
51
72
52
## Architecture
73
-
74
53
The following diagram is a conceptual representation of the Microsoft Defender for Endpoint security configuration management solution.
75
-
76
54
:::image type="content" alt-text="Conceptual representation of the Microsoft Defender for Endpoint security configuration management solution" source="../media/mde-security-integration/mde-architecture.png":::
77
-
78
55
1. Devices onboard to Microsoft Defender for Endpoint.
79
-
80
56
2. A trust is established between each device and Azure AD. When a device has an existing trust, that is used. When devices haven't registered, a new trust is created.
81
-
82
57
3. Devices use their Azure AD Identity to communicate with Endpoint Manager. This identity enables Microsoft Endpoint Manager to distribute policies that are targeted to the devices when they check in.
83
-
84
58
4. Defender for Endpoint reports the status of the policy back to Endpoint Manager.
85
-
86
59
## Which solution should I use?
87
60
88
61
Microsoft Endpoint Manager includes several methods and policy types to manage the configuration of Defender for Endpoint on devices.
@@ -115,37 +88,22 @@ The following table can help you understand which policies that can configure MD
115
88
## Configure your tenant to support Microsoft Defender for Endpoint Security Configuration Management
116
89
117
90
To support Microsoft Defender for Endpoint security configuration management through the Microsoft Endpoint Manager admin center, you must enable communication between them from within each console.
118
-
119
91
1. Sign in to [Microsoft 365 Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management:
120
-
121
92
:::image type="content" source="../media/mde-security-integration/enable-mde-settings-management-defender.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Microsoft 365 Defender portal.":::
122
-
123
93
2. Make sure the relevant users have permissions to manage endpoint security settings in Microsoft Endpoint Manager or grant those permissions by configuring a role in the Microsoft 365 Defender portal. Go to **Settings** > **Roles** > **Add item**:
124
-
125
94
:::image type="content" source="../media/mde-security-integration/add-role-in-mde.png" alt-text="Create a new role in the Defender portal.":::
126
-
127
95
> [!TIP]
128
96
> You can modify existing roles and add the necessary permissions versus creating additional roles in Microsoft Defender for Endpoint
129
-
130
97
3. When configuring the role, add users and be sure to select **Manage endpoint security settings in Microsoft Endpoint Manager**:
131
-
132
98
:::image type="content" source="../media/mde-security-integration/add-role.png" alt-text="Grant users permissions to manage settings.":::
133
-
134
99
4. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
135
-
136
100
5. Select **Endpoint security** > **Microsoft Defender for Endpoint**, and set **Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations (Preview)** to **On**.
137
-
138
101
:::image type="content" source="../media/mde-security-integration/enable-mde-settings-management-mem.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Microsoft Endpoint Manager admin center.":::
139
-
140
102
When you set this option to *On*, all devices in the platform scope in Microsoft Defender for Endpoint that aren't managed by Microsoft Endpoint Manager will qualify to onboard to Microsoft Defender for Endpoint.
141
-
142
103
## Onboard devices to Microsoft Defender for Endpoint
143
-
144
104
Microsoft Defender for Endpoint supports several options to onboard devices. For current guidance, see [Onboarding tools and methods for Windows devices](/microsoft-365/security/defender-endpoint/security-config-management) in the Defender for Endpoint documentation.
145
-
146
105
> [!IMPORTANT]
147
106
> After a device onboards with Microsoft Defender for Endpoint, it must and be tagged with **MDE-Management** before it can enroll with Security Management for Microsoft Defender for Endpoint. For more information on device tagging in MDE, see [*Create and manage device tags*](/microsoft-365/security/defender-endpoint/machine-tags).
148
-
149
107
Devices that you manage with Intune are not supported for this scenario.
150
108
151
109
## Co-existence with Microsoft Endpoint Configuration Manager
@@ -155,17 +113,11 @@ When using Configuration Manager, the best path for management of security polic
155
113
## Create Azure AD Groups
156
114
157
115
After devices onboard to Defender for Endpoint, you'll need to create device groups to support deployment of policy for Microsoft Defender for Endpoint.
158
-
159
116
To identify devices that have enrolled with Microsoft Defender for Endpoint but aren't managed by Intune or Configuration Manager:
160
-
161
117
1. Sign in to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
162
-
163
118
2. Go to **Devices** > **All devices**, and then select the column **Managed by** to sort the view of devices.
164
-
165
119
Devices that onboard to Microsoft Defender for Endpoint and have registered but aren't managed by Intune display **Microsoft Defender for Endpoint** in the *Managed by* column. These are the devices that can receive policy for security management for Microsoft Defender for Endpoint.
166
-
167
120
You'll also find two labels for devices that are using security management for Microsoft Defender for Endpoint:
168
-
169
121
-**MDEJoined** - Added to devices that are joined to the directory as part of this scenario.
170
122
-**MDEManaged** - Added to devices that are actively using the security management scenario. This tag is removed from the device if Defender for Endpoint stops managing the security configuration.
171
123
@@ -174,48 +126,35 @@ You can create groups for these devices [in Azure AD](/azure/active-directory/fu
174
126
## Deploy policy
175
127
176
128
After creating one or more Azure AD groups that contain devices managed by Microsoft Defender for Endpoint, you can create and deploy the following policies for Security Management for Microsoft Defender for Endpoint to those groups:
177
-
178
129
- Antivirus
179
130
- Firewall
180
131
- Firewall Rules
181
132
- Endpoint Detection and Response
182
-
183
133
> [!TIP]
184
134
> Avoid deploying multiple policies that manage the same setting to a device.
185
135
>
186
136
> Microsoft Endpoint Manager supports deploying multiple instances of each endpoint security policy type to the same device, with each policy instance being received by the device separately. Therefore, a device might receive separate configurations for the same setting from different policies, which results in a conflict. Some settings (like Antivirus Exclusions) will merge on the client and apply successfully.
187
-
188
137
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
189
-
190
138
2. Go to **Endpoint security** and then select the type of policy you want to configure, either Antivirus or Firewall, and then select **Create Policy**.
191
-
192
139
3. Enter the following properties or the policy type you selected:
193
-
194
140
- For Antivirus policy, select:
195
141
- Platform: **Windows 10, Windows 11, and Windows Server (Preview)**
- For Endpoint Detection and Response policy, select:
207
150
- Platform: **Windows 10, Windows 11, and Windows Server (Preview)**
208
151
- Profile: **Endpoint detection and response (Preview)**
209
-
210
152
>[!Note]
211
153
> These profiles apply to both devices communicating through Mobile Device Management (MDM) with Microsoft Intune as well as devices that are communicating using the Microsoft Defender for Endpoint client.
212
154
>
213
155
> Ensure you review your targeting and groups as necessary.
214
-
215
156
4. Select **Create**.
216
-
217
157
5. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
218
-
219
158
6. On the **Configuration settings** page, select the settings you want to manage with this profile. To learn more about a setting, expand its information dialog and select the *Learn more* link to view the CSP information for the setting in the on-line documentation.
220
159
221
160
When your done configuring settings, select **Next**.
@@ -229,7 +168,6 @@ After creating one or more Azure AD groups that contain devices managed by Micro
229
168
> - Assignment filters are not supported for Security Configuration Management profiles.
230
169
> - Only *Device Objects* are applicable for Microsoft Defender for Endpoint management. Targeting users is not supported.
231
170
> - Policies configured will apply to both Microsoft Intune and Microsoft Defender for Endpoint clients
232
-
233
171
8. Complete the policy creation process and then on the **Review + create** page, select **Create**. The new profile is displayed in the list when you select the policy type for the profile you created.
234
172
235
173
9. Wait for the policy to be assigned and view a success indication that policy was applied.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/mde-security-integration.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ When you select a policy, you'll see information about the device check-in statu
60
60
61
61
### Co-existence with Microsoft Endpoint Configuration Manager
62
62
63
-
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
63
+
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](../../configmgr/tenant-attach/endpoint-security-get-started.md). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
64
64
65
65
### Active Directory joined devices
66
66
@@ -90,4 +90,4 @@ Due to the limited scope of Server core installations, these are not supported b
90
90
91
91
## Next steps
92
92
93
-
[Monitor Defender for Endpoint](../protect/advanced-threat-protection-monitor.md)
93
+
[Monitor Defender for Endpoint](../protect/advanced-threat-protection-monitor.md)
Copy file name to clipboardExpand all lines: memdocs/intune/protect/security-baseline-settings-windows-365.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1166,7 +1166,7 @@ Audit settings configure the events that are generated for the conditions of the
1166
1166
1167
1167
-**Block drive redirection**
1168
1168
Baseline default: *Enabled*
1169
-
<!-- Not devined in UI. Possibly CSP [RemoteDesktopServices/DoNotAllowDriveRedirection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-remotedesktopservices#remotedesktopservices-donotallowdriveredirection) -->
1169
+
<!-- Not devined in UI. Possibly CSP [RemoteDesktopServices/DoNotAllowDriveRedirection](/windows/client-management/mdm/policy-csp-remotedesktopservices#remotedesktopservices-donotallowdriveredirection) -->
0 commit comments