Skip to content

Commit 378164c

Browse files
authored
Merge pull request #7806 from MicrosoftDocs/main
Publish 06/13/2022, 10:30 AM
2 parents 5e4498a + 5f4e98c commit 378164c

4 files changed

Lines changed: 29 additions & 18 deletions

File tree

memdocs/intune/protect/antivirus-microsoft-defender-settings-windows.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -30,16 +30,16 @@ ms.reviewer: laarrizz
3030

3131
# Settings for Microsoft Defender Antivirus policy in Microsoft Intune for Windows devices
3232

33-
> [!NOTE]
34-
> This article details the settings in the Microsoft Defender Antivirus and Microsoft Defender Antivirus Exclusions profiles for the *Windows 10 and later* platform for endpoint security Antivirus policy. Beginning on April 5, 2022, the *Windows 10 and later* platform was replaced by the *Windows 10, Windows 11, and Windows Server* platform. Although you can no longer create new instances of the original profile, you can continue to edit and use your existing profiles. The settings details in this article apply to those deprecated profiles.
35-
3633
View details about the [endpoint security](../protect/endpoint-security-policy.md) antivirus policy settings you can configure for the Microsoft Defender Antivirus profile for Windows 10 and later in Microsoft Intune.
3734

38-
These settings are available in the following profiles:
39-
40-
- Microsoft Defender Antivirus
35+
> [!NOTE]
36+
> This article details the settings you can find in Microsoft Defender Antivirus and Microsoft Defender Antivirus Exclusions profiles created before April 5, 2022, for the *Windows 10 and later* platform for endpoint security Antivirus policy. On April 5, 2022, the *Windows 10 and later* platform was replaced by the *Windows 10, Windows 11, and Windows Server* platform. Profiles created after that date use a new settings format as found in the Settings Catalog. With this change you can no longer create new versions of the old profile and they are no longer being developed. Although you can no longer create new instances of the older profile, you can continue to edit and use instances of it that you previously created.
37+
>
38+
> For profiles that use the new settings format, Intune no longer maintains a list of each setting by name. Instead, the name of each setting, its configuration options, and its explanatory text you see in the Microsoft Endpoint Manager admin center are taken directly from the settings authoritative content. That content can provide more information about the use of the setting in its proper context. When viewing a settings information text, you can use its *Learn more* link to open that content.
39+
>
40+
> The following settings details for Windows profiles apply to those deprecated profiles.
4141
42-
**Settings**:
42+
## Cloud protection
4343

4444
- **Turn on cloud-delivered protection**
4545
CSP: [AllowCloudProtection](/windows/client-management/mdm/policy-csp-defender#defender-allowcloudprotection)
@@ -66,7 +66,7 @@ These settings are available in the following profiles:
6666

6767
## Microsoft Defender Antivirus Exclusions
6868

69-
The following setting is only available in the Microsoft Defender Antivirus profile:
69+
The following settings are available in the Microsoft Defender Antivirus profile:
7070

7171
- **Defender local admin merge**
7272
CSP: [Configuration/DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp)

memdocs/intune/protect/endpoint-security-asr-profile-settings.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Supported platforms and profiles:
6161
- **Turn on Application Guard**
6262
CSP: [AllowWindowsDefenderApplicationGuard](/windows/client-management/mdm/windowsdefenderapplicationguard-csp#allowwindowsdefenderapplicationguard)
6363

64-
- **Not configured** (*default*) - Microsoft Defender Application Guard is not configured for Microsoft Edge or isolated Windows environments.
64+
- **Not configured** (*default*) - Microsoft Defender Application Guard isn't configured for Microsoft Edge or isolated Windows environments.
6565
- **Enabled for Edge** - Application Guard opens unapproved sites in a Hyper-V virtualized browsing container.
6666
- **Enabled for isolated Windows environments** - Application Guard is turned on for any applications enabled for App Guard within Windows.
6767
- **Enabled for Edge AND isolated Windows environments** - Application Guard is configured for both scenarios.
@@ -147,7 +147,7 @@ Supported platforms and profiles:
147147

148148
To add thumbprints one at a time, select **Add**. You can use **Import** to specify a .CSV file that contains multiple thumbprint entries that are all added to the profile at the same time. When you use a .CSV file, each thumbprint must be separated by a comma. For example: `b4e72779a8a362c860c36a6461f31e3aa7e58c14,1b1d49f06d2a697a544a1059bd59a7b058cda924`
149149

150-
All entries that are listed in the profile are active. You do not need to select a checkbox for a thumbprint entry to make it active. Instead, use the checkboxes to help you manage the entries that have been added to the profile. For example, you can select the checkbox of one or more certificate thumbprint entries and then **Delete** those entries from the profile with a single action.
150+
All entries that are listed in the profile are active. You don't need to select a checkbox for a thumbprint entry to make it active. Instead, use the checkboxes to help you manage the entries that have been added to the profile. For example, you can select the checkbox of one or more certificate thumbprint entries and then **Delete** those entries from the profile with a single action.
151151

152152
- **Windows network isolation policy**
153153

@@ -212,7 +212,9 @@ Supported platforms and profiles:
212212
#### Attack Surface Reduction Rules
213213

214214
> [!NOTE]
215-
> This section details the settings in Attack Surface Reduction Rules profiles created before April 5, 2022. Profiles created after that date use a new settings format as found in the Settings Catalog. Although you can no longer create new instances of the original profile, you can continue to edit and use your existing profiles.
215+
> This section details the settings in Attack Surface Reduction Rules profiles created before April 5, 2022. Profiles created after that date use a new settings format as found in the Settings Catalog. With this change you can no longer create new versions of the old profile and they are no longer being developed. Although you can no longer create new instances of the older profile, you can continue to edit and use instances of it that you previously created.
216+
>
217+
> For profiles that use the new settings format, Intune no longer maintains a list of each setting by name. Instead, the name of each setting, its configuration options, and its explanatory text you see in the Microsoft Endpoint Manager admin center are taken directly from the settings authoritative content. That content can provide more information about the use of the setting in its proper context. When viewing a settings information text, you can use its *Learn more* link to open that content.
216218
217219
- **Block persistence through WMI event subscription**
218220
[Reduce attack surfaces with attack surface reduction rules](/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction)
@@ -221,7 +223,7 @@ Supported platforms and profiles:
221223

222224
This rule prevents malware from abusing WMI to attain persistence on a device. Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
223225

224-
- **Not configured** (default) – The setting returns to the Windows default, which is off and persistence is not blocked.
226+
- **Not configured** (default) – The setting returns to the Windows default, which is off and persistence isn't blocked.
225227
- **Block** – Persistence through WMI is blocked.
226228
- **Audit** – Evaluate how this rule affects your organization if it's enabled (set to Block).
227229
- **Disable** - Turn this rule off. Persistence is not blocked.
@@ -395,6 +397,9 @@ Supported platforms and profiles:
395397

396398
> [!NOTE]
397399
> This section details the settings found in Device control profiles created before May 23, 2022. Profiles created after that date use a new settings format as found in the Settings Catalog. Although you can no longer create new instances of the original profile, you can continue to edit and use your existing profiles.
400+
>
401+
> For profiles that use the new settings format, Intune no longer maintains a list of each setting by name. Instead, the name of each setting, its configuration options, and its explanatory text you see in the Microsoft Endpoint Manager admin center are taken directly from the settings authoritative content. That content can provide more information about the use of the setting in its proper context. When viewing a settings information text, you can use its *Learn more* link to open that content.
402+
398403

399404
- **Allow hardware device installation by device identifiers**
400405
- **Not configured** *(default)*
@@ -549,8 +554,10 @@ Supported platforms and profiles:
549554

550555
#### Exploit protection
551556

552-
> [!NOTE]
553-
> This section details the settings you can find in Exploit protection profiles created before April 5, 2022. Profiles created after that date use a new settings format as found in the Settings Catalog. Although you can no longer create new instances of the original profile, you can continue to edit and use your existing profiles.
557+
> [!NOTE]
558+
> This section details the settings you can find in Exploit protection profiles created before April 5, 2022. Profiles created after that date use a new settings format as found in the Settings Catalog. With this change you can no longer create new versions of the old profile and they are no longer being developed. Although you can no longer create new instances of the older profile, you can continue to edit and use instances of it that you previously created.
559+
>
560+
> For profiles that use the new settings format, Intune no longer maintains a list of each setting by name. Instead, the name of each setting, its configuration options, and its explanatory text you see in the Microsoft Endpoint Manager admin center are taken directly from the settings authoritative content. That content can provide more information about the use of the setting in its proper context. When viewing a settings information text, you can use its *Learn more* link to open that content.
554561
555562
- **Upload XML**
556563
CSP: [ExploitProtectionSettings](/windows/client-management/mdm/policy-csp-exploitguard#exploitguard-exploitprotectionsettings)

memdocs/intune/protect/endpoint-security-firewall-profile-settings.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,6 @@ ms.reviewer: aanavath
2929
---
3030
# Firewall policy settings for endpoint security in Intune
3131

32-
> [!NOTE]
33-
> Beginning on April 5, 2022, the *Windows 10 and later* platform and profiles for Windows devices were replaced by the *Windows 10, Windows 11, and Windows Server* platform and new instances of those same profiles. Although you can no longer create new instances of the original profile, you can continue to edit and use your existing profiles. The settings details for Windows profiles in this article apply to those deprecated profiles.
34-
3532
View the settings you can configure in profiles for *Firewall* policy in the endpoint security node of Intune as part of an [Endpoint security policy](../protect/endpoint-security-policy.md).
3633

3734
Applies to:
@@ -40,6 +37,13 @@ Applies to:
4037
- Windows 10
4138
- Windows 11
4239

40+
> [!NOTE]
41+
> Beginning on April 5, 2022, the Firewall profiles for the *Windows 10 and later* platform were replaced by the *Windows 10, Windows 11, and Windows Server* platform and new instances of those same profiles. Profiles created after that date use a new settings format as found in the Settings Catalog. With this change you can no longer create new versions of the old profile and they are no longer being developed. Although you can no longer create new instances of the older profile, you can continue to edit and use instances of it that you previously created.
42+
>
43+
> For profiles that use the new settings format, Intune no longer maintains a list of each setting by name. Instead, the name of each setting, its configuration options, and its explanatory text you see in the Microsoft Endpoint Manager admin center are taken directly from the settings authoritative content. That content can provide more information about the use of the setting in its proper context. When viewing a settings information text, you can use its *Learn more* link to open that content.
44+
>
45+
> The settings details for Windows profiles in this article apply to those deprecated profiles.
46+
4347
Supported platforms and profiles:
4448

4549
- **macOS**:

windows-365/enterprise/rdp-shortpath-public-networks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ To use RDP Shortpath for public networks with Windows 365, you must meet these r
3838

3939
- Session Host (Cloud PC)
4040
- UDP outbound to all public IP space (because, in most cases, it’s not possible to know the source IP address of the connecting PC).
41-
- STUN server IP ranges on UDP port 347.
41+
- STUN server IP ranges on UDP port 3478.
4242
- Client PC Network
4343
- UDP outbound:
4444
- To the public IP addresses assigned to NAT gateway or the Azure Firewall in an Azure Hosted Network Scenario.

0 commit comments

Comments
 (0)