Skip to content

Commit 8042cee

Browse files
committed
Merge branch 'master' into release-intune-2111
2 parents cdd6b30 + 17b8487 commit 8042cee

2 files changed

Lines changed: 26 additions & 10 deletions

File tree

memdocs/configmgr/core/servers/deploy/configure/troubleshoot-microsoft-connected-cache.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,17 @@ The DO cache server adds the following rewrite rules:
213213
- `Doinc_Outbound_SetHeader_X_CID_E77D08D0-5FEA-4315-8C95-10D359D59294`
214214
- `Doinc_Outbound_SetHeader_X_CCC_E77D08D0-5FEA-4315-8C95-10D359D59294`
215215

216+
### IIS custom headers
217+
218+
If requests with `X-Forwarded-For` headers are blocked on a proxy server, either allow the header on the proxy server or change the custom header name in IIS for each server farm.
219+
220+
To change the custom header name for each server farm:
221+
222+
1. Open IIS Manager.
223+
1. Select **Server Farms**.
224+
1. Select a server farm and the proxy icon.
225+
1. Under **Custom Headers**, change the value `X-Forwarded-For` to `X-Forwarded-For-<custom-name>`.
226+
216227
## Manage server resources
217228

218229
Disk space required for each DO cache server may vary, based on your organization's update requirements. 100 GB should be enough space to cache the following content:
@@ -227,4 +238,4 @@ If the IIS and ARR log files take up too much space on the server, there are sev
227238

228239
## See also
229240

230-
[Microsoft Connected Cache in Configuration Manager](../../../plan-design/hierarchy/microsoft-connected-cache.md)
241+
[Microsoft Connected Cache in Configuration Manager](../../../plan-design/hierarchy/microsoft-connected-cache.md)

memdocs/intune/protect/mde-security-integration.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/05/2021
10+
ms.date: 11/17/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -30,17 +30,18 @@ ms.reviewer: mattcall
3030

3131
# Manage Microsoft Defender for Endpoint on devices with Microsoft Endpoint Manager
3232

33-
***This feature is in public preview*** *and will roll out to tenants gradually over the next few weeks. You can confirm your tenant has received this capability when the relevant toggles show in both the Microsoft Endpoint Manager admin center and Microsoft Defender for Endpoint.*
33+
>[!Note]
34+
> ***This feature is in public preview*** *and will roll out to tenants gradually over the next few weeks. You can confirm your tenant has received this capability when the relevant toggles show in both the Microsoft Endpoint Manager admin center and Microsoft Defender for Endpoint.*
3435
35-
With Microsoft Defender for Endpoint (MDE), you can now deploy security configurations from Microsoft Endpoint Manager directly to your onboarded devices without requiring a full Microsoft Endpoint Manager device enrollment. This capability is known as *Security Management for Microsoft Defender for Endpoint*. With this capability, devices that aren’t managed by a Microsoft Endpoint Manager, either Microsoft Intune or Microsoft Endpoint Configuration Manager, can receive security configurations for Microsoft Defender directly from Endpoint Manager.
36+
With Microsoft Defender for Endpoint (MDE), you can now deploy security configurations from Microsoft Endpoint Manager directly to your onboarded devices without requiring a full Microsoft Endpoint Manager device enrollment. This capability is known as *Security Management for Microsoft Defender for Endpoint*. With this capability, devices that aren’t managed by a Microsoft Endpoint Manager service can receive security configurations for Microsoft Defender directly from Endpoint Manager.
3637

3738
When devices are managed through this capability:
3839

3940
- You use the Microsoft Endpoint Manager admin center to configure endpoint security policies for MDE and assign those policies to Azure AD groups
4041
- Devices get the policies based on their Azure Active Directory device object. A device that isn’t already present in Azure Active Directory is joined as part of this solution
4142
- When a device receives a policy, the Defender for Endpoint components on the device enforce the policy and report on the devices status. The device's status is available in the Microsoft Endpoint Manager admin center
4243

43-
This scenario extends the Microsoft Endpoint Manager Endpoint Security surface to devices that aren't capable of enrolling in Endpoint Manager. When a device is managed by Endpoint Manager (either through Intune or Configuration Manager) the device won't process policies for Security Management for Microsoft Defender for Endpoint. Instead, use Intune or Configuration Manager to deploy policy for Defender to your devices.
44+
This scenario extends the Microsoft Endpoint Manager Endpoint Security surface to devices that aren't capable of enrolling in Endpoint Manager. When a device is managed by Endpoint Manager (enrolled to Intune) the device won't process policies for Security Management for Microsoft Defender for Endpoint. Instead, use Intune to deploy policy for Defender to your devices.
4445

4546
:::image type="content" source="./media/mde-security-integration/endpoint-security-overview.png" alt-text="Conceptual diagram of the MDE-Attach solution." lightbox="./media/mde-security-integration/endpoint-security-overview.png":::
4647

@@ -52,8 +53,8 @@ Review the following sections for requirements for the Security Management for M
5253

5354
When a device onboards to Microsoft Defender for Endpoint and security management is enabled:
5455

55-
- The device is surveyed for an existing Endpoint Manager presence, either Configuration Manager or Intune
56-
- Devices without an Endpoint Manager presence enable the Security Management feature
56+
- The device is surveyed for an existing Endpoint Manager presence, which is a mobile device management (MDM) enrollment to Intune
57+
- Devices without an Endpoint Manager presence will enable the Security Management feature
5758
- A trust is created with Azure Active Directory if one doesn't already exist
5859
- Azure Active Directory trust is used to communicate with Endpoint Manager (Intune) and retrieve policies
5960
- Policy retrieve from Endpoint Manager is enforced on the device by Microsoft Defender for Endpoint
@@ -83,7 +84,7 @@ Policies for MDE security management are supported for the following device plat
8384
- Windows Server 2012 R2 with [Microsoft Defender for Down-Level Devices](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
8485
- Windows Server 2016 with [Microsoft Defender for Down-Level Devices](/microsoft-365/security/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
8586
- Windows Server 2019 (with [KB5006744](https://support.microsoft.com/topic/october-19-2021-kb5006744-os-build-17763-2268-preview-e043a8a3-901b-4190-bb6b-f5a4137411c0))
86-
- Windows Server 2022
87+
- Windows Server 2022 (with [KB5006745](https://support.microsoft.com/topic/october-26-2021-kb5006745-os-build-20348-320-preview-8ff9319a-19e7-40c7-bbd1-cd70fcca066c))
8788

8889
### Licensing and subscriptions
8990

@@ -145,6 +146,7 @@ To support MDE security configuration management through the Microsoft Endpoint
145146

146147
:::image type="content" source="./media/mde-security-integration/enable-mde-settings-management-defender.png" alt-text="Enable MDE settings management in the Defender console.":::
147148

149+
148150
2. Make sure the relevant users have permissions to manage endpoint security settings in Microsoft Endpoint Manager or grant those permissions by configuring a role in the Defender portal. Go to **Settings** > **Roles** > **Add item**:
149151

150152
:::image type="content" source="./media/mde-security-integration/add-role-in-mde.png" alt-text="Create a new role in the Defender portal.":::
@@ -168,7 +170,7 @@ To support MDE security configuration management through the Microsoft Endpoint
168170

169171
Microsoft Defender for Endpoint supports several options to onboard devices. For current guidance, see [Onboarding tools and methods for Windows devices](/microsoft-365/security/defender-endpoint/security-config-management?view=o365-worldwide&preserve-view=true) in the Defender for Endpoint documentation.
170172

171-
Devices that you manage with Intune or Configuration Manager are not supported for this scenario.
173+
Devices that you manage with Intune are not supported for this scenario.
172174

173175
## Create Azure AD Groups
174176

@@ -218,7 +220,7 @@ After creating one or more Azure AD groups that contain devices managed by MDE,
218220
- Profile: **Endpoint detection and response (Preview)**
219221

220222
>[!Note]
221-
> The profiles above apply to both devices communicating through Mobile Device Management (MDM) with MIcrosoft Intune as well as devices that are communicating using the Microsoft Defender for Endpoint client.
223+
> The profiles above apply to both devices communicating through Mobile Device Management (MDM) with Microsoft Intune as well as devices that are communicating using the Microsoft Defender for Endpoint client.
222224
> Ensure you are reviewing your targeting and groups as necessary.
223225
224226
4. Select **Create**.
@@ -259,6 +261,9 @@ When you select a policy, you'll see information about the device check-in statu
259261

260262
## Known limitations and considerations
261263

264+
### Co-existence with Microsoft Endpoint Configuration Manager
265+
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/memdocs/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
266+
262267
### Active Directory joined devices
263268

264269
Devices that are joined to Active Directory will use their **existing infrastructure** to complete Hybrid Azure Active Directory join. While the Defender for Endpoint component will start this process, the join action uses your Federation provider or Azure Active Directory Connect (AAD Connect) to complete the join. Review [Plan your hybrid Azure Active Directory join implementation](/azure/active-directory/devices/hybrid-azuread-join-plan) to learn more about configuring your environment.

0 commit comments

Comments
 (0)