You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Microsoft Intune includes many settings to help protect your devices. This article describes the settings in the device configuration *Endpoint protection* template. In addition to this profile and use of the settings catalog, you can use [endpoint security policies](../protect/endpoint-security-policy.md) to focus more directly on specific areas of device security.
33
-
32
+
Microsoft Intune includes many settings to help protect your devices. This article describes the settings in the device configuration *Endpoint protection* template. To manage device security, you can also use [endpoint security policies](../protect/endpoint-security-policy.md), which focus directly on subsets of device security.
34
33
To configure Microsoft Defender Antivirus, see [Windows device restrictions](../configuration/device-restrictions-windows-10.md#microsoft-defender-antivirus) or use [endpoint security Antivirus policy](endpoint-security-antivirus-policy.md).
35
34
36
35
## Before you begin
@@ -41,7 +40,7 @@ For more information about configuration service providers (CSPs), see [Configur
41
40
42
41
## Microsoft Defender Application Guard
43
42
44
-
While using Microsoft Edge, Microsoft Defender Application Guard protects your environment from sites that aren't trusted by your organization. When users visit sites that aren't listed in your isolated network boundary, the sites open in a Hyper-V virtual browsing session. Trusted sites are defined by a network boundary, which are configured in Device Configuration. For more information, see [Create a network boundary on Windows devices](../configuration/network-boundary-windows.md).
43
+
For Microsoft Edge, Microsoft Defender Application Guard protects your environment from sites that aren't trusted by your organization. With Application Guard, sites that aren't in your isolated network boundary open in a Hyper-V virtual browsing session. Trusted sites are defined by a network boundary, which are configured in Device Configuration. For more information, see [Create a network boundary on Windows devices](../configuration/network-boundary-windows.md).
45
44
46
45
Application Guard is only available for 64-bit Windows devices. Using this profile installs a Win32 component to activate Application Guard.
47
46
@@ -219,7 +218,7 @@ The following settings are each listed in this article a single time, but all ap
219
218
This option is ignored if *Stealth mode* is set to *Block*.
220
219
221
220
-**Not configured**
222
-
-**Block** - IPSec secured packets do not receive exemptions.
-**Allow** - Enable exemptions. The firewall's stealth mode MUST NOT prevent the host computer from responding to unsolicited network traffic that is secured by IPsec.
224
223
225
224
-**Shielded**
@@ -341,7 +340,8 @@ Custom Firewall rules support the following options:
341
340
-**Application(s)**
342
341
**Default**: All
343
342
344
-
Control connections for an app or program. Select one of the following options, and then complete the additional configuration:
343
+
Control connections for an app or program. Apps and programs can be specified either by *file path*, *package family name*, or *service name*:
344
+
345
345
-**Package family name** – Specify a package family name. To find the package family name, use the PowerShell command **Get-AppxPackage**.
@@ -351,7 +351,7 @@ Custom Firewall rules support the following options:
351
351
-**Windows service** – Specify the Windows service short name if it's a service and not an application that sends or receives traffic. To find the service short name, use the PowerShell command **Get-Service**.
-**All**– *No additional configuration is available*.
354
+
-**All**– *No configurations is required*
355
355
356
356
#### IP address settings
357
357
@@ -364,8 +364,8 @@ Specify the local and remote addresses to which this rule applies.
364
364
Select **Any address** or **Specified address**.
365
365
366
366
When you use *Specified address*, you add one or more addresses as a comma-separated list of local addresses that are covered by the rule. Valid tokens include:
367
-
- Use an asterisk "*" for *any* local address. If you use an asterisk, it must be the only token you use.
368
-
-To specify a subnet use either the subnet mask or network prefix notation. If neither a subnet mask nor a network prefix is specified, the subnet mask defaults to 255.255.255.255.
367
+
- Use an asterisk `*` for *any* local address. If you use an asterisk, it must be the only token you use.
368
+
-Specify a subnet by either the subnet mask or network prefix notation. If a subnet mask or a network prefix isn't specified, the subnet mask defaults to 255.255.255.255.
369
369
- A valid IPv6 address.
370
370
- An IPv4 address range in the format of "start address - end address" with no spaces included.
371
371
- An IPv6 address range in the format of "start address - end address" with no spaces included.
@@ -378,16 +378,16 @@ Specify the local and remote addresses to which this rule applies.
378
378
379
379
When you use *Specified address*, you add one or more addresses as a comma-separated list of remote addresses that are covered by the rule. Tokens aren't case-sensitive. Valid tokens include:
380
380
- Use an asterisk "*" for *any* remote address. If you use an asterisk, it must be the only token you use.
381
-
-"Defaultgateway"
382
-
-"DHCP"
383
-
-"DNS"
384
-
-"WINS"
385
-
-"Intranet" (supported on Windows versions 1809 and later)
386
-
-"RmtIntranet" (supported on Windows versions 1809 and later)
387
-
-"Internet" (supported on Windows versions 1809 and later)
388
-
-"Ply2Renders" (supported on Windows versions 1809 and later)
389
-
-"LocalSubnet" indicates any local address on the local subnet.
390
-
-To specify a subnet use either the subnet mask or network prefix notation. If neither a subnet mask nor a network prefix is specified, the subnet mask defaults to 255.255.255.255.
381
+
-`Defaultgateway`
382
+
-`DHCP`
383
+
-`DNS`
384
+
-`WINS`
385
+
-`Intranet` (supported on Windows versions 1809 and later)
386
+
-`RmtIntranet` (supported on Windows versions 1809 and later)
387
+
-`Internet` (supported on Windows versions 1809 and later)
388
+
-`Ply2Renders` (supported on Windows versions 1809 and later)
389
+
-`LocalSubnet` indicates any local address on the local subnet.
390
+
-Specify a subnet by either the subnet mask or network prefix notation. If a subnet mask or a network prefix isn't specified, the subnet mask defaults to 255.255.255.255.
391
391
- A valid IPv6 address.
392
392
- An IPv4 address range in the format of "start address - end address" with no spaces included.
393
393
- An IPv6 address range in the format of "start address - end address" with no spaces included.
@@ -399,7 +399,7 @@ Specify the local and remote ports to which this rule applies.
-**Enable** - Control how BitLocker-protected operating system drives recover when the required start-up information isn't available.
607
-
-**Not configured** - Default recovery options are supported for BitLocker recovery. By default, a DRA is allowed, the recovery options are chosen by the user, including the recovery password and recovery key, and recovery information isn't backed up to AD DS.
607
+
-**Not configured** - Default recovery options are supported including DRA. The end user can specify recovery options. Recovery information isn't backed up to AD DS.
608
608
609
609
When set to *Enable*, you can configure the following settings:
610
610
@@ -787,16 +787,16 @@ To learn more, see [Attack surface reduction rules](/windows/security/threat-pro
787
787
788
788
**Merge behavior for Attack surface reduction rules in Intune**:
789
789
790
-
Attack surface reduction rules support a merger of settings from different policies, to create a superset of policy for each device. Only the settings that are not in conflict are merged, while those that are in conflict are not added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed.
790
+
Attack surface reduction rules support a merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while settings that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed.
791
791
792
792
Attack surface reduction rule merge behavior is as follows:
793
793
794
794
- Attack surface reduction rules from the following profiles are evaluated for each device the rules apply to:
- Endpoint security > Security baselines > Microsoft Defender for Endpoint Baseline > **Attack Surface Reduction Rules**.
798
-
- Settings that do not have conflicts are added to a superset of policy for the device.
799
-
- When two or more policies have conflicting settings, the conflicting settings are not added to the combined policy, while settings that don’t conflict are added to the superset policy that applies to a device.
798
+
- Settings that don't have conflicts are added to a superset of policy for the device.
799
+
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy. Settings that don’t conflict are added to the superset policy that applies to a device.
800
800
- Only the configurations for conflicting settings are held back.
801
801
802
802
**Settings in this profile**:
@@ -997,11 +997,11 @@ Block outbound connections from any app to IP addresses or domains with low repu
997
997
-**Upload XML**
998
998
**Default**: *Not configured*
999
999
1000
-
To use exploit protection to [protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection), create an XML file that includes the system and application mitigation settings you want. There are two methods to create the XML file:
1000
+
To use *Exploit protection* to [protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection), create an XML file that includes the system and application mitigation settings you want. There are two methods to create the XML file:
1001
1001
1002
1002
-*PowerShell* - Use one or more of the *Get-ProcessMitigation*, *Set-ProcessMitigation*, and *ConvertTo-ProcessMitigationPolicy* PowerShell cmdlets. The cmdlets configure mitigation settings, and export an XML representation of them.
1003
1003
1004
-
-*Microsoft Defender Security Center UI* - In the Microsoft Defender Security Center, click on App & browser control and then scroll to the bottom of the resulting screen to find Exploit Protection. First, use the System settings and Program settings tabs to configure mitigation settings. Then, find the Export settings link at the bottom of the screen to export an XML representation of them.
1004
+
-*Microsoft Defender Security Center UI* - In the Microsoft Defender Security Center, select *App & browser control* and then scroll to the bottom of the resulting screen to find Exploit Protection. First, use the System settings and Program settings tabs to configure mitigation settings. Then, find the Export settings link at the bottom of the screen to export an XML representation of them.
1005
1005
1006
1006
-**User editing of the exploit protection interface**
1007
1007
**Default**: Not configured
@@ -1012,7 +1012,7 @@ Block outbound connections from any app to IP addresses or domains with low repu
1012
1012
1013
1013
## Microsoft Defender Application Control
1014
1014
1015
-
Choose additional apps that either need to be audited by, or can be trusted to run by Microsoft Defender Application Control. Windows components and all apps from Windows store are automatically trusted to run.
1015
+
Choose apps to be audited by or that are trusted to be run by Microsoft Defender Application Control. Windows components and all apps from Windows store are automatically trusted to run.
1016
1016
1017
1017
-**Application control code integrity policies**
1018
1018
**Default**: Not configured
@@ -1022,7 +1022,7 @@ Choose additional apps that either need to be audited by, or can be trusted to r
1022
1022
1023
1023
After being enabled on a device, Application Control can only be disabled by changing the mode from *Enforce* to *Audit only*. Changing the mode from *Enforce* to *Not Configured* results in Application Control continuing to be enforced on assigned devices.
1024
1024
1025
-
-**Not Configured** - Application Control is not added to devices. However, settings that were previously added continue to be enforced on assigned devices.
1025
+
-**Not Configured** - Application Control isn't added to devices. However, settings that were previously added continue to be enforced on assigned devices.
1026
1026
1027
1027
-**Audit only** - Applications aren't blocked. All events are logged in the local client's logs.
1028
1028
@@ -1173,7 +1173,7 @@ Block end-user access to the various areas of the Microsoft Defender Security Ce
1173
1173
Turn Tamper Protection on or off on devices. To use Tamper Protection, you must [integrate Microsoft Defender for Endpoint with Intune](advanced-threat-protection.md), and have [Enterprise Mobility + Security E5 Licenses](../fundamentals/licenses.md).
1174
1174
-**Not configured** - No change is made to device settings.
1175
1175
-**Enabled** - Tamper Protection is turned on and restrictions are enforced on devices.
1176
-
-**Disabled** - Tamper Protection is turned off and restrictions are not enforced.
1176
+
-**Disabled** - Tamper Protection is turned off and restrictions aren't enforced.
1177
1177
1178
1178
### IT contact Information
1179
1179
@@ -1280,7 +1280,7 @@ Use these options to configure the local security settings on Windows 10/11 devi
-**Enabled** - Only the interactively logged-on user can use the CD-ROM media. If this policy is enabled, and no one is logged on interactively, then the CD-ROM is accessed over the network.
1283
+
-**Enabled** - Only the interactively logged-on user can use the CD-ROM media. If this policy is enabled and no one is logged on interactively, then the CD-ROM is accessed over the network.
1284
1284
-**Not configured** - Anyone has access to the CD-ROM.
1285
1285
1286
1286
-**Format and eject removable media**
@@ -1465,8 +1465,8 @@ Use these options to configure the local security settings on Windows 10/11 devi
0 commit comments