Skip to content

Commit 1613e74

Browse files
authored
Merge pull request #21767 from MicrosoftDocs/main
urgent update
2 parents c76520e + f093ad0 commit 1613e74

2 files changed

Lines changed: 3 additions & 81 deletions

File tree

microsoft-365/lighthouse/m365-lighthouse-deploy-task-manually.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Additionally, each partner tenant user must meet the following requirements:
4141

4242
## Deploy a task manually
4343

44-
1. In the left navigation pane in Lighthouse, select **Tenant**.
44+
1. In the left navigation pane in Lighthouse, select **Tenants**.
4545

4646
2. From the tenant list, select the tenant you want to view.
4747

@@ -59,7 +59,7 @@ The task status will be updated to **Compliant**, and the Task Details pane will
5959

6060
If the task status changes and is no longer compliant, you can reset the status to **Not compliant**. To do this:
6161

62-
1. In the left navigation pane in Lighthouse, select **Tenant**.
62+
1. In the left navigation pane in Lighthouse, select **Tenants**.
6363

6464
2. From the tenant list, select the tenant you want to view.
6565

microsoft-365/security/defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 1 addition & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.pagetype: security
1111
ms.author: macapara
1212
author: mjcaparas
1313
ms.localizationpriority: medium
14-
ms.date: 07/19/2023
14+
ms.date: 08/08/2023
1515
manager: dansimp
1616
audience: ITPro
1717
ms.collection:
@@ -61,84 +61,6 @@ For more information on Microsoft Defender for Endpoint on specific operating sy
6161
- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)
6262
- [What's new in Defender for Endpoint on Linux](linux-whatsnew.md)
6363
64-
## August 2023
65-
66-
- **Data completeness**
67-
68-
- Extended file attributes and registry monitoring capabilities to enhance investigation and detection experience. 
69-
70-
- Conditional Access - Expanding integration between Microsoft Defender for Endpoint and Intune to support additional Azure Active Directory (AAD) joined scenarios to deploy conditional access policies in your environment and enable Zero Trust policies to better protect your network against adversaries. 
71-
72-
- Engine bugfixes and improvements. 
73-
74-
75-
76-
- **Platform**
77-
78-
- Enabled safer deployment of features through rings and containment mechanism enhancements. 
79-
80-
- Consolidate the billing and alert experiences of customers that are onboarded to both Microsoft Defender for Endpoint and Microsoft Defender for Cloud in cloud environments by collecting machine identifiers that allow de-duplication on cloud side. 
81-
82-
83-
84-
- **Hardening**
85-
86-
- General hardening improvements. 
87-
88-
89-
- **Response** 
90-
91-
- Device Isolation improvements. For more information, see [Take response actions on a device](respond-machine-alerts.md) 
92-
93-
- Strengthen the resilience of device isolation permit and block rules.  
94-
95-
- Allow a device that is disconnected from a Command and Control channel using offline signed command to be removed from isolation.  
96-
97-
- Improved performance for [Live Response](live-response.md) commands when executed concurrently with automatic investigation.  
98-
99-
- Send command status events for isolate and IR commands through Command and Control channel to improve performance, support future design changes, and easier monitoring. 
100-
101-
- Custom Exclusion for Isolation - exclusion of apps, allow list of IP addresses and ports, and users.
102-
103-
- Isolation hardening is a measure taken against a technique known as process hollowing. Implementing this hardening approach, a system can establish stronger isolation rules that significantly enhance security when dealing with code injection tactics.  
104-
105-
106-
- Reduce device disconnections for isolated device caused by third-party inspection drivers. For more information, see [Take response actions on a device](respond-machine-alerts.md).
107-
108-
109-
110-
- **Vulnerability management** 
111-
112-
- Replaces some of the current threat vulnerability collections and adds new much requested user installed packages collector. 
113-
114-
- New and higher-performing (both CPU and memory) vulnerabilities collector. 
115-
116-
- Changes on devices will be reflected in a timelier manner to the portal, enabling them to take action against threats faster. 
117-
118-
- Bugfix in Vulnerability Management client management component - race condition. 
119-
120-
121-
122-
- **Threat Prevention/Protection** 
123-
124-
- Lateral Movement Firewall - Addressing advanced attacks inflicting customers (Human Operated Ransomware) by expanding identity-oriented response capabilities known to be gaps in our current protection story.
125-
126-
- Supporting force close active SMB sessions for incriminated users as part of Lateral Movement Firewall to disrupt and terminate active malicious sessions. 
127-
128-
129-
- Device Contain - Introducing new Windows Filtering Platform (WFP) network filter to allow telemetry & audit-mode capabilities to network connections enforcements. For more information, see - [Take response actions on a device in Microsoft Defender for Endpoint](respond-machine-alerts.md#contain-devices-from-the-network).
130-
131-
132-
- Anti-tampering - Addressing tampering gaps in Defender for Endpoint authentication flow by hardening protection of the cryptographic key used to register clients with Defender for Endpoint's authentication service. This is done by storing the key in an AV-protected registry key. 
133-
134-
135-
136-
- **MITRE**
137-
138-
- Introducing a new sensor for MITRE. 
139-
- Alternative data streams support. 
140-
- Extended Registry monitoring capabilities. 
141-
14264
14365
14466
## July 2023

0 commit comments

Comments
 (0)