Skip to content

Commit 8525980

Browse files
Merge pull request #21267 from MicrosoftDocs/main
publish main to live, Monday 7/3 10 AM
2 parents fa7e893 + 834ae48 commit 8525980

13 files changed

Lines changed: 159 additions & 128 deletions

microsoft-365/enterprise/connect-to-microsoft-365-powershell.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Connect to Microsoft 365 with PowerShell"
33
ms.author: kvice
44
author: kelleyvice-msft
55
manager: scotv
6-
ms.date: 08/10/2020
6+
ms.date: 06/30/2023
77
audience: ITPro
88
ms.topic: article
99
ms.service: microsoft-365-enterprise
@@ -140,12 +140,13 @@ These steps are required only one time on your computer. But you'll likely need
140140
141141
1. If you're not running Windows 10, install the 32-bit version of the Microsoft Online Services Sign-in Assistant: [Microsoft Online Services Sign-in Assistant for IT Professionals RTW](https://download.microsoft.com/download/7/1/E/71EF1D05-A42C-4A1F-8162-96494B5E615C/msoidcli_32bit.msi).
142142
143-
2. Follow these steps to install the Microsoft Azure Active Directory Module for Windows PowerShell:
143+
2. Follow these steps to install and import the Microsoft Azure Active Directory Module for Windows PowerShell:
144144
145145
1. Open an elevated Windows PowerShell command prompt (run Windows PowerShell as an administrator).
146146
1. Run the **Install-Module MSOnline** command.
147147
1. If you're prompted to install the NuGet provider, type **Y** and press Enter.
148148
1. If you're prompted to install the module from PSGallery, type **Y** and press Enter.
149+
1. Run the **Import-Module MSOnline** command to import the module.
149150
150151
### Step 2: Connect to Azure AD for your Microsoft 365 subscription
151152

microsoft-365/enterprise/desktop-deployment-center-home.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: kvice
66
author: kelleyvice-msft
77
manager: scotv
8-
ms.date: 08/10/2020
8+
ms.date: 06/30/2023
99
audience: ITPro
1010
ms.topic: article
1111
ms.service: microsoft-365-enterprise

microsoft-365/includes/microsoft-365-content-updates.md

Lines changed: 57 additions & 67 deletions
Large diffs are not rendered by default.

microsoft-365/lighthouse/m365-lighthouse-device-health-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,15 +34,15 @@ Devices must be enrolled in Microsoft Intune. For more information on enrollment
3434

3535

3636
> [!NOTE]
37-
> If data doesnt show up for a specific tenant, verify that the policy is enabled. From the tenants deployment plan, under **Set up device enrollment**, verify that **Device health monitoring policy** is compliant. If not compliant, deploy the policy.
37+
> If data doesn't show up for a specific tenant, verify that the policy is enabled. From the tenant's deployment plan, under **Set up device enrollment**, verify that **Device health monitoring policy** is compliant. If not compliant, deploy the policy.
3838
3939
## Overview tab
4040

4141
The Overview tab provides a multi-tenant view of device health, including the total number of restarts and blue screens. Select a tenant from the list to see device-specific details.
4242

4343
The Overview tab also includes the following options:
4444

45-
- **Tenant filter:** Filter by tenant or tag.
45+
- **Tenants filter:** Filter by tenant or tag.
4646

4747
- **Date filter:** Filter by date range.
4848

@@ -70,7 +70,7 @@ Select a device from the list for more detailed device information, including a
7070

7171
The Devices tab also includes the following options:
7272

73-
- **Tenant filter:** Filter by tenant or tag.
73+
- **Tenants filter:** Filter by tenant or tag.
7474

7575
- **Date filter:** Filter by date range.
7676

microsoft-365/lighthouse/m365-lighthouse-manage-tenant-list.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ Tags that are currently assigned have a check mark to the right of the name. You
103103

104104
## Next steps
105105

106-
After you've created and assigned tags, you can use them to filter your tenants. Go to any of the other pages (Users, Devices, Threat management, or Windows 365) and select one or more tags from the Tenant filter. You can create new tags to support specific views based on each page.
106+
After you've created and assigned tags, you can use them to filter your tenants. Go to any of the other pages (Users, Devices, Threat management, or Windows 365) and select one or more tags from the Tenants filter. You can create new tags to support specific views based on each page.
107107

108108
## Related content
109109

microsoft-365/lighthouse/m365-lighthouse-tenants-page-overview.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,19 +37,23 @@ The Tenants page also includes the following options:
3737

3838
## Tenant list
3939

40-
The tenant list provides insights into the different customer tenants that you have a contract with, including their Lighthouse management status. The tenant list also lets you tag tenants to provide different filters throughout Lighthouse, and drill down to learn more about a given tenant and the status of its deployment plan.
40+
The tenant list provides insights into the different customer tenants that you have a contract with, including their Lighthouse management status. The tenant list also lets you tag tenants to provide different filters throughout Lighthouse, manage services for tenants in the applicable admin center, and drill down to learn more about a given tenant and the status of its deployment plan.
4141

4242
After your customer tenants meet the [Lighthouse onboarding requirements](m365-lighthouse-requirements.md), their status will show as **Active** in the tenant list.
4343

4444
The tenant list lets you:
4545

46+
- Access applicable admin centers to manage services for your customer tenants.
4647
- Automatically sort tenants by active, inactive, and ineligible.
4748
- Export the tenant list.
4849
- Assign and manage tags.
4950
- Search for tenants by name.
5051
- Filter tenants by status, delegated admin privilege (DAP), and tags.
5152

52-
To inactivate a tenant or view and manage tags, select the three dots (more actions) next to the tenant name. You can view individual tenants by either selecting the tenant name or by selecting one of the tags assigned to the tenant.
53+
To inactivate a tenant, manage tenant services, or view and manage tags, select the three dots (more actions) next to the tenant name. You can view individual tenants by either selecting the tenant name or by selecting one of the tags assigned to the tenant.
54+
55+
> [!TIP]
56+
> You can also use the Tenants filter at the top of any page in Lighthouse to select a tenant and then access applicable admin centers to manage services for that tenant.
5357
5458
For information on how to add customer tenants, see [Add and manage multiple tenants in your Partner Center account](/partner-center/multi-tenant-account).
5559

microsoft-365/security/defender-endpoint/tamper-resiliency.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: dansimp
77
ms.reviewer: joshbregman
88
ms.service: microsoft-365-security
99
ms.subservice: mde
10-
ms.date: 06/01/2023
10+
ms.date: 07/04/2023
1111
ms.topic: overview
1212
ms.collection:
1313
- tier1
@@ -104,11 +104,29 @@ Attackers can be preventing from discovering existing antivirus exclusions by en
104104

105105
When tampering is detected, an alert is raised. Some of the alert titles for tampering are:
106106

107+
- Attempt to bypass Microsoft Defender for Endpoint client protection
108+
- Attempt to stop Microsoft Defender for Endpoint sensor
109+
- Attempt to tamper with Microsoft Defender on multiple devices
110+
- Attempt to turn off Microsoft Defender Antivirus protection
111+
- Defender detection bypass
112+
- Driver-based tampering attempt blocked
113+
- Image file execution options set for tampering purposes
114+
- Microsoft Defender Antivirus protection turned off
115+
- Microsoft Defender Antivirus tampering
116+
- Modification attempt in Microsoft Defender Antivirus exclusion list
117+
- Pending file operations mechanism abused for tampering purposes
107118
- Possible Antimalware Scan Interface (AMSI) tampering
119+
- Possible remote tampering
120+
- Possible sensor tampering in memory
108121
- Potential attempt to tamper with MDE via drivers
122+
- Security software tampering
123+
- Suspicious Microsoft Defender Antivirus exclusion
109124
- Tamper protection bypass
125+
- Tampering activity typical to ransomware attacks
126+
- Tampering with Microsoft Defender for Endpoint sensor communication
127+
- Tampering with Microsoft Defender for Endpoint sensor settings
110128
- Tampering with the Microsoft Defender for Endpoint sensor
111-
- Possible tampering with protected processes
129+
112130

113131
If the [Block abuse of exploited vulnerable signed drivers](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference#block-abuse-of-exploited-vulnerable-signed-drivers) attack surface reduction (ASR) rule is triggered, the event is viewable in the [ASR Report](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-report) and in [Advanced Hunting](/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-deployment-operationalize#asr-rules-advanced-hunting)
114132

microsoft-365/security/defender/microsoft-365-security-center-mdi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ The table below lists the changes in navigation between Microsoft Defender for I
8484
| **Defender for** Identity | **Microsoft 365 Defender** |
8585
| -------------------------- | ------------------------------------------------------------ |
8686
| **Timeline** |- Microsoft 365 Defender Alerts/Incidents queue |
87-
| **Reports** |- Lateral movement path and passwords exposed in cleartext reports are covered by the [Identity security posture assessments](/defender-for-identity/security-assessment#assessment-reports) (ISPM)<br><br>- Health issues are available in **Settings** -> **Identities** -> **Health issues**<br><br>- View a summary of alerts by exporting the alerts queue or from the **Advanced hunting** page, which provides 30 days of data<br><br>- Modify sensitive groups from the **Advanced hunting** page<br><br>**Tip**: Use the **Advanced hunting** page to create customized reports in Microsoft 365 Defender. |
87+
| **Reports** |The following types of reports are available from the **Settings > Identities > Report management** page in Microsoft 365 Defender, either for immediate download or scheduled for a periodic email delivery: <br><br>- A summary report of alerts and health issues you should take care of. <br>- A list of each time a modification is made to sensitive groups. <br>- A list of source computer and account passwords that are detected as being sent in clear text.<br>- A list of the sensitive accounts exposed in lateral movement paths. <br><br>For more information, see [Report management](/defender-for-identity/reports). |
8888
| **Identity page** | Microsoft 365 Defender user details page |
8989
| **Device page** | Microsoft 365 Defender device details page |
9090
| **Group page** | Microsoft 365 Defender groups side pane |

0 commit comments

Comments
 (0)