Skip to content

Commit add896e

Browse files
authored
Merge branch 'main' into patch-63
2 parents 280ba3e + ec45896 commit add896e

3 files changed

Lines changed: 26 additions & 22 deletions

File tree

microsoft-365/admin/manage/manage-feedback-ms-org.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ The table below represents which apps and services are currently connected to th
4747
|**PowerPoint**|Yes|Yes|Yes|Yes|
4848
|**Project**|Yes|Yes|Yes|Yes|
4949
|**Publisher**|Yes|Yes|Yes|Yes|
50-
|**SharePoint**|[Some settings currently managed by other controls.](/powershell/module/sharepoint-online/set-spotenant)||||
50+
|**SharePoint**|Yes|Yes|Yes|Yes|
5151
|**Teams**|[Some settings currently managed by other controls.](/microsoftteams/manage-feedback-policies-in-teams)||Yes||
5252
|**To Do**|Yes|Yes|Yes|Yes|
5353
|**Word**|Yes|Yes|Yes|Yes|

microsoft-365/security/defender-endpoint/configure-endpoints-non-windows.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,8 @@
11
---
22
title: Onboard non-Windows devices to the Microsoft Defender for Endpoint service
33
description: Configure non-Windows devices so that they can send sensor data to the Microsoft Defender for Endpoint service.
4-
keywords: onboard non-Windows devices, macos, linux, device management, configure Microsoft Defender for Endpoint devices
5-
search.product: eADQiWindows 10XVcnh
64
search.appverid: met150
75
ms.service: defender-endpoint
8-
ms.mktglfcycl: deploy
9-
ms.sitesec: library
106
ms.pagetype: security
117
ms.author: siosulli
128
author: siosulli
@@ -18,7 +14,7 @@ ms.collection:
1814
- tier1
1915
ms.topic: conceptual
2016
ms.subservice: onboard
21-
ms.date: 12/18/2020
17+
ms.date: 01/18/2024
2218
---
2319

2420
# Onboard non-Windows devices
@@ -27,9 +23,9 @@ ms.date: 12/18/2020
2723

2824
**Applies to:**
2925

30-
- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
31-
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
3226
- [Microsoft Defender XDR](https://go.microsoft.com/fwlink/?linkid=2118804)
27+
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
28+
- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
3329

3430
**Platforms**
3531
- macOS
@@ -65,7 +61,9 @@ You'll need to take the following steps:
6561

6662
## Offboard non-Windows devices
6763

68-
For macOS and Linux devices, you can choose to offboard through Microsoft Defender for Endpoint. In the navigation pane, select **Settings** \> **Offboard** \> **Select Operating System to start the offboarding Process**.
64+
For macOS and Linux devices, you can choose to offboard through Microsoft Defender for Endpoint. In the navigation pane, select **Settings** > **Offboard** > **Select Operating System to start the offboarding Process**.
65+
66+
For details on offboarding Microsoft Defender on macOS, see [Uninstalling Microsoft Defender for macOS](mac-resources.md).
6967

7068
You can also offboard non-Windows devices by disabling the third-party integration. Enable coverage for devices running non-Windows platforms by [integrating third-party solutions](https://security.microsoft.com/interoperability/partners).
7169

@@ -76,3 +74,4 @@ You can also offboard non-Windows devices by disabling the third-party integrati
7674
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
7775
- [Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
7876
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]
77+

microsoft-365/security/defender-endpoint/defender-endpoint-demonstrations.md

Lines changed: 18 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,17 +19,20 @@ ms.collection:
1919
- demo
2020
ms.topic: article
2121
ms.subservice: ngp
22-
ms.date: 10/21/2022
22+
ms.date: 01/15/2024
2323
---
2424

2525
# Microsoft Defender for Endpoint - demonstration scenarios
2626

2727
**Applies to:**
2828

29-
- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
3029
- [Microsoft Defender for Endpoint Plan 2](https://go.microsoft.com/fwlink/p/?linkid=2154037)
30+
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
31+
- [Microsoft Defender for Endpoint Plan 1](https://go.microsoft.com/fwlink/p/?linkid=2154037)
32+
- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)
33+
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
3134

32-
The following demonstration scenarios will help you learn about the capabilities of Microsoft Defender for Endpoint on Windows (Mac and Linux are out of scope). Demonstration scenarios are provided for the following Microsoft Defender for Endpoint protection areas:
35+
The following demonstration scenarios will help you learn about the capabilities of Microsoft Defender for Endpoint on Windows, Mac, and Linux. Demonstration scenarios are provided for the following Microsoft Defender for Endpoint protection areas:
3336

3437
:::image type="content" source="images/microsoft-defender-for-endpoint-cloud-protection.png" alt-text="Shows the areas of Microsoft Defender for Endpoint demonstration scenarios covered in this collection" lightbox="images/microsoft-defender-for-endpoint-cloud-protection.png":::
3538

@@ -48,16 +51,18 @@ The following table lists the available demonstrations alphabetically, with thei
4851

4952
| # | Demonstration name | Protection area | Description |
5053
|:--|:---|:---|:---|
51-
| 1 | [App reputation demonstration](defender-endpoint-demonstration-app-reputation.md) | NGP | Navigate to the app reputation page to see the demonstration scenario using Microsoft Edge. |
52-
| 2 | [Attack surface reduction rules demonstrations](defender-endpoint-demonstration-attack-surface-reduction-rules.md) | ASR | Download sample files to trigger each ASR rule. |
53-
| 3 | [Block at First Sight (BAFS) demonstration](defender-endpoint-demonstration-block-at-first-sight-bafs.md) | NGP | With the BAFS feature in Microsoft Defender Antivirus, newly discovered files are analyzed and - if needed - blocked. |
54-
| 4 | [Cloud-delivered protection demonstration](defender-endpoint-demonstration-cloud-delivered-protection.md) | NGP | Confirm that cloud-delivered protection is working properly on your computer. |
55-
| 5 | [Controlled folder access (CFA) demonstration (block script)](defender-endpoint-demonstration-controlled-folder-access-test-tool.md) | ASR | Download the CFA test tool. |
56-
| 6 | [Controlled folder access (CFA) demonstrations (block ransomware)](defender-endpoint-demonstration-controlled-folder-access.md) | ASR | Download and execute a sample file to trigger CFA ransomware protection. |
57-
| 7 | [Exploit protection (EP) demonstrations](defender-endpoint-demonstration-exploit-protection.md) | ASR | Apply custom exploit protection settings. |
58-
| 8 | [Network protection demonstrations](defender-endpoint-demonstration-network-protection.md) | ASR | Navigate to a suspicious URL to trigger network protection. |
59-
| 9 | [Potentially unwanted applications (PUA) demonstration](defender-endpoint-demonstration-potentially-unwanted-applications.md) | NGP | Confirm that potentially unwanted applications (PUAs) are being blocked on your network by downloading a fake (safe) PUA file. |
60-
| 10 | [URL reputation demonstrations](defender-endpoint-demonstration-smartscreen-url-reputation.md) | NGP | Navigate to the URL Reputation page to see the demonstration scenarios using Microsoft Edge. |
54+
| 1 |[Endpoint Detection and Response (EDR) detections](/microsoft-365/security/defender-endpoint/edr-detection)| EDR |Confirm that EDR is detecting cyber threats such as malware.|
55+
| 2 |[Validate antimalware](/microsoft-365/security/defender-endpoint/validate-antimalware)| NGP |Confirm that antivirus/antimalware is detecting and blocking malware. |
56+
| 3 |[Potentially unwanted applications (PUA) demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-potentially-unwanted-applications)| NGP |Confirm that potentially unwanted applications (PUAs) are being blocked on your network by downloading a fake (safe) PUA file. |
57+
| 4 |[Cloud-delivered protection demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-cloud-delivered-protection)| NGP |Confirm that cloud-delivered protection is working properly on your computer. |
58+
| 5 |[Block at First Sight (BAFS) demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-block-at-first-sight-bafs)| NGP |With the BAFS feature in Microsoft Defender Antivirus, newly discovered files are analyzed and if needed blocked. |
59+
| 6 |[App reputation demonstration](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-app-reputation)| NGP |Navigate to the app reputation page to see the demonstration scenario using Microsoft Edge.|
60+
| 7 |[URL reputation demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-smartscreen-url-reputation)| NGP |Navigate to the URL Reputation page to see the demonstration scenarios using Microsoft Edge.|
61+
| 8 |[Network protection demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-network-protection)| ASR |Navigate to a suspicious URL to trigger network protection. |
62+
| 9 |[Attack surface reduction rules (ASR rules) demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules)| ASR |Download sample files to trigger each ASR rule.|
63+
| 10 |[Exploit protection (EP) demonstrations](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-exploit-protection)| ASR | Apply custom exploit protection settings.|
64+
| 11 |[Controlled folder access (CFA) demonstration (block script)](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-controlled-folder-access-test-tool)| ASR | Download the CFA test tool.|
65+
| 12 |[Controlled folder access (CFA) demonstrations (block ransomware)](/microsoft-365/security/defender-endpoint/defender-endpoint-demonstration-controlled-folder-access)| ASR | Download and execute a sample file to trigger CFA ransomware protection.|
6166

6267
## See also
6368

0 commit comments

Comments
 (0)