Skip to content

Commit cefd4bc

Browse files
author
Thomas Raya
authored
Merge pull request #12730 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/microsoft-365-docs (branch public)
2 parents 5708a2c + 15b587a commit cefd4bc

3 files changed

Lines changed: 10 additions & 6 deletions

File tree

microsoft-365/compliance/insider-risk-management-browser-support.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Web browsers are often used by users to access both sensitive and non-sensitive
2626
- Files transferred or copied to a network share
2727
- Files copied to USB devices
2828

29-
Signals for these events are detected in Microsoft Edge using built-in browser capabilities and using the *Microsoft Insider Risk Extension* add-on. In Google Chrome, customers use the *Microsoft Compliance Extension* for signal detection.
29+
Signals for these events are detected in Microsoft Edge using built-in browser capabilities and using the *Microsoft Compliance Extension* add-on. In Google Chrome, customers use the *Microsoft Compliance Extension* for signal detection.
3030

3131
The following table summarizes detected activities and extension support for each browser:
3232

@@ -39,7 +39,7 @@ The following table summarizes detected activities and extension support for eac
3939

4040
## Common requirements
4141

42-
Before installing either the *Microsoft Insider Risk Extension* or the *Microsoft Compliance Extension,* customers need to ensure that devices for in-scope policy users meet the following requirements
42+
Before installing the Microsoft Edge add-on or Google Chrome extension, customers need to ensure that devices for in-scope policy users meet the following requirements:
4343

4444
- Latest Windows 10 x64 build is recommended, minimum Windows 10 x64 build 1809 for signal detection support. Browser signal detection isn't currently supported on non-Windows devices.
4545
- Current [Microsoft 365 subscription](/microsoft-365/compliance/insider-risk-management-configure#subscriptions-and-licensing) with insider risk management support.
@@ -53,7 +53,7 @@ For specific browser configuration requirements, see the Microsoft Edge and Goog
5353

5454
- Meet the common requirements
5555
- Microsoft Edge x64, 91.0.864.41 version or higher
56-
- *Microsoft Insider Risk Extension* add-on version 1.0.0.44 or higher
56+
- *Microsoft Compliance Extension* add-on version 1.0.0.44 or higher
5757
- Edge.exe is not configured as an unallowed browser
5858

5959
### Option 1: Basic setup (recommended for testing with Edge)
@@ -62,7 +62,7 @@ Use this option to configure single machine selfhost for each device in your org
6262

6363
For the basic setup option, complete the following steps:
6464

65-
1. Navigate to [Microsoft Insider Risk Extension](https://microsoftedge.microsoft.com/addons/detail/microsoft-insider-risk-ex/lcmcgbabdcbngcbcfabdncmoppkajglo).
65+
1. Navigate to [Microsoft Compliance Extension](https://microsoftedge.microsoft.com/addons/detail/microsoft-compliance-exte/lcmcgbabdcbngcbcfabdncmoppkajglo).
6666
2. Install the extension.
6767

6868
### Option 2: Intune setup for Edge
@@ -94,7 +94,7 @@ For the Group Policy setup option, complete the following steps:
9494

9595
Devices must be manageable using Group Policies and all [Microsoft Edge Administrative Templates](https://www.microsoft.com/edge/business/download) need to be imported into the Group Policy Central Store. For more information, see [How to create and manage the Central Store for Group Policy Administrative Templates in Windows](/troubleshoot/windows-client/group-policy/create-and-manage-central-store).
9696

97-
**Step 2: Add the *Microsoft Insider Risk Management Extension* add-on to the *Force Install* list.**
97+
**Step 2: Add the *Microsoft Compliance Extension* add-on to the *Force Install* list.**
9898

9999
Complete the following steps to add the extension:
100100

microsoft-365/security/defender-endpoint/ios-whatsnew.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,10 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3232

3333
Microsoft Defender for Endpoint on iOS now has specialized ability on supervised iOS/iPadOS devices, given the increased management capabilities provided by the platform on these types of devices. It can also provide Web Protection **without setting up a local VPN on the device**. This gives end-users a seamless experience while still being protected from phishing and other web-based attacks. For details, visit [this documentation](ios-install.md#complete-deployment-for-supervised-devices)
3434

35+
## Microsoft Defender for Endpoint is now Microsoft Defender in the App store
36+
37+
Microsoft Defender for Endpoint is now available as **Microsoft Defender** in the app store. With this update, the app will be available as preview for **Consumers in the US region**. Based on how you log into the app with your work or personal account, you will have access to features for Microsoft Defender for Endpoint or to features for Microsoft Defender for individuals. For more information, see [this blog](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals).
38+
3539
## Threat and Vulnerability Management
3640

3741
On January 25, 2022, we announced the general availability of Threat and Vulnerability management on Android and iOS. For more details, see [the techcommunity post here](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-general-availability-of-vulnerability-management/ba-p/3071663).

microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ ms.technology: mde
6969
7070
**System Requirements**
7171

72-
- iOS device running iOS 12.0 and above. iPads are also supported.
72+
- iOS device running iOS 12.0 and above. iPads are also supported. *Note that starting 31-March-2022, the minimum supported iOS version by Microsoft Defender for Endpoint will be iOS 13.0.*
7373

7474
- The device is either enrolled with the [Intune Company Portal app](https://apps.apple.com/us/app/intune-company-portal/id719171358) or is registered with Azure Active Directory through [Microsoft Authenticator](https://apps.apple.com/app/microsoft-authenticator/id983156458) with the same account.
7575

0 commit comments

Comments
 (0)