Skip to content

Commit

Permalink
Merge pull request #2647 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
pushing updates live per PM request
  • Loading branch information
denisebmsft authored Feb 4, 2025
2 parents 058d253 + 2099c17 commit 6f52693
Show file tree
Hide file tree
Showing 16 changed files with 301 additions and 277 deletions.
7 changes: 6 additions & 1 deletion .openpublishing.redirection.defender-endpoint.json
Original file line number Diff line number Diff line change
Expand Up @@ -79,6 +79,11 @@
"source_path": "defender-endpoint/pilot-deploy-defender-endpoint.md",
"redirect_url": "/defender-xdr/pilot-deploy-defender-endpoint",
"redirect_document_id": false
}
},
{
"source_path": "defender-endpoint/monthly-security-summary-report.md",
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
"redirect_document_id": true
}
]
}
41 changes: 19 additions & 22 deletions defender-endpoint/TOC.yml
Original file line number Diff line number Diff line change
Expand Up @@ -605,9 +605,6 @@
- name: Manage device group and tags
href: machine-tags.md

- name: Host firewall reporting in Microsoft Defender for Endpoint
href: host-firewall-reporting.md

- name: Tamper resiliency
href: tamper-resiliency.md

Expand All @@ -633,8 +630,6 @@
href: attack-surface-reduction-rules-deployment-operationalize.md
- name: Attack surface reduction rules reference
href: attack-surface-reduction-rules-reference.md
- name: Attack surface reduction rules report
href: attack-surface-reduction-rules-report.md
- name: Troubleshoot attack surface reduction rules
href: troubleshoot-asr-rules.md
- name: Enable ASR rules alternate configuration methods
Expand Down Expand Up @@ -665,8 +660,6 @@
href: device-control-deploy-manage-gpo.md
- name: Device control frequently asked questions
href: device-control-faq.md
- name: Device control reports
href: device-control-report.md
- name: Exploit protection
items:
- name: Protect devices from exploits
Expand Down Expand Up @@ -703,8 +696,6 @@
items:
- name: Web threat protection overview
href: web-threat-protection.md
- name: Monitor web security
href: web-protection-monitoring.md
- name: Respond to web threats
href: web-protection-response.md
- name: Web content filtering
Expand Down Expand Up @@ -910,13 +901,6 @@

- name: Diagnostics for Microsoft Defender Antivirus
items:
- name: Device health reports
href: device-health-reports.md
items:
- name: Microsoft Defender Antivirus health report
href: device-health-microsoft-defender-antivirus-health.md
- name: Sensor health and OS report
href: device-health-sensor-health-os.md
- name: Microsoft Defender Core service overview
href: microsoft-defender-core-service-overview.md
- name: Microsoft Defender Core service configurations and experimentation
Expand Down Expand Up @@ -1121,14 +1105,27 @@
items:
- name: Reports
items:
- name: Monthly security summary
href: monthly-security-summary-report.md
- name: Create custom reports using Power BI
href: api/api-power-bi.md
- name: Threat protection reports
- name: Microsoft Defender for Endpoint reports
href: threat-protection-reports.md
- name: Device health reports
href: device-health-reports.md
items:
- name: Microsoft Defender Antivirus health report
href: device-health-microsoft-defender-antivirus-health.md
- name: Sensor health and OS report
href: device-health-sensor-health-os.md
- name: Host firewall reporting
href: host-firewall-reporting.md
- name: Web protection and monitoring reports
href: web-protection-monitoring.md
- name: Device control reports
href: device-control-report.md
- name: Attack surface reduction rules report
href: attack-surface-reduction-rules-report.md
- name: Aggregated reports
href: aggregated-reporting.md
href: aggregated-reporting.md
- name: Create custom reports using Power BI
href: api/api-power-bi.md
- name: Configure integration with other Microsoft solutions
items:
- name: Configure conditional access
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -162,7 +162,7 @@ GET /api/machines/HardwareFirmwareInventoryExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
> - Each record is approximately 1KB of data. You should take this into account when choosing the pageSize parameter that works for you.
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -167,7 +167,7 @@ GET /api/machines/BaselineComplianceAssessmentExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.

Expand Down
4 changes: 2 additions & 2 deletions defender-endpoint/api/get-assessment-browser-extensions.md
Original file line number Diff line number Diff line change
Expand Up @@ -191,7 +191,7 @@ GET /api/machines/browserextensionsinventoryExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - For maximum download speed of your data, you can make sure you're downloading from the same Azure region that your data resides.
<br>
Expand All @@ -200,7 +200,7 @@ GET /api/machines/browserextensionsinventoryExport

Property (ID)|Data type|Description|Example of a returned value
:---|:---|:---|:---
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z

### 2.6 Examples
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ GET /api/Machines/InfoGatheringExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - To maximize download speeds, make sure you are downloading the data from the same Azure region where your data resides.
> - Some additional columns might be returned in the response. These columns are temporary and might be removed. Only use the documented columns.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -189,7 +189,7 @@ GET /api/machines/SoftwareInventoryNonCpeExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - For maximum download speed of your data, you can make sure you're downloading from the same Azure region that your data resides.
<br>
Expand All @@ -198,7 +198,7 @@ GET /api/machines/SoftwareInventoryNonCpeExport

Property (ID)|Data type|Description|Example of a returned value
:---|:---|:---|:---
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
|

Expand Down
2 changes: 1 addition & 1 deletion defender-endpoint/api/get-assessment-secure-config.md
Original file line number Diff line number Diff line change
Expand Up @@ -247,7 +247,7 @@ GET /api/machines/SecureConfigurationsAssessmentExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - For maximum download speed of your data, you can make sure you are downloading from the same Azure region in which your data resides.

Expand Down
4 changes: 2 additions & 2 deletions defender-endpoint/api/get-assessment-software-inventory.md
Original file line number Diff line number Diff line change
Expand Up @@ -245,7 +245,7 @@ GET /api/machines/SoftwareInventoryExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - For maximum download speed of your data, you can make sure you're downloading from the same Azure region that your data resides.
<br>
Expand All @@ -254,7 +254,7 @@ GET /api/machines/SoftwareInventoryExport

Property (ID)|Data type|Description|Example of a returned value
:---|:---|:---|:---
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization|"[Https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
GeneratedTime|string|The time that the export was generated.|2021-05-20T08:00:00Z
|

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@ CveId|String|Unique identifier assigned to the security vulnerability under the
CvssScore|String|The CVSS score of the CVE.|6.2
DeviceId|String|Unique identifier for the device in the service.|9eaf3a8b5962e0e6b1af9ec756664a9b823df2d1
DeviceName|String|Fully qualified domain name (FQDN) of the device.|johnlaptop.europe.contoso.com
DiskPaths|Array\[string\]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]
DiskPaths|Array[string]|Disk evidence that the product is installed on the device.|["C:\Program Files (x86)\Microsoft\Silverlight\Application\silverlight.exe"]
ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit
FirstSeenTimestamp|String|First time this product CVE was seen on the device.|2020-11-03 10:13:34.8476880
ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!
Expand All @@ -110,7 +110,7 @@ RbacGroupName|String|The role-based access control (RBAC) group. If this device
RecommendationReference|String|A reference to the recommendation ID related to this software.|va-_-microsoft-_-silverlight
RecommendedSecurityUpdate (optional)|String|Name or description of the security update provided by the software vendor to address the vulnerability.|April 2020 Security Updates
RecommendedSecurityUpdateId (optional)|String|Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles|4550961
RegistryPaths|Array\[string\]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MicrosoftSilverlight"]
RegistryPaths|Array[string]|Registry evidence that the product is installed in the device.|["HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MicrosoftSilverlight"]
SecurityUpdateAvailable|Boolean|Indicates whether a security update is available for the software.| Possible values are true or false.
SoftwareName|String|Name of the software product.|Chrome
SoftwareVendor|String|Name of the software vendor.|Google
Expand Down Expand Up @@ -297,7 +297,7 @@ GET /api/machines/SoftwareVulnerabilitiesExport
> [!NOTE]
>
> - The files are GZIP compressed & in multiline JSON format.
> - The download URLs are valid for 6 hours.
> - The download URLs are valid for 1 hour unless the `sasValidHours` parameter is used.
> - For maximum download speed of your data, you can make sure you're downloading from the same Azure region that your data resides.
>
> - Each record is 1KB of data. You should take this into account when choosing the correct pageSize parameter for you.
Expand All @@ -309,7 +309,7 @@ GET /api/machines/SoftwareVulnerabilitiesExport

Property (ID)|Data type|Description|Example of a returned value
:---|:---|:---|:---
Export files|array\[string\]|A list of download URLs for files holding the current snapshot of the organization.|["https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
Export files|array[string]|A list of download URLs for files holding the current snapshot of the organization.|["https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...1", "https://tvmexportstrstgeus.blob.core.windows.net/tvm-export...2"]
GeneratedTime|String|The time that the export was generated.|2021-05-20T08:00:00Z
|

Expand Down
2 changes: 1 addition & 1 deletion defender-endpoint/exploit-protection-reference.md
Original file line number Diff line number Diff line change
Expand Up @@ -439,7 +439,7 @@ Hardware-enforced stack protection offers robust protection against ROP exploits

Hardware-enforced stack protection only works on chipsets with support for hardware shadow stacks, Intel's Control-flow Enforcement Technology (CET) or AMD shadow stacks.

If you're running applications based on the .Net Framework, hardware-enforced stack protection is compatible with .Net Framework 7 (opt-in), .Net Framework 9.0, or newer. If you're using an application with an older version (earlier than .Net Framework 7), expect stability issues (crashes or hangs) and/or performance issues (high cpu or memory leaks).
If you're running applications based on the .Net Framework, hardware-enforced stack protection is compatible with .Net Framework 7 (opt-in), or newer. If you're using an application with an older version (earlier than .Net Framework 7), expect stability issues (crashes or hangs) and/or performance issues (high cpu or memory leaks). These stability issues could also occur when either in audit mode and/or when targeting only compatible modules.

### Configuration options

Expand Down
Loading

0 comments on commit 6f52693

Please sign in to comment.