You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/mde-security-integration.md
+19-25Lines changed: 19 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 09/24/2024
10
+
ms.date: 09/30/2024
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -97,7 +97,7 @@ To confirm the version of the Defender agent, in the Defender portal go to the d
97
97
98
98
*Known issue*: With the Defender agent version **101.23052.0009**, Linux devices fail to enroll when they're missing the following filepath: `/sys/class/dmi/id/board_vendor`.
99
99
100
-
*Known issue*: When a Linux device performs synthetic registration the Device Entra ID (formerly known as Device AAD ID) will not be visible in the Defender portal. This information can be viewed from the Intune or Entra portals. Administrators will still be able to manage devices with policies in this manner.
100
+
*Known issue*: When a Linux device performs synthetic registration, the Device Entra ID (formerly known as Device AAD ID) isn't visible in the Defender portal. This information can be viewed from the Intune or Microsoft Entra portals. Administrators can still manage devices with policies in this manner.
101
101
102
102
103
103
**macOS**:
@@ -113,7 +113,7 @@ To confirm the version of the Defender agent, in the Defender portal go to the d
113
113
114
114
*Known issue*: With the Defender agent version **101.23052.0004**, macOS devices that are registered in Microsoft Entra ID before enrolling with security settings management receive a duplicate Device ID in Microsoft Entra ID, which is a synthetic registration. When you create a Microsoft Entra group for targeting policy, you must use the synthetic Device ID created by security settings management. In Microsoft Entra ID, the *Join Type* column for the synthetic Device ID is blank.
115
115
116
-
*Known issue*: When a macOS device performs synthetic registration the Device Entra ID (formerly known as Device AAD ID) will not be visible in the Defender portal. This information can be viewed from the Intune or Entra portals. Administrators will still be able to manage devices with policies in this manner.
116
+
*Known issue*: When a macOS device performs synthetic registration, the Device Entra ID (formerly known as Device AAD ID) isn't visible in the Defender portal. This information can be viewed from the Intune or Microsoft Entra portals. Administrators can still manage devices with policies in this manner.
117
117
118
118
**Windows**:
119
119
@@ -122,19 +122,16 @@ To confirm the version of the Defender agent, in the Defender portal go to the d
122
122
- Windows Server 2012 R2 with [Microsoft Defender for Down-Level Devices](/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
123
123
- Windows Server 2016 with [Microsoft Defender for Down-Level Devices](/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
124
124
- Windows Server 2019 (with [KB5025229](https://support.microsoft.com/topic/april-11-2023-kb5025229-os-build-17763-4252-e8ead788-2cd3-4c9b-8c77-d677e2d8744f))
125
-
- Windows Server 2022 (with [KB5025230](https://support.microsoft.com/topic/april-11-2023-security-update-kb5025230-5048ddfb-7bf3-4e6c-b29a-7b44b789d282))
125
+
- Windows Server 2022, including Server Core (with [KB5025230](https://support.microsoft.com/topic/april-11-2023-security-update-kb5025230-5048ddfb-7bf3-4e6c-b29a-7b44b789d282))
126
+
- Domain controllers (preview). See important information in [Use of security settings management on domain controllers](#use-of-security-settings-management-on-domain-controllers) (in this article).
126
127
127
128
Security settings management doesn't work on and isn't supported with the following devices:
128
129
130
+
- Windows Server Core 2109 and earlier
129
131
- Non-persistent desktops, like Virtual Desktop Infrastructure (VDI) clients
130
132
- Azure Virtual Desktop (AVD and formerly Windows Virtual Desktop, WVD)
131
-
- Domain Controllers
132
133
- 32-bit versions of Windows
133
134
134
-
> [!IMPORTANT]
135
-
>
136
-
> In some cases, Domain Controllers that run a down level server operating system (2012 R2 or 2016) can unintentionally be managed by Microsoft Defender for Endpoint. In order to ensure that this doesn't happen in your environment, we recommend making sure your domain controllers are neither tagged "MDE-Management" or managed by MDE.
137
-
138
135
### Licensing and subscriptions
139
136
140
137
To use security settings management, you need:
@@ -302,15 +299,15 @@ The following sections guide you through that process.
302
299
303
300
### Configure Microsoft Defender for Endpoint
304
301
305
-
In Microsoft Defender for Endpoint portal, as a security administrator:
302
+
In the Microsoft Defender portal, as a security administrator:
306
303
307
-
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management.
304
+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management.
308
305
309
306
:::image type="content" source="./media/mde-security-integration/enable-mde-settings-management-defender.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Microsoft Defender portal." lightbox="./media/mde-security-integration/enable-mde-settings-management-defender.png#lightbox":::
310
307
311
308
> [!NOTE]
312
309
>
313
-
> If you have the *Manage security settings in Security Center* permission in the Microsoft Defender for Endpoint portal, and are simultaneously enabled to view devices from all Device Groups (no [role-based access control](/microsoft-365/security/defender-endpoint/rbac) limits on your user permissions), you can also perform this action.
310
+
> If you have the *Manage security settings in Security Center* permission in the Microsoft Defender portal, and are simultaneously enabled to view devices from all Device Groups (no [role-based access control](/microsoft-365/security/defender-endpoint/rbac) limits on your user permissions), you can also perform this action.
314
311
315
312
2. Initially, we recommend testing the feature for each platform by selecting the platforms option for **On tagged devices**, and then tagging the devices with the `MDE-Management` tag.
316
313
@@ -332,7 +329,7 @@ In Microsoft Defender for Endpoint portal, as a security administrator:
332
329
333
330
> [!TIP]
334
331
>
335
-
> To ensure your Microsoft Defender for Endpoint portal users have consistent permissions across portals, if not already provided, request that your IT administrator grant them the Microsoft Intune **Endpoint Security Manager**[built-in RBAC role](../fundamentals/role-based-access-control.md).
332
+
> To ensure your Microsoft Defender portal users have consistent permissions across portals, if not already provided, request that your IT administrator grant them the Microsoft Intune **Endpoint Security Manager**[built-in RBAC role](../fundamentals/role-based-access-control.md).
336
333
337
334
### Configure Intune
338
335
@@ -480,9 +477,9 @@ You can manually sync a device on-demand from the [Microsoft Defender portal](ht
480
477
481
478
The Policy sync button only appears for devices that are successfully managed by Microsoft Defender for Endpoint.
482
479
483
-
### Devices protected by Tamper Protection
480
+
### Devices protected by tamper protection
484
481
485
-
If a device has Tamper Protection turned on, it isn't possible to edit the values of [Tamper Protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) without disabling Tamper Protection first.
482
+
If a device has tamper protection turned on, it isn't possible to edit the values of [Tamper-protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) without disabling Tamper Protection first.
486
483
487
484
### Assignment Filters and security settings management
488
485
@@ -518,25 +515,22 @@ The following security settings are pending deprecation. The Defender for Endpoi
518
515
519
516
### Use of security settings management on domain controllers
520
517
521
-
Because a Microsoft Entra ID trust is required, domain controllers aren't currently supported. We're looking at ways to add this support.
522
-
523
-
> [!IMPORTANT]
524
-
>
525
-
> In some cases, Domain Controllers that are run a down level server Operating system (2012 R2 or 2016) can unintentionally be managed by Microsoft Defender for Endpoint. In order to ensure that this doesn't happen in your environment, we recommend making sure your domain controllers are neither tagged "MDE-Management" or managed by MDE.
526
-
527
-
### Server Core installation
518
+
Currently in preview, security settings management is now supported on domain controllers. To manage security settings on domain controllers, you must enable it in the enforcement scope page (go to **Settings** > **Endpoints****Enforcement scope**). Windows Server devices must be enabled before you can enable configuration of domain controllers. Additionally, if the *on tagged devices* option is selected for Windows Servers, configuration of domain controllers is limited to tagged devices, too.
528
519
529
-
Security settings management doesn't support Server core installations due to Server core platform limitations.
520
+
> [!CAUTION]
521
+
> - Misconfiguration of domain controllers could have a negative impact on both your security posture and operational continuity.
522
+
> - If configuration of domain controllers is enabled in your tenant, make sure to review all Windows policies to make sure you're not unintentionally targeting Microsoft Entra device groups that contain domain controllers. To minimize risk to productivity, firewall policies aren't supported on domain controllers.
523
+
> - We recommend reviewing all policies targeted to domain controllers before unenrolling those devices. Make any required configurations first, and then unenroll your domain controllers. Defender for Endpoint configuration is maintained on each device after the device is unenrolled.
530
524
531
525
### PowerShell restrict mode
532
526
533
527
PowerShell needs to be enabled.
534
528
535
529
Security settings management doesn't work for a device that has PowerShell *LanguageMode* configured with *ConstrainedLanguage* mode `enabled`. For more information, see [about_Language_Modes](/powershell/module/microsoft.powershell.core/about/about_language_modes) in the PowerShell documentation.
536
530
537
-
### Managing security through MDE if you were previously using a thirdparty security tool
531
+
### Managing security through Defender for Endpoint if you were previously using a third-party security tool
538
532
539
-
If you previously had a third-party security tool on the machine and are now managing it with MDE, you might see some impact on MDE's capability to manage Security settings in rare cases. In such cases, as a troubleshooting measure, uninstall and reinstall the latest version of MDE on your machine.
533
+
If you previously had a third-party security tool on the machine and are now managing it with Defender for Endpoint, you might see some impact on Defender for Endpoint's capability to manage Security settings in rare cases. In such cases, as a troubleshooting measure, uninstall and reinstall the latest version of Defender for Endpoint on your machine.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/mtd-device-compliance-policy-create.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
2
# required metadata
3
3
4
-
title: Create a Mobile Threat Defense (MTD) device compliance policy with Microsoft Intune
4
+
title: Create Mobile Threat Defense compliance policies in Intune
5
5
titleSuffix: Microsoft Intune
6
6
description: Create an Intune device compliance policy that uses your MTD partner threat levels to determine if a mobile device can access company resources.
7
7
keywords:
8
8
author: brenduns
9
9
ms.author: brenduns
10
10
manager: dougeby
11
-
ms.date: 08/22/2024
11
+
ms.date: 09/30/2024
12
12
ms.topic: how-to
13
13
ms.service: microsoft-intune
14
14
ms.subservice: protect
@@ -94,6 +94,6 @@ Your Mobile Threat Defense partner can send a risk score for each device for whi
94
94
>
95
95
> Conditional Access policies for Microsoft 365 or other services also evaluate device compliance results, which include the threat-level configuration. Any noncompliant device can be blocked from accessing corporate resources until that devices threat-level is remediated to bring the device into compliance with your policies and that status is successfully reported to Intune via the MTD vendor.
96
96
97
-
## Next steps
97
+
## Related content
98
98
99
-
[Enable MTD with Intune](mtd-connector-enable.md)
99
+
[Enable a Mobile Threat Defense connector](mtd-connector-enable.md)
Copy file name to clipboardExpand all lines: memdocs/intune/protect/zimperium-mobile-threat-defense-connector.md
+3-8Lines changed: 3 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: brenduns
9
9
ms.author: brenduns
10
10
manager: dougeby
11
-
ms.date: 11/17/2023
11
+
ms.date: 09/30/2024
12
12
ms.topic: how-to
13
13
ms.service: microsoft-intune
14
14
ms.subservice: protect
@@ -57,7 +57,7 @@ The Zimperium app for Android and iOS/iPadOS captures file system, network stack
57
57
-**Support for enrolled devices** - Intune device compliance policy includes a rule for Mobile Threat Defense (MTD), which can use risk assessment information from Zimperium. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Zimperium app installed in their devices to resolve the issue and regain access to corporate resources. To support using Zimperium with enrolled devices:
58
58
-[Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)
59
59
-[Create a device compliance policy that supports MTD](../protect/mtd-device-compliance-policy-create.md)
60
-
-[Enable the MTD connector in Intune](../protect/mtd-connector-enable.md)
60
+
-[Enable a Mobile Threat Defense connector](../protect/mtd-connector-enable.md)
61
61
62
62
-**Support for unenrolled devices** - Intune can use the risk assessment data from the Zimperium app on unenrolled devices when you use Intune app protection policies. Admins can use this combination to help protect corporate data within a [Microsoft Intune protected app](../apps/apps-supported-intune-apps.md), Admins can also issue a block or selective wipe for corporate data on those unenrolled devices. To support using Zimperium with unenrolled devices:
63
63
-[Add the MTD app to unenrolled devices](../protect/mtd-add-apps-unenrolled-devices.md)
@@ -118,14 +118,9 @@ Access is granted on remediation:
118
118
119
119
:::image type="content" source="./media/zimperium-mobile-threat-defense-connector/zimperium-mobile-app-policy-remediated.png" alt-text="Product flow for App protection policies to grant access after malware is remediated.":::
120
120
121
-
## Next steps
121
+
## Related content
122
122
123
123
-[Integrate Zimperium with Intune](zimperium-mtd-connector-integration.md)
124
-
125
124
-[Set up Zimperium apps](mtd-apps-ios-app-configuration-policy-add-assign.md)
0 commit comments