Skip to content

Commit 995f7a2

Browse files
authored
Merge pull request #16237 from MicrosoftDocs/main
Published main to live, Monday 10:30 AM PST, 09/30
2 parents bdebd0c + b81d486 commit 995f7a2

File tree

3 files changed

+26
-37
lines changed

3 files changed

+26
-37
lines changed

memdocs/intune/protect/mde-security-integration.md

Lines changed: 19 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 09/24/2024
10+
ms.date: 09/30/2024
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -97,7 +97,7 @@ To confirm the version of the Defender agent, in the Defender portal go to the d
9797

9898
*Known issue*: With the Defender agent version **101.23052.0009**, Linux devices fail to enroll when they're missing the following filepath: `/sys/class/dmi/id/board_vendor`.
9999

100-
*Known issue*: When a Linux device performs synthetic registration the Device Entra ID (formerly known as Device AAD ID) will not be visible in the Defender portal. This information can be viewed from the Intune or Entra portals. Administrators will still be able to manage devices with policies in this manner.
100+
*Known issue*: When a Linux device performs synthetic registration, the Device Entra ID (formerly known as Device AAD ID) isn't visible in the Defender portal. This information can be viewed from the Intune or Microsoft Entra portals. Administrators can still manage devices with policies in this manner.
101101

102102

103103
**macOS**:
@@ -113,7 +113,7 @@ To confirm the version of the Defender agent, in the Defender portal go to the d
113113

114114
*Known issue*: With the Defender agent version **101.23052.0004**, macOS devices that are registered in Microsoft Entra ID before enrolling with security settings management receive a duplicate Device ID in Microsoft Entra ID, which is a synthetic registration. When you create a Microsoft Entra group for targeting policy, you must use the synthetic Device ID created by security settings management. In Microsoft Entra ID, the *Join Type* column for the synthetic Device ID is blank.
115115

116-
*Known issue*: When a macOS device performs synthetic registration the Device Entra ID (formerly known as Device AAD ID) will not be visible in the Defender portal. This information can be viewed from the Intune or Entra portals. Administrators will still be able to manage devices with policies in this manner.
116+
*Known issue*: When a macOS device performs synthetic registration, the Device Entra ID (formerly known as Device AAD ID) isn't visible in the Defender portal. This information can be viewed from the Intune or Microsoft Entra portals. Administrators can still manage devices with policies in this manner.
117117

118118
**Windows**:
119119

@@ -122,19 +122,16 @@ To confirm the version of the Defender agent, in the Defender portal go to the d
122122
- Windows Server 2012 R2 with [Microsoft Defender for Down-Level Devices](/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
123123
- Windows Server 2016 with [Microsoft Defender for Down-Level Devices](/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview)
124124
- Windows Server 2019 (with [KB5025229](https://support.microsoft.com/topic/april-11-2023-kb5025229-os-build-17763-4252-e8ead788-2cd3-4c9b-8c77-d677e2d8744f))
125-
- Windows Server 2022 (with [KB5025230](https://support.microsoft.com/topic/april-11-2023-security-update-kb5025230-5048ddfb-7bf3-4e6c-b29a-7b44b789d282))
125+
- Windows Server 2022, including Server Core (with [KB5025230](https://support.microsoft.com/topic/april-11-2023-security-update-kb5025230-5048ddfb-7bf3-4e6c-b29a-7b44b789d282))
126+
- Domain controllers (preview). See important information in [Use of security settings management on domain controllers](#use-of-security-settings-management-on-domain-controllers) (in this article).
126127

127128
Security settings management doesn't work on and isn't supported with the following devices:
128129

130+
- Windows Server Core 2109 and earlier
129131
- Non-persistent desktops, like Virtual Desktop Infrastructure (VDI) clients
130132
- Azure Virtual Desktop (AVD and formerly Windows Virtual Desktop, WVD)
131-
- Domain Controllers
132133
- 32-bit versions of Windows
133134

134-
> [!IMPORTANT]
135-
>
136-
> In some cases, Domain Controllers that run a down level server operating system (2012 R2 or 2016) can unintentionally be managed by Microsoft Defender for Endpoint. In order to ensure that this doesn't happen in your environment, we recommend making sure your domain controllers are neither tagged "MDE-Management" or managed by MDE.
137-
138135
### Licensing and subscriptions
139136

140137
To use security settings management, you need:
@@ -302,15 +299,15 @@ The following sections guide you through that process.
302299

303300
### Configure Microsoft Defender for Endpoint
304301

305-
In Microsoft Defender for Endpoint portal, as a security administrator:
302+
In the Microsoft Defender portal, as a security administrator:
306303

307-
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management.
304+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) and go to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope** and enable the platforms for security settings management.
308305

309306
:::image type="content" source="./media/mde-security-integration/enable-mde-settings-management-defender.png" alt-text="Enable Microsoft Defender for Endpoint settings management in the Microsoft Defender portal." lightbox="./media/mde-security-integration/enable-mde-settings-management-defender.png#lightbox":::
310307

311308
> [!NOTE]
312309
>
313-
> If you have the *Manage security settings in Security Center* permission in the Microsoft Defender for Endpoint portal, and are simultaneously enabled to view devices from all Device Groups (no [role-based access control](/microsoft-365/security/defender-endpoint/rbac) limits on your user permissions), you can also perform this action.
310+
> If you have the *Manage security settings in Security Center* permission in the Microsoft Defender portal, and are simultaneously enabled to view devices from all Device Groups (no [role-based access control](/microsoft-365/security/defender-endpoint/rbac) limits on your user permissions), you can also perform this action.
314311
315312
2. Initially, we recommend testing the feature for each platform by selecting the platforms option for **On tagged devices**, and then tagging the devices with the `MDE-Management` tag.
316313

@@ -332,7 +329,7 @@ In Microsoft Defender for Endpoint portal, as a security administrator:
332329

333330
> [!TIP]
334331
>
335-
> To ensure your Microsoft Defender for Endpoint portal users have consistent permissions across portals, if not already provided, request that your IT administrator grant them the Microsoft Intune **Endpoint Security Manager** [built-in RBAC role](../fundamentals/role-based-access-control.md).
332+
> To ensure your Microsoft Defender portal users have consistent permissions across portals, if not already provided, request that your IT administrator grant them the Microsoft Intune **Endpoint Security Manager** [built-in RBAC role](../fundamentals/role-based-access-control.md).
336333
337334
### Configure Intune
338335

@@ -480,9 +477,9 @@ You can manually sync a device on-demand from the [Microsoft Defender portal](ht
480477

481478
The Policy sync button only appears for devices that are successfully managed by Microsoft Defender for Endpoint.
482479

483-
### Devices protected by Tamper Protection
480+
### Devices protected by tamper protection
484481

485-
If a device has Tamper Protection turned on, it isn't possible to edit the values of [Tamper Protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) without disabling Tamper Protection first.
482+
If a device has tamper protection turned on, it isn't possible to edit the values of [Tamper-protected settings](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection#what-happens-when-tamper-protection-is-turned-on) without disabling Tamper Protection first.
486483

487484
### Assignment Filters and security settings management
488485

@@ -518,25 +515,22 @@ The following security settings are pending deprecation. The Defender for Endpoi
518515

519516
### Use of security settings management on domain controllers
520517

521-
Because a Microsoft Entra ID trust is required, domain controllers aren't currently supported. We're looking at ways to add this support.
522-
523-
> [!IMPORTANT]
524-
>
525-
> In some cases, Domain Controllers that are run a down level server Operating system (2012 R2 or 2016) can unintentionally be managed by Microsoft Defender for Endpoint. In order to ensure that this doesn't happen in your environment, we recommend making sure your domain controllers are neither tagged "MDE-Management" or managed by MDE.
526-
527-
### Server Core installation
518+
Currently in preview, security settings management is now supported on domain controllers. To manage security settings on domain controllers, you must enable it in the enforcement scope page (go to **Settings** > **Endpoints** **Enforcement scope**). Windows Server devices must be enabled before you can enable configuration of domain controllers. Additionally, if the *on tagged devices* option is selected for Windows Servers, configuration of domain controllers is limited to tagged devices, too.
528519

529-
Security settings management doesn't support Server core installations due to Server core platform limitations.
520+
> [!CAUTION]
521+
> - Misconfiguration of domain controllers could have a negative impact on both your security posture and operational continuity.
522+
> - If configuration of domain controllers is enabled in your tenant, make sure to review all Windows policies to make sure you're not unintentionally targeting Microsoft Entra device groups that contain domain controllers. To minimize risk to productivity, firewall policies aren't supported on domain controllers.
523+
> - We recommend reviewing all policies targeted to domain controllers before unenrolling those devices. Make any required configurations first, and then unenroll your domain controllers. Defender for Endpoint configuration is maintained on each device after the device is unenrolled.
530524
531525
### PowerShell restrict mode
532526

533527
PowerShell needs to be enabled.
534528

535529
Security settings management doesn't work for a device that has PowerShell *LanguageMode* configured with *ConstrainedLanguage* mode `enabled`. For more information, see [about_Language_Modes](/powershell/module/microsoft.powershell.core/about/about_language_modes) in the PowerShell documentation.
536530

537-
### Managing security through MDE if you were previously using a third party security tool
531+
### Managing security through Defender for Endpoint if you were previously using a third-party security tool
538532

539-
If you previously had a third-party security tool on the machine and are now managing it with MDE, you might see some impact on MDE's capability to manage Security settings in rare cases. In such cases, as a troubleshooting measure, uninstall and reinstall the latest version of MDE on your machine.
533+
If you previously had a third-party security tool on the machine and are now managing it with Defender for Endpoint, you might see some impact on Defender for Endpoint's capability to manage Security settings in rare cases. In such cases, as a troubleshooting measure, uninstall and reinstall the latest version of Defender for Endpoint on your machine.
540534

541535
## Next steps
542536

memdocs/intune/protect/mtd-device-compliance-policy-create.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Create a Mobile Threat Defense (MTD) device compliance policy with Microsoft Intune
4+
title: Create Mobile Threat Defense compliance policies in Intune
55
titleSuffix: Microsoft Intune
66
description: Create an Intune device compliance policy that uses your MTD partner threat levels to determine if a mobile device can access company resources.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 08/22/2024
11+
ms.date: 09/30/2024
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -94,6 +94,6 @@ Your Mobile Threat Defense partner can send a risk score for each device for whi
9494
>
9595
> Conditional Access policies for Microsoft 365 or other services also evaluate device compliance results, which include the threat-level configuration. Any noncompliant device can be blocked from accessing corporate resources until that devices threat-level is remediated to bring the device into compliance with your policies and that status is successfully reported to Intune via the MTD vendor.
9696
97-
## Next steps
97+
## Related content
9898

99-
[Enable MTD with Intune](mtd-connector-enable.md)
99+
[Enable a Mobile Threat Defense connector](mtd-connector-enable.md)

memdocs/intune/protect/zimperium-mobile-threat-defense-connector.md

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 11/17/2023
11+
ms.date: 09/30/2024
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -57,7 +57,7 @@ The Zimperium app for Android and iOS/iPadOS captures file system, network stack
5757
- **Support for enrolled devices** - Intune device compliance policy includes a rule for Mobile Threat Defense (MTD), which can use risk assessment information from Zimperium. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Zimperium app installed in their devices to resolve the issue and regain access to corporate resources. To support using Zimperium with enrolled devices:
5858
- [Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)
5959
- [Create a device compliance policy that supports MTD](../protect/mtd-device-compliance-policy-create.md)
60-
- [Enable the MTD connector in Intune](../protect/mtd-connector-enable.md)
60+
- [Enable a Mobile Threat Defense connector](../protect/mtd-connector-enable.md)
6161

6262
- **Support for unenrolled devices** - Intune can use the risk assessment data from the Zimperium app on unenrolled devices when you use Intune app protection policies. Admins can use this combination to help protect corporate data within a [Microsoft Intune protected app](../apps/apps-supported-intune-apps.md), Admins can also issue a block or selective wipe for corporate data on those unenrolled devices. To support using Zimperium with unenrolled devices:
6363
- [Add the MTD app to unenrolled devices](../protect/mtd-add-apps-unenrolled-devices.md)
@@ -118,14 +118,9 @@ Access is granted on remediation:
118118

119119
:::image type="content" source="./media/zimperium-mobile-threat-defense-connector/zimperium-mobile-app-policy-remediated.png" alt-text="Product flow for App protection policies to grant access after malware is remediated.":::
120120

121-
## Next steps
121+
## Related content
122122

123123
- [Integrate Zimperium with Intune](zimperium-mtd-connector-integration.md)
124-
125124
- [Set up Zimperium apps](mtd-apps-ios-app-configuration-policy-add-assign.md)
126-
127125
- [Create Zimperium device compliance policy](mtd-device-compliance-policy-create.md)
128-
129-
- [Enable Zimperium MTD connector](mtd-connector-enable.md)
130-
131126
- [Create an MTD app protection policy](../protect/mtd-app-protection-policy.md)

0 commit comments

Comments
 (0)