mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-17 15:57:23 +00:00
Merge branch 'master' into v-gmoor-for-pr-4313
This commit is contained in:
commit
9942f56bbc
@ -21,7 +21,7 @@ ms.localizationpriority: medium
|
|||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
>Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare).
|
> Learn more about what features and functionality are supported in each Windows edition at [Compare Windows 10 Editions](https://www.microsoft.com/WindowsForBusiness/Compare).
|
||||||
|
|
||||||
To help protect your company from attacks which may originate from untrusted or attacker-controlled font files, we’ve created the Blocking Untrusted Fonts feature. Using this feature, you can turn on a global setting that stops your employees from loading untrusted fonts processed using the Graphics Device Interface (GDI) onto your network. Untrusted fonts are any font installed outside of the `%windir%/Fonts` directory. Blocking untrusted fonts helps prevent both remote (web-based or email-based) and local EOP attacks that can happen during the font file-parsing process.
|
To help protect your company from attacks which may originate from untrusted or attacker-controlled font files, we’ve created the Blocking Untrusted Fonts feature. Using this feature, you can turn on a global setting that stops your employees from loading untrusted fonts processed using the Graphics Device Interface (GDI) onto your network. Untrusted fonts are any font installed outside of the `%windir%/Fonts` directory. Blocking untrusted fonts helps prevent both remote (web-based or email-based) and local EOP attacks that can happen during the font file-parsing process.
|
||||||
|
|
||||||
@ -36,7 +36,7 @@ There are 3 ways to use this feature:
|
|||||||
- **Audit.** Turns on event logging, but doesn’t block fonts from loading, regardless of location. The name of the apps that use untrusted fonts appear in your event log.
|
- **Audit.** Turns on event logging, but doesn’t block fonts from loading, regardless of location. The name of the apps that use untrusted fonts appear in your event log.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you aren’t quite ready to deploy this feature into your organization, you can run it in Audit mode to see if not loading untrusted fonts causes any usability or compatibility issues.
|
> If you aren't quite ready to deploy this feature into your organization, you can run it in Audit mode to see if not loading untrusted fonts causes any usability or compatibility issues.
|
||||||
|
|
||||||
- **Exclude apps to load untrusted fonts.** You can exclude specific apps, allowing them to load untrusted fonts, even while this feature is turned on. For instructions, see [Fix apps having problems because of blocked fonts](#fix-apps-having-problems-because-of-blocked-fonts).
|
- **Exclude apps to load untrusted fonts.** You can exclude specific apps, allowing them to load untrusted fonts, even while this feature is turned on. For instructions, see [Fix apps having problems because of blocked fonts](#fix-apps-having-problems-because-of-blocked-fonts).
|
||||||
|
|
||||||
@ -88,8 +88,8 @@ To turn this feature on, off, or to use audit mode:
|
|||||||
|
|
||||||
- **To audit with this feature.** Type **3000000000000**.
|
- **To audit with this feature.** Type **3000000000000**.
|
||||||
|
|
||||||
>[!Important]
|
> [!Important]
|
||||||
>Your existing **MitigationOptions** values should be saved during your update. For example, if the current value is *1000*, your updated value should be *1000000001000*.
|
> Your existing **MitigationOptions** values should be saved during your update. For example, if the current value is *1000*, your updated value should be *1000000001000*.
|
||||||
|
|
||||||
5. Restart your computer.
|
5. Restart your computer.
|
||||||
|
|
||||||
@ -108,8 +108,8 @@ After you turn this feature on, or start using Audit mode, you can look at your
|
|||||||
FontPath:<br>
|
FontPath:<br>
|
||||||
Blocked: true
|
Blocked: true
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>Because the **FontType** is *Memory*, there’s no associated **FontPath**.
|
> Because the **FontType** is *Memory*, there’s no associated **FontPath**.
|
||||||
|
|
||||||
**Event Example 2 - Winlogon**<br>
|
**Event Example 2 - Winlogon**<br>
|
||||||
Winlogon.exe attempted loading a font that is restricted by font-loading policy.<br>
|
Winlogon.exe attempted loading a font that is restricted by font-loading policy.<br>
|
||||||
@ -117,8 +117,8 @@ After you turn this feature on, or start using Audit mode, you can look at your
|
|||||||
FontPath: `\??\C:\PROGRAM FILES (X86)\COMMON FILES\MICROSOFT SHARED\EQUATION\MTEXTRA.TTF`<br>
|
FontPath: `\??\C:\PROGRAM FILES (X86)\COMMON FILES\MICROSOFT SHARED\EQUATION\MTEXTRA.TTF`<br>
|
||||||
Blocked: true
|
Blocked: true
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>Because the **FontType** is *File*, there’s also an associated **FontPath**.
|
> Because the **FontType** is *File*, there’s also an associated **FontPath**.
|
||||||
|
|
||||||
**Event Example 3 - Internet Explorer running in Audit mode**<br>
|
**Event Example 3 - Internet Explorer running in Audit mode**<br>
|
||||||
Iexplore.exe attempted loading a font that is restricted by font-loading policy.<br>
|
Iexplore.exe attempted loading a font that is restricted by font-loading policy.<br>
|
||||||
@ -126,8 +126,8 @@ After you turn this feature on, or start using Audit mode, you can look at your
|
|||||||
FontPath:<br>
|
FontPath:<br>
|
||||||
Blocked: false
|
Blocked: false
|
||||||
|
|
||||||
>[!NOTE]
|
> [!NOTE]
|
||||||
>In Audit mode, the problem is recorded, but the font isn’t blocked.
|
> In Audit mode, the problem is recorded, but the font isn’t blocked.
|
||||||
|
|
||||||
## Fix apps having problems because of blocked fonts
|
## Fix apps having problems because of blocked fonts
|
||||||
Your company may still need apps that are having problems because of blocked fonts, so we suggest that you first run this feature in Audit mode to determine which fonts are causing the problems.
|
Your company may still need apps that are having problems because of blocked fonts, so we suggest that you first run this feature in Audit mode to determine which fonts are causing the problems.
|
||||||
@ -147,10 +147,4 @@ After you figure out the problematic fonts, you can try to fix your apps in 2 wa
|
|||||||
|
|
||||||
## Related content
|
## Related content
|
||||||
|
|
||||||
- [Dropping the “Untrusted Font Blocking” setting](https://blogs.technet.microsoft.com/secguide/2017/06/15/dropping-the-untrusted-font-blocking-setting/)
|
- [Dropping the “Untrusted Font Blocking” setting](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/dropping-the-quot-untrusted-font-blocking-quot-setting/ba-p/701068/)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 102 KiB |
Binary file not shown.
After Width: | Height: | Size: 97 KiB |
Binary file not shown.
After Width: | Height: | Size: 107 KiB |
@ -43,7 +43,7 @@ It's important to understand the following requirements prior to creating indica
|
|||||||
- The Antimalware client version must be 4.18.1901.x or later.
|
- The Antimalware client version must be 4.18.1901.x or later.
|
||||||
- Supported on machines on Windows 10, version 1703 or later, Windows server 2016 and 2019.
|
- Supported on machines on Windows 10, version 1703 or later, Windows server 2016 and 2019.
|
||||||
- The virus and threat protection definitions must be up-to-date.
|
- The virus and threat protection definitions must be up-to-date.
|
||||||
- This feature currently supports entering .CER or .PEM file extensions.
|
- This feature currently supports entering .CER or .PEM (Base64 ASCII) encoding based certificates.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
> - A valid leaf certificate is a signing certificate that has a valid certification path and must be chained to the Root Certificate Authority (CA) trusted by Microsoft. Alternatively, a custom (self-signed) certificate can be used as long as it's trusted by the client (Root CA certificate is installed under the Local Machine 'Trusted Root Certification Authorities').
|
> - A valid leaf certificate is a signing certificate that has a valid certification path and must be chained to the Root Certificate Authority (CA) trusted by Microsoft. Alternatively, a custom (self-signed) certificate can be used as long as it's trusted by the client (Root CA certificate is installed under the Local Machine 'Trusted Root Certification Authorities').
|
||||||
|
@ -27,6 +27,42 @@ ms.topic: conceptual
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Defender for Endpoint for iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
|
> Defender for Endpoint for iOS would use a VPN in order to provide the Web Protection feature. This is not a regular VPN and is a local/self-looping VPN that does not take traffic outside the device.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> **PUBLIC PREVIEW EDITION**
|
||||||
|
>
|
||||||
|
> This documentation is for a pre-release solution. The guidelines and the solution are subject to change between now and its general availability.
|
||||||
|
>
|
||||||
|
> As with any pre-release solution, remember to exercise caution when determining the target population for your deployments.
|
||||||
|
|
||||||
|
|
||||||
|
## Configure compliance policy against jailbroken devices
|
||||||
|
|
||||||
|
To protect corporate data from being accessed on jailbroken iOS devices, we recommend that you setup the following compliance policy on Intune.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Currently Defender for Endpoint for iOS does not provide protection against jailbreak scenarios. Some data like your corporate email id and corporate profile picture (if available) will be exposed to the attacker on the jailbroken device.
|
||||||
|
|
||||||
|
Follow the steps below to create a compliance policy against jailbroken devices.
|
||||||
|
|
||||||
|
1. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** -> **Compliance policies** -> click on **Create Policy**. Select "iOS/iPadOS" as platform and click **Create**.
|
||||||
|
|
||||||
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
|
1. Specify a name of the policy, example "Compliance Policy for Jailbreak".
|
||||||
|
1. In the compliance settings page, click to expand **Device Health** section and click **Block** for **Jailbroken devices** field.
|
||||||
|
|
||||||
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
|
1. In the *Action for noncompliance* section, select the actions as per your requirements and click **Next**.
|
||||||
|
|
||||||
|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
|
1. In the *Assignments* section, select the user groups that you want to include for this policy and then click **Next**.
|
||||||
|
1. In the **Review+Create** section, verify that all the information entered is correct and then select **Create**.
|
||||||
|
|
||||||
## Configure custom indicators
|
## Configure custom indicators
|
||||||
|
|
||||||
Defender for Endpoint for iOS enables admins to configure custom indicators on iOS devices as well. Refer to [Manage indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators) on how to configure custom indicators.
|
Defender for Endpoint for iOS enables admins to configure custom indicators on iOS devices as well. Refer to [Manage indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators) on how to configure custom indicators.
|
||||||
@ -37,4 +73,3 @@ Defender for Endpoint for iOS enables admins to configure custom indicators on i
|
|||||||
## Web Protection
|
## Web Protection
|
||||||
|
|
||||||
By default, Defender for Endpoint for iOS includes and enables the web protection feature. [Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks.
|
By default, Defender for Endpoint for iOS includes and enables the web protection feature. [Web protection](web-protection-overview.md) helps to secure devices against web threats and protect users from phishing attacks.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Intune-based deployment for Microsoft Defender ATP for Mac
|
title: Intune-based deployment for Microsoft Defender ATP for Mac
|
||||||
description: Install Microsoft Defender ATP for Mac, using Microsoft Intune.
|
description: Install Microsoft Defender for Endpoint for Mac, using Microsoft Intune.
|
||||||
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, catalina, mojave, high sierra
|
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, catalina, mojave, high sierra
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
search.appverid: met150
|
search.appverid: met150
|
||||||
@ -42,7 +42,7 @@ This topic describes how to deploy Microsoft Defender for Endpoint for Mac throu
|
|||||||
|
|
||||||
## Prerequisites and system requirements
|
## Prerequisites and system requirements
|
||||||
|
|
||||||
Before you get started, see [the main MIcrosoft Defender for EndpointP for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version.
|
Before you get started, see [the main Microsoft Defender for Endpoint for Mac page](microsoft-defender-atp-mac.md) for a description of prerequisites and system requirements for the current software version.
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@ ms.collection:
|
|||||||
- M365-security-compliance
|
- M365-security-compliance
|
||||||
- m365solution-symantecmigrate
|
- m365solution-symantecmigrate
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.date: 09/24/2020
|
ms.date: 11/30/2020
|
||||||
ms.custom: migrationguides
|
ms.custom: migrationguides
|
||||||
ms.reviewer: depicker, yongrhee, chriggs
|
ms.reviewer: depicker, yongrhee, chriggs
|
||||||
---
|
---
|
||||||
@ -68,6 +68,12 @@ Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll
|
|||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` <br/>
|
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` <br/>
|
||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` <br/>
|
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` <br/>
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required.
|
||||||
|
> Example:<br/>
|
||||||
|
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`<br/>
|
||||||
|
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`<br/>
|
||||||
|
|
||||||
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet: <br/>
|
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet: <br/>
|
||||||
`Get-Service -Name windefend`
|
`Get-Service -Name windefend`
|
||||||
|
|
||||||
|
@ -67,12 +67,12 @@ When submitting Microsoft Defender SmartScreen products, make sure to select **M
|
|||||||
## Viewing Microsoft Defender SmartScreen anti-phishing events
|
## Viewing Microsoft Defender SmartScreen anti-phishing events
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> No Smartscreen events will be logged when using Microsoft Edge version 77 or later.
|
> No SmartScreen events will be logged when using Microsoft Edge version 77 or later.
|
||||||
|
|
||||||
When Microsoft Defender SmartScreen warns or blocks a user from a website, it's logged as [Event 1035 - Anti-Phishing](https://technet.microsoft.com/scriptcenter/dd565657(v=msdn.10).aspx).
|
When Microsoft Defender SmartScreen warns or blocks a user from a website, it's logged as [Event 1035 - Anti-Phishing](https://docs.microsoft.com/previous-versions/windows/internet-explorer/ie-developer/compatibility/dd565657(v=vs.85)).
|
||||||
|
|
||||||
## Viewing Windows event logs for Microsoft Defender SmartScreen
|
## Viewing Windows event logs for Microsoft Defender SmartScreen
|
||||||
Microsoft Defender SmartScreen events appear in the Microsoft-Windows-SmartScreen/Debug login Event Viewer.
|
Microsoft Defender SmartScreen events appear in the Microsoft-Windows-SmartScreen/Debug log, in the Event Viewer.
|
||||||
|
|
||||||
Windows event log for SmartScreen is disabled by default, users can use Event Viewer UI to enable the log or use the command line to enable it:
|
Windows event log for SmartScreen is disabled by default, users can use Event Viewer UI to enable the log or use the command line to enable it:
|
||||||
|
|
||||||
|
@ -30,7 +30,7 @@ The **Passwords must meet complexity requirements** policy setting determines wh
|
|||||||
1. Passwords may not contain the user's samAccountName (Account Name) value or entire displayName (Full Name value). Both checks are not case sensitive.
|
1. Passwords may not contain the user's samAccountName (Account Name) value or entire displayName (Full Name value). Both checks are not case sensitive.
|
||||||
|
|
||||||
The samAccountName is checked in its entirety only to determine whether it is part of the password. If the samAccountName is fewer than three characters long, this check is skipped.
|
The samAccountName is checked in its entirety only to determine whether it is part of the password. If the samAccountName is fewer than three characters long, this check is skipped.
|
||||||
The displayName is parsed for delimiters: commas, periods, dashes or hyphens, underscores, spaces, pound signs, and tabs. If any of these delimiters are found, the displayName is split and all parsed sections (tokens) are confirmed not to be included in the password. Tokens that are shorter than three characters are ignored, and substrings of the tokens are not checked. For example, the name "Erin M. Hagens" is split into three tokens: "Erin", "M", and "Havens". Because the second token is only one character long, it is ignored. Therefore, this user could not have a password that included either "grin" or "hagens" as a substring anywhere in the password.
|
The displayName is parsed for delimiters: commas, periods, dashes or hyphens, underscores, spaces, pound signs, and tabs. If any of these delimiters are found, the displayName is split and all parsed sections (tokens) are confirmed not to be included in the password. Tokens that are shorter than three characters are ignored, and substrings of the tokens are not checked. For example, the name "Erin M. Hagens" is split into three tokens: "Erin", "M", and "Havens". Because the second token is only one character long, it is ignored. Therefore, this user could not have a password that included either "erin" or "havens" as a substring anywhere in the password.
|
||||||
|
|
||||||
2. The password contains characters from three of the following categories:
|
2. The password contains characters from three of the following categories:
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user