mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
commit
a02ac0982f
@ -32,7 +32,9 @@ ms.technology: mde
|
||||
|
||||
When onboarding a device, you might see sign in issues after the app is installed.
|
||||
|
||||
This article provides solutions to help address sign in issues.
|
||||
During onboarding, you might encounter sign in issues after the app is installed on your device.
|
||||
|
||||
This article provides solutions to help address the sign-on issues.
|
||||
|
||||
## Sign in failed - unexpected error
|
||||
**Sign in failed:** *Unexpected error, try later*
|
||||
@ -64,8 +66,7 @@ from Google Play Store and try again
|
||||
|
||||
**Cause:**
|
||||
|
||||
You do not have Microsoft 365 license assigned, or your organization does not
|
||||
have a license for Microsoft 365 Enterprise subscription.
|
||||
You do not have Microsoft 365 license assigned, or your organization does not have a license for Microsoft 365 Enterprise subscription.
|
||||
|
||||
**Solution:**
|
||||
|
||||
|
@ -21,12 +21,16 @@ ms.technology: mde
|
||||
|
||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||
|
||||
|
||||
* The error codes listed in the following table may be returned by an operation on any of Microsoft Defender for Endpoint APIs.
|
||||
* In addition to the error code, every error response contains an error message, which can help resolve the problem.
|
||||
* The message is a free text that can be changed.
|
||||
* At the bottom of the page, you can find response examples.
|
||||
|
||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
|
||||
|
||||
* The table below shows the error codes that may be returned by an operation from the Microsoft Defender for Endpoint APIs.
|
||||
* In addition to the error code, every error response contains an error message that can help describe the problem.
|
||||
* Note that the message is a free text that can be changed.
|
||||
* At the bottom of the page, you can find response examples.
|
||||
|
||||
|
||||
|
||||
Error code |HTTP status code |Message
|
||||
:---|:---|:---
|
||||
|
@ -28,7 +28,7 @@ ms.technology: mde
|
||||
|
||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
|
||||
|
||||
You can configure attack surface reduction with a number of tools, including:
|
||||
You can configure attack surface reduction with many tools, including:
|
||||
|
||||
* Microsoft Intune
|
||||
* Microsoft Endpoint Configuration Manager
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Get domain related alerts API
|
||||
title: Get domain-related alerts API
|
||||
description: Learn how to use the Get domain related alerts API to retrieve alerts related to a given domain address in Microsoft Defender for Endpoint.
|
||||
keywords: apis, graph api, supported apis, get, domain, related, alerts
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -17,7 +17,7 @@ ms.topic: article
|
||||
ms.technology: mde
|
||||
---
|
||||
|
||||
# Get domain related alerts API
|
||||
# Get domain-related alerts API
|
||||
|
||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Get file related alerts API
|
||||
description: Learn how to use the Get file related alerts API to get a collection of alerts related to a given file hash in Microsoft Defender for Endpoint.
|
||||
title: Get file-related alerts API
|
||||
description: Learn how to use the Get file-related alerts API to get a collection of alerts related to a given file hash in Microsoft Defender for Endpoint.
|
||||
keywords: apis, graph api, supported apis, get, file, hash
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
@ -17,7 +17,7 @@ ms.topic: article
|
||||
ms.technology: mde
|
||||
---
|
||||
|
||||
# Get file related alerts API
|
||||
# Get file-related alerts API
|
||||
|
||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||
|
||||
@ -71,7 +71,7 @@ Authorization | String | Bearer {token}. **Required**.
|
||||
Empty
|
||||
|
||||
## Response
|
||||
If successful and file exists - 200 OK with list of [alert](alerts.md) entities in the body. If file do not exist - 404 Not Found.
|
||||
If successful and file exists - 200 OK with list of [alert](alerts.md) entities in the body. If file does not exist - 404 Not Found.
|
||||
|
||||
|
||||
## Example
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Get file related machines API
|
||||
description: Learn how to use the Get file related machines API to get a collection of machines related to a file hash in Microsoft Defender for Endpoint.
|
||||
title: Get file-related machines API
|
||||
description: Learn how to use the Get file-related machines API to get a collection of machines related to a file hash in Microsoft Defender for Endpoint.
|
||||
keywords: apis, graph api, supported apis, get, devices, hash
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.prod: m365-security
|
||||
@ -17,7 +17,7 @@ ms.topic: article
|
||||
ms.technology: mde
|
||||
---
|
||||
|
||||
# Get file related machines API
|
||||
# Get file-related machines API
|
||||
|
||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||
|
||||
@ -71,7 +71,7 @@ Authorization | String | Bearer {token}. **Required**.
|
||||
Empty
|
||||
|
||||
## Response
|
||||
If successful and file exists - 200 OK with list of [machine](machine.md) entities in the body. If file do not exist - 404 Not Found.
|
||||
If successful and file exists - 200 OK with list of [machine](machine.md) entities in the body. If file does not exist - 404 Not Found.
|
||||
|
||||
|
||||
## Example
|
||||
|
@ -30,7 +30,7 @@ ms.technology: mde
|
||||
## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER FOR ENDPOINT
|
||||
|
||||
These license terms ("Terms") are an agreement between Microsoft Corporation (or
|
||||
based on where you live, one of its affiliates) and you. Please read them. They
|
||||
based on where you live, one of its affiliates) and you. They
|
||||
apply to the application named above. These Terms also apply to any Microsoft
|
||||
|
||||
- updates,
|
||||
@ -52,21 +52,21 @@ DO NOT USE THE APPLICATION.**
|
||||
1. **INSTALLATION AND USE RIGHTS.**
|
||||
|
||||
1. **Installation and Use.** You may install and use any number of copies
|
||||
of this application on iOS enabled device or devices which you own
|
||||
of this application on iOS enabled device or devices that you own
|
||||
or control. You may use this application with your company's valid
|
||||
subscription of Defender for Endpoint or
|
||||
an online service that includes MDATP functionalities.
|
||||
an online service that includes Microsoft Defender for Endpoint functionalities.
|
||||
|
||||
2. **Updates.** Updates or upgrades to MDATP may be required for full
|
||||
2. **Updates.** Updates or upgrades to Microsoft Defender for Endpoint may be required for full
|
||||
functionality. Some functionality may not be available in all countries.
|
||||
|
||||
3. **Third Party Programs.** The application may include third party
|
||||
3. **Third-Party Programs.** The application may include third-party
|
||||
programs that Microsoft, not the third party, licenses to you under this
|
||||
agreement. Notices, if any, for the third-party program are included for
|
||||
your information only.
|
||||
|
||||
2. **INTERNET ACCESS MAY BE REQUIRED.** You may incur charges related to
|
||||
Internet access, data transfer and other services per the terms of the data
|
||||
Internet access, data transfer, and other services per the terms of the data
|
||||
service plan and any other agreement you have with your network operator due
|
||||
to use of the application. You are solely responsible for any network
|
||||
operator charges.
|
||||
@ -79,8 +79,7 @@ DO NOT USE THE APPLICATION.**
|
||||
operates as your consent to the transmission of standard device
|
||||
information (including but not limited to technical information about
|
||||
your device, system and application software, and peripherals) for
|
||||
Internet-based or wireless services. If other terms are provided in
|
||||
connection with your use of the services, those terms also apply.
|
||||
Internet-based or wireless services. If other terms are provided with your use of the services, those terms also apply.
|
||||
|
||||
- Data. Some online services require, or may be enhanced by, the
|
||||
installation of local software like this one. At your, or your
|
||||
@ -92,21 +91,20 @@ DO NOT USE THE APPLICATION.**
|
||||
improve Microsoft products and services and enhance your experience.
|
||||
You may limit or control collection of some usage and performance
|
||||
data through your device settings. Doing so may disrupt your use of
|
||||
certain features of the application. For additional information on
|
||||
Microsoft's data collection and use, see the [Online Services
|
||||
certain features of the application. For more information on Microsoft's data collection and use, see the [Online Services
|
||||
Terms](https://go.microsoft.com/fwlink/?linkid=2106777).
|
||||
|
||||
2. Misuse of Internet-based Services. You may not use any Internet-based
|
||||
service in any way that could harm it or impair anyone else's use of it
|
||||
or the wireless network. You may not use the service to try to gain
|
||||
unauthorized access to any service, data, account or network by any
|
||||
unauthorized access to any service, data, account, or network by any
|
||||
means.
|
||||
|
||||
4. **FEEDBACK.** If you give feedback about the application to Microsoft, you
|
||||
give to Microsoft, without charge, the right to use, share and commercialize
|
||||
give to Microsoft, without charge, the right to use, share, and commercialize
|
||||
your feedback in any way and for any purpose. You also give to third
|
||||
parties, without charge, any patent rights needed for their products,
|
||||
technologies and services to use or interface with any specific parts of a
|
||||
technologies, and services to use or interface with any specific parts of a
|
||||
Microsoft software or service that includes the feedback. You will not give
|
||||
feedback that is subject to a license that requires Microsoft to license its
|
||||
software or documentation to third parties because we include your feedback
|
||||
@ -130,16 +128,14 @@ DO NOT USE THE APPLICATION.**
|
||||
|
||||
- publish the application for others to copy;
|
||||
|
||||
- rent, lease or lend the application; or
|
||||
- rent, lease, or lend the application; or
|
||||
|
||||
- transfer the application or this agreement to any third party.
|
||||
|
||||
6. **EXPORT RESTRICTIONS.** The application is subject to United States export
|
||||
laws and regulations. You must comply with all domestic and international
|
||||
export laws and regulations that apply to the application. These laws
|
||||
include restrictions on destinations, end users and end use. For additional
|
||||
information,
|
||||
see [www.microsoft.com/exporting](https://www.microsoft.com/exporting).
|
||||
include restrictions on destinations, end users and end use. For more information, see [www.microsoft.com/exporting](https://www.microsoft.com/exporting).
|
||||
|
||||
7. **SUPPORT SERVICES.** Because this application is "as is," we may not
|
||||
provide support services for it. If you have any issues or questions about
|
||||
@ -151,14 +147,13 @@ DO NOT USE THE APPLICATION.**
|
||||
|
||||
8. **APPLICATION STORE.**
|
||||
|
||||
1. If you obtain the application through an application store (e.g., App
|
||||
Store), please review the applicable application store terms to ensure
|
||||
1. If you obtain the application through an application store (for example, App
|
||||
Store), review the applicable application store terms to ensure
|
||||
your download and use of the application complies with such terms.
|
||||
Please note that these Terms are between you and Microsoft and not with
|
||||
These terms are between you and Microsoft and not with
|
||||
the application store.
|
||||
|
||||
2. The respective application store provider and its subsidiaries are third
|
||||
party beneficiaries of these Terms, and upon your acceptance of these
|
||||
2. The respective application store provider and its subsidiaries are third-party beneficiaries of these Terms, and upon your acceptance of these
|
||||
Terms, the application store provider(s) will have the right to directly
|
||||
enforce and rely upon any provision of these Terms that grants them a
|
||||
benefit or rights.
|
||||
@ -213,20 +208,20 @@ DO NOT USE THE APPLICATION.**
|
||||
This limitation applies to:
|
||||
|
||||
- anything related to the application, services, content (including code) on
|
||||
third party Internet sites, or third party programs; and
|
||||
third-party Internet sites, or third-party programs; and
|
||||
|
||||
- claims for breach of contract, warranty, guarantee or condition; consumer
|
||||
- claims for breach of contract, warranty, guarantee, or condition; consumer
|
||||
protection; deception; unfair competition; strict liability, negligence,
|
||||
misrepresentation, omission, trespass or other tort; violation of statute or
|
||||
misrepresentation, omission, trespass, or other tort; violation of statute or
|
||||
regulation; or unjust enrichment; all to the extent permitted by applicable
|
||||
law.
|
||||
|
||||
It also applies even if:
|
||||
|
||||
a. Repair, replacement or refund for the application does not fully compensate
|
||||
a. Repair, replacement, or refund for the application does not fully compensate
|
||||
you for any losses; or
|
||||
|
||||
b. Covered Parties knew or should have known about the possibility of the
|
||||
damages.
|
||||
|
||||
The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages.
|
||||
The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential, or other damages.
|
||||
|
@ -101,13 +101,15 @@ Logo |Partner name | Description
|
||||
:---|:---|:---
|
||||
| [Bitdefender](https://go.microsoft.com/fwlink/?linkid=860032)| Bitdefender GravityZone is a layered next generation endpoint protection platform offering comprehensive protection against the full spectrum of sophisticated cyber threats
|
||||
 | [Better Mobile](https://go.microsoft.com/fwlink/?linkid=2086214)| AI-based MTD solution to stop mobile threats & phishing. Private internet browsing to protect user privacy
|
||||
| [Corrata](https://go.microsoft.com/fwlink/?linkid=2081148) | Mobile solution that protects your mobile devices with granular visibility and control from Corrata
|
||||
| [Corrata](https://go.microsoft.com/fwlink/?linkid=2081148) | Mobile solution — Protect your mobile devices with granular visibility and control from Corrata
|
||||
| [Lookout](https://go.microsoft.com/fwlink/?linkid=866935)| Get Lookout Mobile Threat Protection telemetry for Android and iOS mobile devices
|
||||
 | [Symantec Endpoint Protection Mobile](https://go.microsoft.com/fwlink/?linkid=2090992)| SEP Mobile helps businesses predict, detect, and prevent security threats and vulnerabilities on mobile devices
|
||||
| [Zimperium](https://go.microsoft.com/fwlink/?linkid=2118044)|Extend your Defender for Endpoint to iOS and Android with Machine Learning-based Mobile Threat Defense
|
||||
|
||||
|
||||
## More integrations
|
||||
|
||||
## Other integrations
|
||||
|
||||
Logo |Partner name | Description
|
||||
:---|:---|:---
|
||||
| [Cyren Web Filter](https://go.microsoft.com/fwlink/?linkid=2108221)| Enhance your Defender for Endpoint with advanced Web Filtering
|
||||
@ -120,25 +122,29 @@ Logo |Partner name | Description
|
||||
## SIEM integration
|
||||
Defender for Endpoint supports SIEM integration through various of methods. This can include specialized SIEM system interface with out of the box connectors, a generic alert API enabling custom implementations, and an action API enabling alert status management. For more information, see [Enable SIEM integration](enable-siem-integration.md).
|
||||
|
||||
|
||||
## Ticketing and IT service management
|
||||
Ticketing solution integration helps to implement manual and automatic response processes. Defender for Endpoint can help to create tickets automatically when an alert is generated and resolve the alerts when tickets are closed using the alerts API.
|
||||
|
||||
## Security orchestration and automation response (SOAR) integration
|
||||
Orchestration solutions can help build playbooks and integrate the rich data model and actions that Defender for Endpoint APIs expose to orchestrate responses, such as query for device data, trigger device isolation, block/allow, resolve alert and others.
|
||||
Orchestration solutions can help build playbooks and integrate the rich data model and actions that Defender for Endpoint APIs exposes to orchestrate responses, such as query for device data, trigger device isolation, block/allow, resolve alert and others.
|
||||
|
||||
## External alert correlation and Automated investigation and remediation
|
||||
Defender for Endpoint offers unique automated investigation and remediation capabilities to drive incident response at scale.
|
||||
|
||||
Integrating the automated investigation and response capability with other solutions such as IDS and firewalls help to address alerts and minimize the complexities surrounding network and device signal correlation, effectively streamlining the investigation and threat remediation actions on devices.
|
||||
|
||||
|
||||
External alerts can be pushed to Defender for Endpoint. These alerts are shown side by side with additional device-based alerts from Defender for Endpoint. This view provides a full context of the alert and can reveal the full story of an attack.
|
||||
|
||||
## Indicators matching
|
||||
You can use threat-intelligence from providers and aggregators to maintain and use indicators of compromise (IOCs).
|
||||
|
||||
Defender for Endpoint allows you to integrate with these solutions and act on IoCs by correlating rich telemetry to create alerts. You can also useg prevention and automated response capabilities to block execution and take remediation actions when there's a match.
|
||||
|
||||
Defender for Endpoint allows you to integrate with these solutions and act on IoCs by correlating rich telemetry to create alerts. You can also use prevention and automated response capabilities to block execution and take remediation actions when there's a match.
|
||||
|
||||
|
||||
Defender for Endpoint currently supports IOC matching and remediation for file and network indicators. Blocking is supported for file indicators.
|
||||
|
||||
## Support for non-Windows platforms
|
||||
Defender for Endpoint provides a centralized security operations experience for Windows as well as non-Windows platforms, including mobile devices. You'll be able to see alerts from various supported operating systems (OS) in the portal and better protect your organization's network.
|
||||
Defender for Endpoint provides a centralized security operations experience for Windows and non-Windows platforms, including mobile devices. You'll be able to see alerts from various supported operating systems (OS) in the portal and better protect your organization's network.
|
||||
|
Loading…
x
Reference in New Issue
Block a user