mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge pull request #3932 from MicrosoftDocs/master
Publish 10/2/2020, 3:30 PM PT
This commit is contained in:
commit
ecc51eaff7
@ -71,6 +71,30 @@ All our updates contain:
|
|||||||
* integration improvements (Cloud, MTP)
|
* integration improvements (Cloud, MTP)
|
||||||
<br/>
|
<br/>
|
||||||
<details>
|
<details>
|
||||||
|
<summary> September-2020 (Platform: 4.18.2009.X | Engine: 1.1.17500.4)</summary>
|
||||||
|
|
||||||
|
 Security intelligence update version: **1.325.10.0**
|
||||||
|
 Released: **October 01, 2020**
|
||||||
|
 Platform: **4.18.2009.X**
|
||||||
|
 Engine: **1.1.17500.4**
|
||||||
|
 Support phase: **Security and Critical Updates**
|
||||||
|
|
||||||
|
### What's new
|
||||||
|
*Admin permissions are required to restore files in quarantine
|
||||||
|
*XML formatted events are now supported
|
||||||
|
*CSP support for ignoring exclusion merge
|
||||||
|
*New management interfaces for:
|
||||||
|
+UDP Inspection
|
||||||
|
+Network Protection on Server 2019
|
||||||
|
+IP Address exclusions for Network Protection
|
||||||
|
*Improved visibility into TPM measurements
|
||||||
|
*Improved Office VBA module scanning
|
||||||
|
|
||||||
|
### Known Issues
|
||||||
|
No known issues
|
||||||
|
<br/>
|
||||||
|
</details>
|
||||||
|
<details>
|
||||||
<summary> August-2020 (Platform: 4.18.2008.9 | Engine: 1.1.17400.5)</summary>
|
<summary> August-2020 (Platform: 4.18.2008.9 | Engine: 1.1.17400.5)</summary>
|
||||||
|
|
||||||
 Security intelligence update version: **1.323.9.0**
|
 Security intelligence update version: **1.323.9.0**
|
||||||
@ -84,7 +108,7 @@ All our updates contain:
|
|||||||
* Improved scan event telemetry
|
* Improved scan event telemetry
|
||||||
* Improved behavior monitoring for memory scans
|
* Improved behavior monitoring for memory scans
|
||||||
* Improved macro streams scanning
|
* Improved macro streams scanning
|
||||||
* Added "AMRunningMode" to Get-MpComputerStatus Powershell CmdLet
|
* Added "AMRunningMode" to Get-MpComputerStatus PowerShell CmdLet
|
||||||
|
|
||||||
### Known Issues
|
### Known Issues
|
||||||
No known issues
|
No known issues
|
||||||
@ -116,7 +140,7 @@ No known issues
|
|||||||
 Released: **June 22, 2020**
|
 Released: **June 22, 2020**
|
||||||
 Platform: **4.18.2006.10**
|
 Platform: **4.18.2006.10**
|
||||||
 Engine: **1.1.17200.2**
|
 Engine: **1.1.17200.2**
|
||||||
 Support phase: **Security and Critical Updates**
|
 Support phase: **Technical upgrade Support (Only)**
|
||||||
|
|
||||||
### What's new
|
### What's new
|
||||||
* Possibility to specify the [location of the support logs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data)
|
* Possibility to specify the [location of the support logs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data)
|
||||||
|
@ -54,11 +54,9 @@ The following features are included in the preview release:
|
|||||||
|
|
||||||
- [Microsoft Defender ATP for Android](microsoft-defender-atp-android.md) <br> Microsoft Defender ATP now adds support for Android. Learn how to install, configure, and use Microsoft Defender ATP for Android.
|
- [Microsoft Defender ATP for Android](microsoft-defender-atp-android.md) <br> Microsoft Defender ATP now adds support for Android. Learn how to install, configure, and use Microsoft Defender ATP for Android.
|
||||||
|
|
||||||
- [Threat & Vulnerability supported operating systems and platforms](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os) <BR> Ensure that you meet the operating system or platform requisites for Threat & Vulnerability Management so the activities in your devices are properly accounted for. Threat & Vulnerability Management supports Windows 7, Windows 10 1607-1703, Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019. <BR> <BR> Secure Configuration Assessment (SCA) supports Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, and Windows Server 2019.
|
- [Web Content Filtering](web-content-filtering.md) <br> Web content filtering is part of web protection capabilities in Microsoft Defender ATP. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of compliance regulations, bandwidth usage, or other concerns.
|
||||||
|
|
||||||
- [Threat & Vulnerability Management granular exploit details](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses) <BR> You can now see a comprehensive set of details on the vulnerabilities found in your device to give you informed decision on your next steps. The threat insights icon now shows more granular details, such as if the exploit is a part of an exploit kit, connected to specific advanced persistent campaigns or activity groups for which, Threat Analytics report links are provided that you can read, has associated zero-day exploitation news, disclosures, or related security advisories.
|
- [Threat and vulnerability management supported operating systems and platforms](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-supported-os) <BR> Ensure that you meet the operating system or platform requisites for Threat & Vulnerability Management so the activities in your devices are properly accounted for. Threat & Vulnerability Management supports Windows 7, Windows 10 1607-1703, Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, Windows Server 2019. <BR> <BR> Secure Configuration Assessment (SCA) supports Windows 10 1709+, Windows Server 2008R2, Windows Server 2012R2, Windows Server 2016, and Windows Server 2019.
|
||||||
|
|
||||||
- [Threat & Vulnerability Management Report inaccuracy](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation#report-inaccuracy) <BR> You can report a false positive when you see any vague, inaccurate, incomplete, or already remediated [security recommendation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation#report-inaccuracy), [software inventory](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory#report-inaccuracy), and [discovered vulnerabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-weaknesses#report-inaccuracy).
|
|
||||||
|
|
||||||
- [Device health and compliance report](machine-reports.md) <br/> The device health and compliance report provides high-level information about the devices in your organization.
|
- [Device health and compliance report](machine-reports.md) <br/> The device health and compliance report provides high-level information about the devices in your organization.
|
||||||
|
|
||||||
|
@ -21,22 +21,23 @@ ms.topic: article
|
|||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
>[!IMPORTANT]
|
> **Web content filtering is currently in public preview**<br>
|
||||||
>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
|
||||||
|
> For more information, see [Microsoft Defender ATP preview features](preview.md).
|
||||||
|
|
||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||||
|
|
||||||
Web content filtering is part of [Web protection](web-protection-overview.md) capabilities in Microsoft Defender ATP. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of compliance regulations, bandwidth usage, or other concerns.
|
Web content filtering is part of [Web protection](web-protection-overview.md) capabilities in Microsoft Defender ATP. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic because of compliance regulations, bandwidth usage, or other concerns.
|
||||||
|
|
||||||
You can configure policies across your device groups to block certain categories, effectively preventing users within specified device groups from accessing URLs that are associated with the category. For any category that's not blocked, they are automatically audited. That means your users will be able to access the URLs without disruption, and you will continue to gather access statistics to help create a more custom policy decision. If an element on the page you’re viewing is making calls to a resource that is blocked, your users will see a block notification.
|
Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you'll gather access statistics to help create a more custom policy decision. Your users will see a block notification if an element on the page they're viewing is making calls to a blocked resource.
|
||||||
|
|
||||||
Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome and Firefox). For more information about browser support, see the prerequisites section.
|
Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome and Firefox). For more information about browser support, see the prerequisites section.
|
||||||
|
|
||||||
Summarizing the benefits:
|
Summarizing the benefits:
|
||||||
|
|
||||||
- Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away
|
- Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away
|
||||||
- Conveniently deploy varied policies to various sets of users using the device groups defined in the [Microsoft Defender ATP role-based access control settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/rbac)
|
- Conveniently deploy policies to groups of users using device groups defined in [Microsoft Defender ATP role-based access control settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/rbac)
|
||||||
- Access web reports in the same central location, with visibility over actual blocks and web usage
|
- Access web reports in the same central location, with visibility over actual blocks and web usage
|
||||||
|
|
||||||
## User experience
|
## User experience
|
||||||
@ -47,17 +48,17 @@ For a more user-friendly in-browser experience, consider using Microsoft Edge.
|
|||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
Before trying out this feature, make sure you have the following:
|
Before trying out this feature, make sure you have the following requirements:
|
||||||
|
|
||||||
- Windows 10 Enterprise E5 license OR Microsoft 365 E3 + Microsoft 365 E5 Security add-on.
|
- Windows 10 Enterprise E5 license OR Microsoft 365 E3 + Microsoft 365 E5 Security add-on.
|
||||||
- Access to Microsoft Defender Security Center portal
|
- Access to Microsoft Defender Security Center portal
|
||||||
- Devices running Windows 10 Anniversary Update (version 1607) or later with the latest MoCAMP update.
|
- Devices running Windows 10 Anniversary Update (version 1607) or later with the latest MoCAMP update.
|
||||||
|
|
||||||
If Windows Defender SmartScreen is not turned on, Network Protection will take over the blocking. It requires [enabling Network Protection](enable-network-protection.md) on the device.
|
If Windows Defender SmartScreen isn't turned on, Network Protection will take over the blocking. It requires [enabling Network Protection](enable-network-protection.md) on the device.
|
||||||
|
|
||||||
## Data handling
|
## Data handling
|
||||||
|
|
||||||
For this feature, we will follow whichever region you have elected to use as part of your [Microsoft Defender ATP data handling settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy). Your data will not leave the data center in that region. In addition, your data will not be shared with any third-parties, including our data providers. However, we may send them aggregate data (across users and organizations) to help them improve their feeds.
|
We will follow whichever region you have elected to use as part of your [Microsoft Defender ATP data handling settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy). Your data will not leave the data center in that region. In addition, your data will not be shared with any third-parties, including our data providers. However, we may send them aggregate data (across users and organizations) to help them improve their feeds.
|
||||||
|
|
||||||
## Turn on web content filtering
|
## Turn on web content filtering
|
||||||
|
|
||||||
@ -89,31 +90,25 @@ Tip: You can deploy a policy without selecting any category on a device group. T
|
|||||||
|
|
||||||
### Allow specific websites
|
### Allow specific websites
|
||||||
|
|
||||||
It is possible to override the blocked category in web content filtering to allow a single site by creating a custom indicator policy. The custom indicator policy will supersede the web content filtering policy when it is applied to the device group in question.
|
It's possible to override the blocked category in web content filtering to allow a single site by creating a custom indicator policy. The custom indicator policy will supersede the web content filtering policy when it's applied to the device group in question.
|
||||||
|
|
||||||
1. Create a custom indicator in the Microsoft Defender Security Center by going to **Settings** > **Indicators** > **URL/Domain** > **Add Item**
|
1. Create a custom indicator in the Microsoft Defender Security Center by going to **Settings** > **Indicators** > **URL/Domain** > **Add Item**
|
||||||
2. Enter the domain of the site
|
2. Enter the domain of the site
|
||||||
3. Set the policy action to **Allow**.
|
3. Set the policy action to **Allow**.
|
||||||
|
|
||||||
## Web content filtering
|
## Web content filtering cards and details
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
cards and details
|
|
||||||
|
|
||||||
Select **Reports > Web protection** to view cards with information about web content filtering and web threat protection. The following cards provide summary information about web content filtering.
|
Select **Reports > Web protection** to view cards with information about web content filtering and web threat protection. The following cards provide summary information about web content filtering.
|
||||||
|
|
||||||
### Web activity by category
|
### Web activity by category
|
||||||
|
|
||||||
This card lists the parent web content categories with the largest percentage change in the number of access attempts, whether they have increased or decreased. You can use this card to understand drastic changes in web activity patterns in your organization from last 30 days, 3 months, or 6 months. Select a category name to view more information about that particular category.
|
This card lists the parent web content categories with the largest increase or decrease in the number of access attempts. Understand drastic changes in web activity patterns in your organization from last 30 days, 3 months, or 6 months. Select a category name to view more information.
|
||||||
|
|
||||||
In the first 30 days of using this feature, your organization might not have sufficient data to display in this card.
|
In the first 30 days of using this feature, your organization might not have enough data to display this information.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Web content filtering
|
### Web content filtering summary card
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
summary card
|
|
||||||
|
|
||||||
This card displays the distribution of blocked access attempts across the different parent web content categories. Select one of the colored bars to view more information about a specific parent web category.
|
This card displays the distribution of blocked access attempts across the different parent web content categories. Select one of the colored bars to view more information about a specific parent web category.
|
||||||
|
|
||||||
@ -143,9 +138,9 @@ Use the time range filter at the top left of the page to select a time period. Y
|
|||||||
|
|
||||||
### Limitations and known issues in this preview
|
### Limitations and known issues in this preview
|
||||||
|
|
||||||
- Only Edge is supported if your device's OS configuration is Server (cmd > Systeminfo > OS Configuration). This is because Network Protection is only supported in Inspect mode on Server devices, which is responsible for securing traffic across Chrome/Firefox.
|
- Only Microsoft Edge is supported if your device's OS configuration is Server (cmd > Systeminfo > OS Configuration). Network Protection is only supported in Inspect mode on Server devices, which is responsible for securing traffic across Chrome/Firefox.
|
||||||
|
|
||||||
- Unassigned devices will have incorrect data shown within the report. In the Report details > Device groups pivot, you may see a row with a blank Device Group field. This group contains your unassigned devices in the interim before they get put into your specified group. The report for this row may not contain an accurate count of devices or access counts.
|
- Unassigned devices will have incorrect data shown within the report. In the Report details > Device groups pivot, you may see a row with a blank Device Group field. This group contains your unassigned devices before they get put into your specified group. The report for this row may not contain an accurate count of devices or access counts.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user