You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/SHIELD/Defend/Deployment.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Deployment
2
2
3
-
The Defend module is deployed automatically as part of the SHIELD platform’s **Core Infrastructure deployment** process. It does not require any separate deployment scripts or packages.
3
+
The Defend module is deployed automatically as part of the SHIELD platform's **Core Infrastructure deployment** process. It does not require any separate deployment scripts or packages.
4
4
5
5
This page clarifies when and how Defend becomes active, and what its dependencies are.
6
6
@@ -56,4 +56,4 @@ To use Defend, the following must already be deployed:
Copy file name to clipboardExpand all lines: docs/SHIELD/Defend/Reference/index.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ SHIELD enforces hardware baselines per security class, especially for **Privileg
25
25
| Graphics Support | NVIDIA recommended (avoid AMD graphics) |
26
26
27
27
!!! info "Device Security Considerations"
28
-
In ESM/SSM, hardware risks are lower, but it’s still important to avoid unsupported OEMs and poor firmware hygiene. These devices typically handle non-elevated tasks.
28
+
In ESM/SSM, hardware risks are lower, but it's still important to avoid unsupported OEMs and poor firmware hygiene. These devices typically handle non-elevated tasks.
29
29
30
30
### Privileged Mode (PSM)
31
31
@@ -49,25 +49,31 @@ Each SHIELD lifecycle action is mapped to a standardized backend workflow. The f
Copy file name to clipboardExpand all lines: docs/SHIELD/Defend/Troubleshooting.md
+14-2Lines changed: 14 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,16 +1,18 @@
1
1
# Troubleshooting
2
2
3
-
This section addresses common issues encountered when using the Defend module’s lifecycle management features. It also offers clarification on edge cases, expected behaviors, and safe recovery actions.
3
+
This section addresses common issues encountered when using the Defend module's lifecycle management features. It also offers clarification on edge cases, expected behaviors, and safe recovery actions.
4
4
5
5
---
6
6
7
7
## Issue: Devices not appearing in SHIELD UI
8
8
9
9
**Cause:**
10
+
10
11
- Devices are not hybrid-joined or cloud-joined to Entra ID
11
12
- Devices are not enrolled or synced into Intune
12
13
13
14
**Resolution:**
15
+
14
16
- Confirm the device is joined to Entra ID
15
17
- Ensure it is visible in the Intune portal ([https://intune.microsoft.com](https://intune.microsoft.com))
16
18
- Ensure it is not already managed by another tenant or stale registration
@@ -20,11 +22,13 @@ This section addresses common issues encountered when using the Defend module’
20
22
## Issue: Users not showing up when trying to commission
21
23
22
24
**Cause:**
25
+
23
26
- The user has already been onboarded
24
27
- The user is filtered out by Entra ID query
25
28
- Admin does not have required permissions
26
29
27
30
**Resolution:**
31
+
28
32
- Verify the user exists in Entra ID
29
33
- Confirm you're operating with Global Reader or User Administrator role
30
34
- Switch to a different security class to check other eligible users
@@ -34,11 +38,13 @@ This section addresses common issues encountered when using the Defend module’
34
38
## Issue: Lifecycle actions failing silently or UI not responding
35
39
36
40
**Cause:**
41
+
37
42
- Required Defender for Endpoint workspace is not initialized
38
43
- Scoped Intune tags are missing
39
44
- Conditional Access policies are not yet deployed
40
45
41
46
**Resolution:**
47
+
42
48
- Follow workspace setup verification steps in the [Usage Guide](Usage-Guide/index.md), under **Defender for Endpoint Workspace Creation**
43
49
- Check that SHIELD infrastructure was successfully deployed from the Deploy module
44
50
- Review prerequisites in [Defend Prerequisites](Prerequisites.md)
@@ -48,10 +54,12 @@ This section addresses common issues encountered when using the Defend module’
Copy file name to clipboardExpand all lines: docs/SHIELD/Deploy/Deployment/index.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Deployment
2
2
3
-
The Deploy module is provisioned automatically as part of the SHIELD platform’s Core Infrastructure deployment. This page provides clarity on how the Deploy module fits into the broader deployment flow and what is delivered specifically by this module.
3
+
The Deploy module is provisioned automatically as part of the SHIELD platform's Core Infrastructure deployment. This page provides clarity on how the Deploy module fits into the broader deployment flow and what is delivered specifically by this module.
4
4
5
5
---
6
6
@@ -14,7 +14,7 @@ There is no separate installation or deployment process specific to the Deploy m
14
14
15
15
## What Is Deployed?
16
16
17
-
The Deploy module provisions all foundational objects required for SHIELD’s lifecycle and security logic:
17
+
The Deploy module provisions all foundational objects required for SHIELD's lifecycle and security logic:
18
18
19
19
- Security groups for each SPA tier (Enterprise, Specialized, Privileged)
20
20
- Intune Scope Tags for device policy enforcement
@@ -40,7 +40,7 @@ From the home screen:
40
40
3. Check the agreement box
41
41
4. Click **Deploy Infrastructure**
42
42
43
-
You’ll then see:
43
+
You'll then see:
44
44
45
45
- A progress spinner
46
46
- Automatic status updates
@@ -75,4 +75,3 @@ These cannot be renamed or deleted through the SHIELD UI.
Copy file name to clipboardExpand all lines: docs/SHIELD/Deploy/Reference/index.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Reference
2
2
3
-
This reference section provides technical specifications and supporting details for SHIELD’s Deploy module, including identity protection policies and configuration recommendations that align with the SPA architecture.
3
+
This reference section provides technical specifications and supporting details for SHIELD's Deploy module, including identity protection policies and configuration recommendations that align with the SPA architecture.
4
4
5
5
---
6
6
@@ -14,7 +14,7 @@ These policies are designed to:
14
14
- Block access to privileged resources if risk conditions are met
15
15
- Route access through compliant devices and monitored interfaces
16
16
17
-
This aligns with Microsoft’s Zero Trust security model and helps enforce separation between administrative and user environments.
17
+
This aligns with Microsoft's Zero Trust security model and helps enforce separation between administrative and user environments.
0 commit comments