Skip to content

Commit 0420582

Browse files
committed
Merge branch 'main' into pr/3000
2 parents e403603 + e2da1a4 commit 0420582

14 files changed

+43
-39
lines changed

defender-endpoint/indicator-file.md

Lines changed: 11 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 02/06/2025
9+
ms.date: 03/04/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,9 +29,6 @@ search.appverid: met150
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
3030
- [Microsoft Defender for Business](/defender-business/mdb-overview)
3131

32-
> [!TIP]
33-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
34-
3532
> [!IMPORTANT]
3633
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
3734
@@ -52,37 +49,33 @@ There are three ways you can create indicators for files:
5249
Understand the following prerequisites before you create indicators for files:
5350

5451
- [Behavior Monitoring is enabled](behavior-monitor.md)
55-
5652
- [Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57-
5853
- [Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
59-
6054
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
6155

6256
### Windows prerequisites
6357

6458
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
65-
66-
- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
67-
59+
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
6860
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.
69-
7061
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
7162

7263
> [!NOTE]
7364
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
7465
7566
### macOS prerequisites
7667

77-
- [File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
78-
79-
### Linux prerequisites
68+
- Real-time protection (RTP) needs to be active.
69+
- [File hash computation must be enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line). Run the following command: `mdatp config enable-file-hash-computation --value enabled`
8070

81-
- Available in Defender for Endpoint version 101.85.27 or later.
71+
> [!NOTE]
72+
> On Mac, file indicators support Mach-O files (akin to `.exe` and `.dll` in Windows) scripts, such as sh/bash and AppleScript File (`.scpt`) files only.
8273
83-
- [File hash computation is enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
74+
### Linux prerequisites
8475

85-
- Behavior monitoring is preferred, but this will work with any other scan (RTP or Custom).
76+
- Available in Defender for Endpoint version `101.85.27` or later.
77+
- [File hash computation must be enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
78+
- Behavior monitoring enabled is preferred, but this feature works with any other scan (RTP or Custom).
8679

8780
## Create an indicator for files from the settings page
8881

@@ -95,9 +88,7 @@ Understand the following prerequisites before you create indicators for files:
9588
4. Specify the following details:
9689

9790
- Indicator: Specify the entity details and define the expiration of the indicator.
98-
9991
- Action: Specify the action to be taken and provide a description.
100-
10192
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
10293

10394
> [!NOTE]
@@ -156,7 +147,7 @@ Timestamp > ago(30d)
156147

157148
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
158149

159-
Below are other thread names that can be used in the sample query from above:
150+
Here are other thread names that can be used in the sample query:
160151

161152
Files:
162153

defender-endpoint/mac-whatsnew.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,18 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
6464

6565
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
6666

67+
### Mar-2025 (Build: 101.25012.0008 | Release version: 20.125012.7.0)
68+
69+
| Build: | **101.25012.0008** |
70+
|--------------------|-----------------------|
71+
| Release version: | **20.125012.7.0** |
72+
| Engine version: | **1.1.25020.3000** |
73+
| Signature version: | **1.423.211.0** |
74+
75+
##### What's new
76+
77+
- Bug fixes and performance improvements
78+
6779
### Feb-2025 (Build: 101.24122.0011 | Release version: 20.124122.11.0)
6880

6981
| Build: | **101.24122.0011** |

defender-endpoint/validate-antimalware.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 01/31/2024
18+
ms.date: 03/04/2025
1919
---
2020

2121
# AV detection test for verifying device's onboarding and reporting services

defender-vulnerability-management/tvm-security-recommendation.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,10 @@ audience: ITPro
1010
ms.collection:
1111
- m365-security
1212
- Tier1
13-
ms.topic: conceptual
13+
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 02/19/2025
15+
ms.date: 03/04/2025
16+
#customer intent: Get information on how to view and act on security recommendations in Microsoft Defender Vulnerability Management.
1617
---
1718

1819
# Security recommendations
@@ -32,7 +33,7 @@ Cybersecurity weaknesses identified in your organization are mapped to actionabl
3233
Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint Configuration Manager. When the threat landscape changes, the recommendation also changes as it continuously collects information from your environment.
3334

3435
> [!TIP]
35-
> To get emails about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications)
36+
> To get email notifications about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications).
3637
3738
## How it works
3839

@@ -51,15 +52,15 @@ Access the Security recommendations page a few different ways:
5152

5253
### Navigation menu
5354

54-
In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Vulnerability management** navigation menu and select **Recommendations**.
55+
In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** navigation menu and select **Recommendations**.
5556

5657
The page contains a list of security recommendations for the threats and vulnerabilities found in your organization.
5758

5859
### Top security recommendations in the vulnerability management dashboard
5960

60-
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
61+
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
6162

62-
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/top-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/top-security-recommendations.png":::
63+
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/tvm-sec-recommendations-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-recommendations.png":::
6364

6465
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation takes you to the security recommendations page with more details.
6566

@@ -72,7 +73,7 @@ The color of the **Exposed devices** graph changes as the trend changes. If the
7273
> [!NOTE]
7374
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
7475
75-
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png":::
76+
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded.png":::
7677

7778
### Icons
7879

@@ -92,9 +93,9 @@ The impact column shows the potential impact on your exposure score and Secure S
9293

9394
### Explore security recommendation options
9495

95-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation that you want to investigate or process.
96+
1. Select the security recommendation that you want to investigate or process from the list.
9697

97-
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png" lightbox="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png":::
98+
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout.png":::
9899

99100
2. In the flyout, you can choose any of the following options:
100101

@@ -111,21 +112,21 @@ The impact column shows the potential impact on your exposure score and Secure S
111112

112113
If there's a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
113114

114-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select a recommendation, and then select **Open software page**
115+
1. Select a recommendation, and then select **Open software page**.
115116

116-
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
117+
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md).
117118

118-
3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
119+
3. Decide how to address the increase or your organization's exposure, like submitting a remediation request.
119120

120121
### Recommendations on devices
121122

122123
To see the list of security recommendations that apply to a device, follow these steps:
123124

124-
1. In the [Microsoft Defender portal](https://security.microsoft.com), in the **Device inventory** page, select a device.
125+
1. Navigate to the **Device inventory** through **Assets** > **Devices** navigation menu, then select a device.
125126

126127
2. Select the **Security recommendations** tab to see a list of security recommendations for the device.
127128

128-
:::image type="content" source="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png":::
129+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-device-secreco-small.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/tvm-device-secreco.png":::
129130

130131
> [!NOTE]
131132
> If you have the [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/concept-enterprise/) integration enabled in Defender for Endpoint, recommendations for Enterprise IoT devices that appear on IoT devices tab appears on the security recommendations page. For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
@@ -136,7 +137,7 @@ The vulnerability management remediation capability bridges the gap between Secu
136137

137138
### How to request remediation
138139

139-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select a security recommendation you would like to request remediation for, and then select **Remediation options**.
140+
1. Select a security recommendation you would like to request remediation for and then select **Remediation options**.
140141

141142
2. Fill out the form and select **Submit request**.
142143

@@ -154,13 +155,13 @@ When an exception is created for a recommendation, the recommendation is no long
154155

155156
### How to create an exception
156157

157-
1. In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation you want to create an exception for, and then select **Exception options**.
158+
1. Select the security recommendation you want to create an exception for, and then select **Exception options**.
158159

159-
![Showing where the button for "exception options" is located in a security recommendation flyout.](/defender/media/defender-vulnerability-management/tvm-exception-options.png)
160+
:::image type="content" alt-text="Showing where the exception options is located in a security recommendation flyout." source="/defender/media/defender-vulnerability-management/tvm-reco-exception-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-reco-exception.png":::
160161

161162
2. Fill out the form and submit.
162163

163-
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu, and select the **Exceptions** tab.
164+
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Endpoints** > **Vulnerability management** navigation menu and select **Remediation**, and then select the **Exceptions** tab.
164165

165166
For more information, see [Learn more about how to create an exception](tvm-exception.md#create-an-exception).
166167

70.9 KB
Loading
244 KB
Loading
133 KB
Loading
306 KB
Loading
85.5 KB
Loading
295 KB
Loading

0 commit comments

Comments
 (0)