Skip to content

Commit 0806848

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into WI486581-mdi-detection-updates-reduce-alert-noise
2 parents cf8020f + 01d935a commit 0806848

9 files changed

+166
-18
lines changed

defender-endpoint/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -267,20 +267,22 @@
267267
href: mde-linux-prerequisites.md
268268
- name: Choose a deployment method
269269
items:
270-
- name: Installer script based deployment
271-
href: linux-installer-script.md
272270
- name: Enabling deployment to a custom location
273271
href: linux-custom-location-installation.md
272+
- name: Installer script based deployment
273+
href: linux-installer-script.md
274274
- name: Ansible based deployment
275275
href: linux-install-with-ansible.md
276276
- name: Chef based deployment
277277
href: linux-deploy-defender-for-endpoint-with-chef.md
278278
- name: Puppet based deployment
279279
href: linux-install-with-puppet.md
280-
- name: Saltstack-based deployment
280+
- name: Saltstack based deployment
281281
href: linux-install-with-saltack.md
282282
- name: Manual deployment
283283
href: linux-install-manually.md
284+
- name: Golden image based deployment
285+
href: linux-deploy-defender-for-endpoint-using-golden-images.md
284286
- name: Direct onboarding with Defender for Cloud
285287
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
286288
- name: Configure Defender for Endpoint on Linux

defender-endpoint/android-whatsnew.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: What's new in Microsoft Defender for Endpoint on Android
33
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on Android.
44
ms.service: defender-endpoint
55
ms.author: lwainstein
6-
author: lwainstein
6+
author: limwainstein
77
ms.localizationpriority: medium
88
manager: bagol
99
ms.reviewer: denishdonga
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 05/15/2025
18+
ms.date: 09/05/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -30,6 +30,18 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3030

3131
### Releases for Defender for Endpoint on Android
3232

33+
#### September 2025
34+
35+
| Build|1.0.8102.0101|
36+
| -------- | -------- |
37+
| Release Date| September 4, 2025 |
38+
39+
**What's New**
40+
41+
- Resolved the sign-in loop issue for shared device mode. Now, if a user attempts to sign in on a shared device, which isn't supported by MDE Mobile, user will be redirected back to the sign-in page.
42+
43+
- Other accessibility bug fixes and performance improvements.
44+
3345
#### August 2025
3446

3547
| Build|1.0.8018.0103|
@@ -68,7 +80,7 @@ April 2025
6880
**Setup a secure environment to test prerelease builds of Defender for Endpoint on Android**. Learn the steps on how to set up your environment for prerelease testing of Defender for Endpoint on Android. These steps are for Android devices that are onboarded to Microsoft Defender for Endpoint through the following methods:
6981

7082
- Android Enterprise scenarios
71-
- Mobile Application Mangement (MAM) enrollment scenarios
83+
- Mobile Application Management (MAM) enrollment scenarios
7284

7385
For more information, see [Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks](mobile-pretest-android.md).
7486

@@ -260,9 +272,9 @@ Notify your users and help desk (as applicable) that end users must accept the n
260272

261273
1. Tap on the Defender for Endpoint in-app notification or open the Defender for Endpoint app. Users see a screen that lists the permissions needed. A green check mark is missing next to **Storage permission**.
262274

263-
2. Tap **Begin**.
275+
1. Tap **Begin**.
264276

265-
3. Tap the toggle for **Allow access to manage all files**.
277+
1. Tap the toggle for **Allow access to manage all files**.
266278

267279
The device is now protected.
268280

defender-endpoint/ios-whatsnew.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: What's new in Microsoft Defender for Endpoint on iOS
33
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on iOS.
44
ms.service: defender-endpoint
55
ms.author: lwainstein
6-
author: lwainstein
6+
author: limwainstein
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 08/12/2025
9+
ms.date: 09/05/2025
1010
manager: bagol
1111
audience: ITPro
1212
ms.collection:
@@ -31,6 +31,16 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3131

3232
## Releases for Defender for Endpoint on iOS
3333

34+
#### September 2025
35+
36+
| Build| 1.1.68200103 |
37+
| -------- | -------- |
38+
| Release Date | September 4, 2025 |
39+
40+
**What's New**
41+
42+
- [Global Secure Access Internet Profile Support for iOS](/entra/global-secure-access/how-to-install-ios-client) (Preview) - Enables organizations to protect access to internet and SaaS apps with an identity-based Secure Web Gateway, blocking threats, unsafe content, and malicious traffic from the iPhone and iPads.
43+
3444
#### August 2025
3545

3646
| Build| 1.1.68140102|
@@ -39,6 +49,8 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3949

4050
**What's New**
4151

52+
- Fixed push notification bug to ensure heartbeat signals are sent reliably
53+
4254
- Performance improvements and bug fixes
4355

4456
### July-2025
Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,117 @@
1+
---
2+
title: Deploy Microsoft Defender for Endpoint on Linux using golden images
3+
description: Learn how to use preconfigured virtual machine templates (golden images) for rapid, consistent Microsoft Defender for Endpoint deployment on Linux.
4+
ms.service: defender-endpoint
5+
ms.author: painbar
6+
author: paulinbar
7+
ms.reviewer: meghapriya
8+
ms.localizationpriority: medium
9+
manager: bagol
10+
audience: ITPro
11+
ms.collection:
12+
- m365-security
13+
- tier3
14+
- mde-linux
15+
ms.topic: install-set-up-deploy
16+
ms.subservice: linux
17+
search.appverid: met150
18+
ms.date: 09/04/2025
19+
---
20+
21+
# Deploy Microsoft Defender for Endpoint on Linux using golden images
22+
23+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
24+
25+
**Applies to:**
26+
27+
- Microsoft Defender for Endpoint for servers
28+
- Microsoft Defender for Servers Plan 1 or Plan 2
29+
30+
Golden images are preconfigured virtual machine templates used to rapidly deploy consistent environments. Microsoft Defender for Endpoint on Linux supports golden image deployment across cloud and on-premises environments, with improved handling of machine identifiers and hostnames, ensuring reliable telemetry and device correlation.
31+
32+
This guide walks you through:
33+
34+
- Deploying Microsoft Defender for Endpoint on a golden image.
35+
36+
- Preparing the image for cloning.
37+
38+
- Ensuring unique identifiers for each virtual machine instance.
39+
40+
- Specific steps for cloud and on-premises environments.
41+
42+
## Step 1: Deploy Microsoft Defender for Endpoint on a golden image
43+
44+
1. Prepare the base virtual machine
45+
46+
- Install your preferred [supported Linux distribution](./mde-linux-prerequisites.md#supported-linux-distributions) and apply all necessary system updates.
47+
48+
1. Deploy Microsoft Defender for Endpoint on a golden image
49+
50+
There are several methods and tools that you can use to deploy Microsoft Defender for Endpoint on Linux (applicable to AMD64 and ARM64 Linux servers):
51+
52+
- [Installer script based deployment](./linux-installer-script.md)
53+
54+
- [Ansible based deployment](./linux-install-with-ansible.md)
55+
56+
- [Chef based deployment](./linux-deploy-defender-for-endpoint-with-chef.md)
57+
58+
- [Puppet based deployment](./linux-install-with-puppet.md)
59+
60+
- [SaltStack based deployment](./linux-install-with-saltack.md)
61+
62+
- [Manual deployment](./linux-install-manually.md)
63+
64+
- [Direct onboarding with Defender for Cloud](/azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint)
65+
66+
- [Guidance for Defender for Endpoint on Linux Server with SAP](./mde-linux-deployment-on-sap.md)
67+
68+
1. Validate the deployment
69+
70+
Check the health status of the product by running the following command. A return value of `true` denotes that the product is functioning as expected:
71+
72+
```bash
73+
mdatp health
74+
```
75+
76+
> [!NOTE]
77+
> Once Defender is successfully deployed on the golden image, there's no requirement to install and onboard it individually on each cloned machine.
78+
79+
## Step 2: Prepare the golden image for cloning
80+
81+
When deploying Defender for Endpoint on virtual machines, the hardware UUID reported by the system (system-uuid from dmidecode) is used to uniquely identify each instance.
82+
83+
Before making a snapshot of the virtual machine, ensure that each virtual machine clone gets a unique hardware UUID, as described in the following sections.
84+
85+
### On-premises machines
86+
87+
For on-premises environments, configure your virtualization platform so that each clone receives a unique hardware UUID from the underlying hypervisor. Follow these guidelines:
88+
89+
**KVM/libvirt**
90+
91+
- Don't hard-code the `<uuid>` element in the virtual machine's domain XML; if it's omitted, libvirt generates a random one at definition time.
92+
93+
- Alternatively, explicitly create a new UUID using `uuidgen`.
94+
95+
- For streamlined cloning, use `virt-clone` or `virt-manager`, which automatically assign unique UUIDs.
96+
97+
**VMware**
98+
99+
- During cloning, VMware prompts whether to keep the existing UUID or to create a new one. Always select **Create**, or configure `uuid.action = "create"` in the virtual machine's *.vmx* file.
100+
101+
- In VMware Cloud Director, set `backend.cloneBiosUuidOnVmCopy = 0` to force the creation of new UUIDs.
102+
103+
**Hyper-V**
104+
105+
Hyper-V automatically generates a new hardware UUID when you create a virtual machine using Hyper-V Manager or PowerShell ([New-VM](/powershell/module/hyper-v/new-vm)).
106+
107+
### Cloud virtual machines
108+
109+
Cloud platforms (for example, Azure, AWS, GCP) automatically inject unique metadata and identifiers via their instance metadata services (IMDS). No manual steps are required. Microsoft Defender for Endpoint automatically detects and uses these values to generate unique machine IDs.
110+
111+
## Hostname Management
112+
113+
If the hostname of a Linux server is changed after successful deployment of Defender, then you must restart the `mdatp` service to ensure the new hostname is correctly recognized by product.
114+
115+
## Related content
116+
117+
[!INCLUDE [Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/validate-antimalware.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,9 @@ You can run an antivirus detection test to verify that the device is properly on
5252
1. Copy the following string: `X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*`.
5353

5454
2. Paste the string into a `.TXT` file and save it as `EICAR.txt`.
55-
55+
56+
3. Open a Command Prompt and run: `type EICAR.txt`.
57+
5658
### Linux/macOS
5759

5860
1. Ensure that real-time protection is enabled. Run the following command and confirm the output is `"true"`:
@@ -86,4 +88,4 @@ You can run an antivirus detection test to verify that the device is properly on
8688
- [Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
8789
- [Microsoft Defender Antivirus in Windows Overview](microsoft-defender-antivirus-windows.md)
8890
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
89-
- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)
91+
- [Microsoft Defender for Endpoint on macOS](microsoft-defender-endpoint-mac.md)

defender-office-365/connection-filter-policies-configure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can learn how to configure connection filtering in Microsoft 365 to allow or block emails from email servers.
2020
ms.service: defender-office-365
21-
ms.date: 07/03/2025
21+
ms.date: 09/05/2025
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -193,6 +193,9 @@ For example, the source email server 192.168.1.25 sends email from the domains c
193193

194194
### Scenarios where messages from sources in the IP Allow List are still filtered
195195

196+
> [!NOTE]
197+
> These scenarios apply to all environments: standalone, hybrid, multi-geo, and cross-forest. Filtering behavior is based on security checks (for example, malware detection, phishing protection, or mail flow rules, not on the deployment model.
198+
196199
Messages from an email server in your IP Allow List are still subject to spam filtering in the following scenarios:
197200

198201
- An IP address in your IP Allow List is also configured in an on-premises, IP-based inbound connector in _any_ Microsoft 365 organization, **and** that Microsoft 365 organization and the first Microsoft 365 server that encounters the message both happen to be in _the same_ forest in the Microsoft datacenters. In this scenario, **IPV:CAL** _is_ added to the message's [anti-spam message headers](message-headers-eop-mdo.md) (indicating the message bypassed spam filtering), but the message is still subject to spam filtering.

defender-office-365/email-authentication-dkim-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Points to address or value: selector2-<CustomDomainWithDashes>._domainkey.<Initi
110110
- **\<CustomDomainWithDashes\>**: The custom domain or subdomain with periods replaced by dashes. For example, `contoso.com` becomes `contoso-com`, or `marketing.contoso.com` becomes `marketing-contoso-com`.
111111
- **\<InitialDomainPrefix\>**: The custom part of the \*.onmicrosoft.com you used to enroll in Microsoft 365. For example, if you used `contoso.onmicrosoft.com`, the value is `contoso`.
112112
- **\<DynamicPartitionCharacter\>**: A dynamically generated character that's used for both selectors (for example, r or n). The value is automatically assigned by Microsoft when you add a new custom domain and enable DKIM. The value is determined by Microsoft's internal routing logic and isn't configurable.
113-
- This value is part of the updated DKIM record format for new custom domains in Microsoft 365 introduced in May 2025. Existing custom domains and initial domains continue to use the old DKIM format:
113+
- **This value is part of the updated DKIM record format for new custom domains in Microsoft 365 introduced in May 2025**. Existing custom domains and initial domains continue to use the old DKIM format:
114114

115115
```text
116116
Hostname: selector1._domainkey
@@ -193,7 +193,7 @@ Proceed if the domain satisfies these requirements.
193193
|Microsoft.Exchange.ManagementTasks.ValidationException|CNAME record does not
194194
exist for this config. Please publish the following two CNAME records first. Domain Name
195195
: contoso.com Host Name : selector1._domainkey Points to address or value: selector1-
196-
contoso-com._domainkey.contoso.n-v1.dkim.mail.microsoft.com Host Name : selector2._domainkey
196+
contoso-com._domainkey.contoso.n-v1.dkim.mail.microsoft Host Name : selector2._domainkey
197197
Points to address or value: selector2-contoso-com._domainkey.contoso.n-v1.dkim.mail.microsoft .
198198
If you have already published the CNAME records, sync will take a few minutes to as
199199
many as 4 days based on your specific DNS. Return and retry this step later.

defender-office-365/submissions-admin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom: seo-marvel-apr2020
1717
description: "Admins can learn how to use the Submissions page in the Microsoft Defender portal to submit messages, URLs, and email attachments to Microsoft for analysis. Reasons for submission include: legitimate messages that were blocked, suspicious messages that were allowed, suspected phishing email, spam, malware, and other potentially harmful messages."
1818
ms.service: defender-office-365
19-
ms.date: 08/27/2025
19+
ms.date: 09/05/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -899,7 +899,7 @@ You can use the procedures in this section to dispute admin submitted items that
899899
- **Upload as screenshot**: Select this option to upload a JPG or PNG image less than one MB.
900900

901901
> [!IMPORTANT]
902-
> If you don't select **Reason**, the item isn't sent to Microsoft for reevaluation. Instead, an entry is created on the **Emails** or **URLs** tab without resubmitting the item. Values other than **Reason** are taken as feedback.
902+
> If you don't select **Result**, the item isn't sent to Microsoft for reevaluation. Instead, an entry is created on the **Emails** or **URLs** tab without resubmitting the item. Values other than **Result** are taken as feedback.
903903
904904
When you're finished on the **Dispute details** flyout, select **Submit dispute**.
905905

defender-xdr/manage-rbac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ Centralized permissions management is supported for the following services:
5454
|**Microsoft Defender XDR**|Centralized permissions management for Microsoft Defender XDR experiences.|
5555
|**Microsoft Defender for Endpoint**|Full support for all endpoint data and actions. All roles are compatible with the device group's scope as defined on the device groups page. Limiting permissions to different device groups is accomplished in the Devices Groups page.|
5656
|**Microsoft Defender Vulnerability Management**|Centralized permissions management for all Defender Vulnerability Management capabilities.|
57-
|**Microsoft Defender for Office 365**|Full support for all data and actions. </br></br> **Note**: <ul><li>Initially, the Microsoft Defender XDR RBAC model is available only for organizations with Microsoft Defender for Office 365 Plan 2 licenses (trial licenses aren't supported).</li><li>Granular delegated admin privileges (GDAP) aren't supported.</li><li>Exchange Online PowerShell and Security & Compliance PowerShell continue to use [Exchange Online roles](/exchange/permissions-exo/permissions-exo) and [Email & Collaboration roles](/defender-office-365/mdo-portal-permissions). Microsoft Defender XDR Unified RBAC doesn't affect Exchange Online PowerShell or Security & Compliance PowerShell.</li><li>Azure B2B invited guests aren't supported by all experiences that were previously under Exchange Online RBAC.</li></ul>|
57+
|**Microsoft Defender for Office 365**|Full support for all data and actions. </br></br> **Note**: <ul><li>Initially, the Microsoft Defender XDR RBAC model is available only for organizations with Microsoft Defender for Office 365 Plan 2 licenses (trial licenses aren't supported).</li><li>Granular delegated admin privileges (GDAP) aren't supported.</li><li>Exchange Online PowerShell and Security & Compliance PowerShell continue to use [Exchange Online roles](/exchange/permissions-exo/permissions-exo) and [Email & Collaboration roles](/defender-office-365/mdo-portal-permissions). Microsoft Defender XDR Unified RBAC doesn't affect Exchange Online PowerShell or Security & Compliance PowerShell.</li></ul>|
5858
|**Microsoft Defender for Identity**|Full support for all identity data and actions. All roles are compatible with [Microsoft Defender for Identity scoped access](/defender-for-identity/configure-scoped-access).</br></br> **Note:** Defender for Identity experiences also adhere to permissions granted from [Microsoft Defender for Cloud Apps](https://security.microsoft.com/cloudapps/permissions/roles). For more information, see [Microsoft Defender for Identity role groups](https://go.microsoft.com/fwlink/?linkid=2202729).|
5959
|**Microsoft Defender for Cloud**|Support access management for all Defender for Cloud data that is available in Microsoft Defender portal.|
6060
|**Microsoft Security Exposure Management**|Full support for all Exposure Management data and actions, including Microsoft Secure Score data.|

0 commit comments

Comments
 (0)