Skip to content

Commit 094d845

Browse files
authored
Merge branch 'main' into poliveria-ah-identity-08082025
2 parents 3e29c41 + 86c7d06 commit 094d845

File tree

4 files changed

+36
-6
lines changed

4 files changed

+36
-6
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,30 @@ Updates contain:
9999
- Serviceability improvements
100100
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
101101

102+
103+
### July-2025 (Platform: 4.18.25070.5 | Engine: 1.1.25070.4)
104+
105+
- Security intelligence update version: **1.435.11.0**
106+
- Release date: **August 5, 2025 (Engine) / August 6, 2025 (Platform)**
107+
- Platform: **4.18.25070.5**
108+
- Engine: **1.1.25070.4**
109+
- Support phase: **Security and Critical Updates**
110+
111+
#### What's new
112+
113+
- Enhanced Passive Mode Scanning Behavior
114+
When Microsoft Defender is in Passive mode, an Antivirus scan will not occur after a signature update , unless specifically set in the policy setting DisableScanOnUpdate.
115+
116+
- Improved Tamper Protection Handling
117+
Optimized the configuration process for Tamper Protection in multi-threaded environments to ensure more reliable behavior.
118+
119+
- Digital Signature Verification Performance Boost
120+
Enhanced the efficiency of digital signature verification to improve overall system performance.
121+
122+
- Refined ASR Rule Exclusion Processing
123+
Refined exclusion processing and resolved false positives for the Attack Surface Reduction (ASR) rule: Block Office applications from injecting code into other processes.
124+
125+
102126
### June-2025 (Platform: 4.18.25060.7 | Engine: 1.1.25060.6)
103127

104128
- Security intelligence update version: **1.433.2.0**

defender-office-365/recommended-settings-for-eop-and-office365.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection:
1919
- tier1
2020
description: What are best practices for email and collaboration security settings in Microsoft 365? What are the current recommendations for standard protection? What should you use to be more strict? And what extras do you get if you also use Microsoft Defender for Office 365?
2121
ms.service: defender-office-365
22-
ms.date: 07/10/2025
22+
ms.date: 08/09/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Default email protections for cloud mailboxes</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -334,25 +334,25 @@ To configure Safe Links policy settings, see [Set up Safe Links policies in Micr
334334
In [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), you use the [New-SafeLinksPolicy](/powershell/module/exchangepowershell/new-safelinkspolicy) and [Set-SafeLinksPolicy](/powershell/module/exchangepowershell/set-safelinkspolicy) cmdlets for Safe Links policy settings.
335335

336336
> [!NOTE]
337-
> The **Default in custom** column refers to the default values in new Safe Links policies that you create. The remaining columns indicate (unless otherwise noted) the values that are configured in the corresponding preset security policies.
337+
> The **Default in custom** column refers to the default values in new Safe Links policies you create. The remaining columns indicate the values configured in the corresponding preset security policies.
338338
339339
|Security feature name|Default in custom|Built-in protection|Standard|Strict|Comment|
340340
|---|:---:|:---:|:---:|:---:|---|
341341
|**URL & click protection settings**||||||
342342
|**Email**|||||The settings in this section affect URL rewriting and time of click protection in email messages.|
343343
|**On: Safe Links checks a list of known, malicious links when users click links in email. URLs are rewritten by default.** (_EnableSafeLinksForEmail_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
344-
|**Apply Safe Links to email messages sent within the organization** (_EnableForInternalSenders_)|Selected (`$true`)|Not selected (`$false`)|Selected (`$true`)|Selected (`$true`)||
344+
|**Apply Safe Links to email messages sent within the organization** (_EnableForInternalSenders_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
345345
|**Apply real-time URL scanning for suspicious links and links that point to files** (_ScanUrls_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
346346
|**Wait for URL scanning to complete before delivering the message** (_DeliverMessageAfterScan_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
347-
|**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _DisableURLRewrite_ parameter is `$false`.|
347+
|**Do not rewrite URLs, do checks via Safe Links API only** (_DisableURLRewrite_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new policies created in the Defender portal, this setting is selected by default. In new policies created in PowerShell, the default value is `$false`.|
348348
|**Do not rewrite the following URLs in email** (_DoNotRewriteUrls_)|Blank|Blank|Blank|Blank|We have no specific recommendation for this setting. <br/><br/> **Note**: Safe Links doesn't scan or wrap entries in the "Don't rewrite the following URLs" list during mail flow. Report the URL as **I've confirmed it's clean** and then select **Allow this URL** to add an allow entry to the Tenant Allow/Block List so the URL isn't scanned or wrapped by Safe Links during mail flow _and_ at time of click. For instructions, see [Report good URLs to Microsoft](submissions-admin.md#report-good-urls-to-microsoft).|
349349
|**Teams**|||||The setting in this section affects time of click protection in Microsoft Teams.|
350350
|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Teams. URLs are not rewritten.** (_EnableSafeLinksForTeams_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
351351
|**Office 365 apps**|||||The setting in this section affects time of click protection in Office apps.|
352352
|**On: Safe Links checks a list of known, malicious links when users click links in Microsoft Office apps. URLs are not rewritten.** (_EnableSafeLinksForOffice_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Use Safe Links in supported Office 365 desktop and mobile (iOS and Android) apps. For more information, see [Safe Links settings for Office apps](safe-links-about.md#safe-links-settings-for-office-apps).|
353353
|**Click protection settings**||||||
354354
|**Track user clicks** (_TrackClicks_)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)|Selected (`$true`)||
355-
|**Let users click through to the original URL** (_AllowClickThrough_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new Safe Links policies that you create in the Defender portal, this setting is selected by default. In new Safe Links policies that you create in PowerShell, the default value of the _AllowClickThrough_ parameter is `$false`.|
355+
|**Let users click through to the original URL** (_AllowClickThrough_)|Selected (`$false`)<sup>\*</sup>|Selected (`$true`)|Not selected (`$false`)|Not selected (`$false`)|<sup>\*</sup> In new policies created in the Defender portal, this setting is selected by default. In new policies created in PowerShell, the default value is `$false`.|
356356
|**Display the organization branding on notification and warning pages** (_EnableOrganizationBranding_)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|Not selected (`$false`)|We have no specific recommendation for this setting. <br/><br/> Before you turn on this setting, you need to follow the instructions in [Customize the Microsoft 365 theme for your organization](/microsoft-365/admin/setup/customize-your-organization-theme) to upload your company logo.|
357357
|**Notification**||||||
358358
|**How would you like to notify your users?** (_CustomNotificationText_ and _UseTranslatedNotificationText_)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|**Use the default notification text** (Blank and `$false`)|We have no specific recommendation for this setting. <br/><br/> You can select **Use custom notification text** (`-CustomNotificationText "<Custom text>"`) to enter and use customized notification text. If you specify custom text, you can also select **Use Microsoft Translator for automatic localization** (`-UseTranslatedNotificationText $true`) to automatically translate the text into the user's language.|

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,12 @@ The following tables present the relevant vulnerability information organized by
4747
| - | Updated CVE-2025-20236 with accurate vulnerability details | 14-July-25 |
4848
| - | Added MDVM support for CVE-2019-0128, CVE-2019-16905, CVE-2019-18278, CVE-2020-24447, CVE-2020-9724, CVE-2021-40776, CVE-2022-31630 | 14-July-25 |
4949
| 108162 | Updated Kernel Modules Core detection logic to ensure more accurate version identification | 15-July-25 |
50+
| 105489 | Improved accuracy for Riot | 15-July-25 |
51+
| - | Improved accuracy for Webex Teams | 15-July-25 |
52+
| 108711 | Updated CVSS Score and Vector String for CVE-2025-6555 | 21-July-25 |
53+
| 105707 | Updated Devolutions Remote Desktop Manager vulnerabilities- CVE-2025-2499, CVE-2025-2528, CVE-2025-2562, CVE-2025-2600 and CVE-2025-5334 with accurate vulnerability details | 22-July-25 |
54+
| 102655 | Updated Netskope vulnerability- CVE-2024-13177 with accurate vulnerability details | 22-July-25 |
55+
| - | Fixed bad normalization in Erlang OTP | 28-July-25 |
5056

5157
## June 2025
5258

unified-secops-platform/mto-distribution-profiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Common reasons for a sync to fail include:
106106

107107
If the issue is with the target tenant, try creating an identical custom detection rule for further diagnosis. If the issue is with accessing the source data, try accessing the custom detection.
108108

109-
A known issue exists with distribution profile errors. In some scenarios, such as when a user without the required permissions selects **See the assignment** on a policy error, an indefinite loading state might be shown without a clear error message. Users might also encounter generic or unclear error messages if Microsoft Entra is temporarily unavailable.
109+
A known issue exists with distribution profile errors. In some scenarios, such as when a user without the required permissions selects **See the assignment** on a policy error, an indefinite loading state might be shown without a clear error message. Users might also encounter generic or unclear error messages if Microsoft Entra is temporarily unavailable. In such cases, close the error message and verify your permissions and Microsoft Entra availability.
110110

111111
## Related content
112112

0 commit comments

Comments
 (0)