Skip to content

Commit 185f2b7

Browse files
authored
Merge branch 'main' into release-note-fornetwork-requirement-updates-feb-2025
2 parents 4f774a2 + ebe1aa9 commit 185f2b7

12 files changed

+29
-30
lines changed

ATPDocs/deploy/activate-capabilities.md

Lines changed: 6 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Set-MDIConfiguration -Mode Domain -Configuration All
8080

8181
## Activate Defender for Identity capabilities
8282

83-
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
83+
After ensuring that your environment is completely configured, activate the Microsoft Defender for Identity capabilities on your domain controller.
8484

8585
Activate the Defender for Identity from the [Microsoft Defender portal](https://security.microsoft.com).
8686

@@ -90,13 +90,10 @@ Activate the Defender for Identity from the [Microsoft Defender portal](https://
9090

9191
2. Select the domain controller where you want to activate the Defender for Identity capabilities and then select **Activate**. Confirm your selection when prompted.
9292

93-
![Activation Defensor.](media/activate-capabilities/1.png)
94-
95-
> [!NOTE]
96-
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they are discovered, or manually, where you select specific domain controllers from the list of eligible servers.
93+
> [!NOTE]
94+
> You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, where you select specific domain controllers from the list of eligible servers.
9795
98-
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
99-
![Sensors page.](media/activate-capabilities/2.png)
96+
3. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers** to jump to the **Settings > Identities > Sensors** page, where you can check your sensor health.
10097

10198
## Onboarding Confirmation
10299

@@ -107,7 +104,7 @@ To confirm the sensor has been onboarded:
107104
2. Check that the onboarded domain controller is listed.
108105

109106
> [!NOTE]
110-
> The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as**Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
107+
> The activation doesn't require a restart/reboot. The first time you activate Defender for Identity capabilities on your domain controller, it may take up to an hour for the first sensor to show as **Running** on the **Sensors** page. Subsequent activations are shown within five minutes.
111108
112109
## Test activated capabilities
113110

@@ -219,8 +216,7 @@ For more information, see [Remediation actions in Microsoft Defender for Identit
219216
If you want to deactivate Defender for Identity capabilities on your domain controller, delete it from the **Sensors** page:
220217
221218
1. In the Defender portal, select **Settings > Identities > Sensors**.
222-
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
223-
![Offboarding defensor.](media/activate-capabilities/3.png)
219+
1. Select the domain controller where you want to deactivate Defender for Identity capabilities, select **Delete**, and confirm your selection.
224220
225221
Deactivating Defender for Identity capabilities from your domain controller doesn't remove the domain controller from Defender for Endpoint. For more information, see [Defender for Endpoint documentation](/microsoft-365/security/defender-endpoint/).
226222

CloudAppSecurityDocs/protect-zoom.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ ms.topic: how-to
1111

1212
Zoom is an online video conferencing and collaboration tool. Zoom holds critical data of your organization, and this makes it a target for malicious actors.
1313

14-
Connecting Zoom to Defender for Cloud Apps gives you improved insights into your users' activities and provides threat detection using machine learning based anomaly detections.
15-
1614
[!INCLUDE [security-posture-management-connector](includes/security-posture-management-connector.md)]
1715

1816
## SaaS security posture management

defender-endpoint/aggregated-reporting.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@ appliesto:
2121

2222
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2323

24-
> [!IMPORTANT]
25-
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
26-
2724
Aggregated reporting addresses constraints on event reporting in Microsoft Defender for Endpoint. Aggregated reporting extends signal reporting intervals to significantly reduce the size of reported events while preserving essential event properties.
2825

2926
Defender for Endpoint reduces noise in collected data to improve the signal-to-noise ratio while balancing product performance and efficiency. It limits data collection to maintain this balance.

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 02/04/2025
18+
ms.date: 02/26/2025
1919
search.appverid: met150
2020
---
2121

@@ -436,7 +436,7 @@ Advanced hunting action type:
436436
- `AsrObfuscatedScriptAudited`
437437
- `AsrObfuscatedScriptBlocked`
438438

439-
Dependencies: Microsoft Defender Antivirus, AntiMalware Scan Interface (AMSI)
439+
Dependencies: Microsoft Defender Antivirus, AntiMalware Scan Interface (AMSI), Cloud Protection
440440

441441
### Block JavaScript or VBScript from launching downloaded executable content
442442

defender-endpoint/device-health-microsoft-defender-antivirus-health.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -100,7 +100,7 @@ For the three `updates` cards (also known as up-to-date reporting cards), "**No
100100
- Computer is disconnected from the network.
101101
- Computer is powered down or in a hibernation state.
102102
- Microsoft Defender Antivirus is disabled.
103-
- Device is a non-Windows (Mac or Linux) device.
103+
- Device is a Mac device.
104104
- Cloud protection isn't enabled.
105105
- Device doesn't meet pre-requisites for Antivirus engine or platform version.
106106

@@ -115,8 +115,8 @@ Up-to-date reporting generates information for devices that meet the following c
115115
- Windows OS - Windows 10 1809 or later
116116

117117
> [!NOTE]
118-
> \* Currently up to date reporting is only available for Windows devices. Cross platform devices such as Mac and Linux are listed under "No data available"/Unknown.
119-
118+
> \* Currently up to date reporting is only available for Windows and Linux devices. Mac devices are listed under “no such data available or unknown".
119+
120120
:::image type="content" source="media/device-health-defender-antivirus-health-tab.png" alt-text="Shows the Microsoft Defender Antivirus Health tab." lightbox="media/device-health-defender-antivirus-health-tab.png":::
121121

122122
### Card functionality

defender-endpoint/edr-in-block-mode.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,12 @@ This article describes EDR in block mode, which helps protect devices that are r
4444

4545
> [!IMPORTANT]
4646
> EDR in block mode cannot provide all available protection when Microsoft Defender Antivirus real-time protection is in passive mode. Some capabilities that depend on Microsoft Defender Antivirus to be the active antivirus solution will not work, such as the following examples:
47-
> - Real-time protection, including on-access scanning, and scheduled scan is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
47+
> - Real-time protection, including on-access scanning, is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
4848
> - Features like **[network protection](network-protection.md)** and **[attack surface reduction rules](attack-surface-reduction.md)** and indicators (file hash, ip address, URL, and certificates) are only available when Microsoft Defender Antivirus is running in active mode.
4949
> It is expected that your non-Microsoft antivirus solution includes these capabilities.
5050
51+
52+
5153
EDR in block mode works behind the scenes to remediate malicious artifacts that were detected by EDR capabilities. Such artifacts might have been missed by the primary, non-Microsoft antivirus product. EDR in block mode allows Microsoft Defender Antivirus to take actions on post-breach, behavioral EDR detections.
5254

5355
EDR in block mode is integrated with [threat & vulnerability management](/defender-vulnerability-management/defender-vulnerability-management) capabilities. Your organization's security team gets a [security recommendation](api/ti-indicator.md) to turn EDR in block mode on if it isn't already enabled.

defender-endpoint/mac-device-control-jamf.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 01/31/2025
18+
ms.date: 02/25/2025
1919
---
2020

2121
# Deploy and manage Device Control using JAMF
@@ -52,7 +52,7 @@ For more information about settings, rules, and groups, see [Device Control for
5252

5353
### Step 2: Validating a JSON policy
5454

55-
You must validate your JSON policy after it's created to ensure there are no syntax or configuration errors. A schema for device control policies is available in [our GitHub repository](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json"https://github.com/microsoft/mdatp-devicecontrol/blob/main/macos/policy/device_control_policy_schema.json"). The Defender for Endpoint application has built-in functionality to compare your JSON to the defined schema. 
55+
You must validate your JSON policy after it's created to ensure there are no syntax or configuration errors. A schema for device control policies is available in [our GitHub repository](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json). The Defender for Endpoint application has built-in functionality to compare your JSON to the defined schema. 
5656

5757
1. Save your configuration on a local device as a `.json` file.
5858

defender-endpoint/minimum-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: pahuijbr
88
ms.localizationpriority: medium
9-
ms.date: 01/13/2025
9+
ms.date: 02/26/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -97,7 +97,7 @@ Supported versions of Windows include:
9797
- Azure Virtual Desktop
9898
- Windows 365 running one of the previously listed operating systems/versions
9999

100-
The following operating systems require the use of the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA) to work with Defender for Endpoint:
100+
The following operating systems work with Defender for Endpoint, provided you're using the [Log Analytics](/azure/azure-monitor/agents/log-analytics-agent) / [Microsoft Monitoring Agent](update-agent-mma-windows.md) (MMA):
101101

102102
- Windows 8.1 Enterprise
103103
- Windows 8.1 Pro

defender-endpoint/onboard-windows-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 01/29/2025
16+
ms.date: 02/25/2025
1717
---
1818

1919
# Defender for Endpoint onboarding Windows Server
@@ -69,7 +69,7 @@ For other Windows server versions, you have two options to offboard Windows serv
6969
- Remove the Defender for Endpoint workspace configuration
7070

7171
> [!NOTE]
72-
> These offboarding instructions for other Windows server versions also apply if you are running the previous Microsoft Defender for Endpoint for Windows Server 2016 and Windows Server 2012 R2 that requires the MMA. Instructions to migrate to the new unified solution are at [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
72+
> The offboarding instructions in this article apply to previous versions of Windows Server, such as Windows Server 2016 and Windows Server 2012 R2 using the MMA. To migrate to the new, unified solution, see [Server migration scenarios in Microsoft Defender for Endpoint](server-migration.md).
7373
7474
## Related articles
7575

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ For more information on what's new with other Microsoft Defender security produc
4646
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4747
- [What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
4848

49+
## February 2025
50+
51+
- (GA) **Aggregated reporting in Microsoft Defender for Endpoint** is now generally available. For more information, see [Aggregated reporting in Microsoft Defender for Endpoint](aggregated-reporting.md).
4952

5053
## January 2025
5154

0 commit comments

Comments
 (0)