Skip to content

Commit 18dbeb1

Browse files
authored
Merge branch 'main' into WI448647-ao-agents-real-time-protection
2 parents 1186a35 + 1d365ed commit 18dbeb1

File tree

69 files changed

+220
-109
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

69 files changed

+220
-109
lines changed

ATPDocs/remove-inactive-service-account.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ ms.topic: how-to
66
#customer intent: As a security administrator, I want to improve security posture in my organization by removing inactive service accounts
77
---
88

9-
# Security Assessment: Remove Inactive Service Accounts (Preview)
9+
# Security Assessment: Remove Stale Service Accounts (Preview)
1010

11-
This recommendation lists Active Directory service accounts detected as inactive (stale) within the past 180 days.
11+
This recommendation lists Active Directory service accounts detected as stale within the past 90 days.
1212

13-
## Why do inactive service accounts pose a risk?
13+
## Why do stale service accounts pose a risk?
1414

15-
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Dormant service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
15+
Unused service accounts create significant security risks, as some of them can carry elevated privileges. If attackers gain access, the result can be substantial damage. Stale service accounts might retain high or legacy permissions. When compromised, they provide attackers with discreet entry points into critical systems, granting far more access than a standard user account.
1616

1717
This exposure creates several risks:
1818

@@ -25,10 +25,9 @@ This exposure creates several risks:
2525

2626
To use this security assessment effectively, follow these steps:
2727

28-
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions ) for Remove inactive service account.
29-
1. Review the list of exposed entities to discover which of your service account is inactive.
28+
1. Review the recommended action at [https://security.microsoft.com/securescore?viewid=actions ](https://security.microsoft.com/securescore?viewid=actions) for Remove stale service account.
3029

31-
:::image type="content" source="media/okta-integration/remove-inactive-service-accounts.png" alt-text="Screenshot that shows the recommendation action to remove inactive service accounts." lightbox="media/okta-integration/remove-inactive-service-accounts.png":::
30+
1. Review the list of exposed entities to discover which of your service accounts are stale and have not performed any login activity in the last 90 days.
3231

3332
1. Take appropriate actions on those entities by removing the service account. For example:
3433

ATPDocs/whats-new.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,11 @@ Previously, Defender for Identity tenants received Entra ID risk level in the Id
4242

4343
For UEBA tenants without a Microsoft Defender for Identity license, synchronization of Entra ID risk level to the IdentityInfo table remains unchanged.
4444

45-
### New security assessment: Remove inactive service accounts (Preview)
45+
### New security assessment: Remove stale service accounts (Preview)
4646

47-
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been inactive (stale) for the past 180 days, to help you mitigate security risks associated with unused accounts.
47+
Microsoft Defender for Identity now includes a new security assessment that helps you identify and remove inactive service accounts in your organization. This assessment lists Active Directory service accounts that have been stale for the past 90 days, to help you mitigate security risks associated with unused accounts.
4848

49-
For more information, see: [Security Assessment: Remove Inactive Service Accounts (Preview)](remove-inactive-service-account.md)
49+
For more information, see: Security Assessment: [Remove Stale Service Accounts (Preview)](/defender-for-identity/remove-inactive-service-account)
5050

5151
### New Graph based API for response actions (preview)
5252

defender-endpoint/android-whatsnew.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@
22
title: What's new in Microsoft Defender for Endpoint on Android
33
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on Android.
44
ms.service: defender-endpoint
5-
ms.author: ewalsh
6-
author: emmwalshh
5+
ms.author: lwainstein
6+
author: lwainstein
77
ms.localizationpriority: medium
8-
manager: deniseb
8+
manager: bagol
99
ms.reviewer: denishdonga
1010
audience: ITPro
1111
ms.collection:

defender-endpoint/ios-whatsnew.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: What's new in Microsoft Defender for Endpoint on iOS
33
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on iOS.
44
ms.service: defender-endpoint
5-
ms.author: ewalsh
6-
author: emmwalshh
5+
ms.author: lwainstein
6+
author: lwainstein
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
99
ms.date: 08/12/2025
10-
manager: deniseb
10+
manager: bagol
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security

defender-endpoint/linux-whatsnew.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
title: What's new in Microsoft Defender for Endpoint on Linux
33
description: List of major changes for Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
5-
ms.author: ewalsh
6-
author: emmwalshh
5+
ms.author: lwainstein
6+
author: lwainstein
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
99
ms.date: 08/19/2025
10-
manager: deniseb
10+
manager: bagol
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security

defender-endpoint/mac-whatsnew.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: What's new in Microsoft Defender for Endpoint on macOS
33
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on macOS.
44
ms.service: defender-endpoint
5-
author: paulinbar
6-
ms.author: painbar
7-
manager: orspodek
5+
author: lwainstein
6+
ms.author: lwainstein
7+
manager: bagol
88
ms.localizationpriority: medium
99
ms.date: 08/20/2025
1010
audience: ITPro

defender-endpoint/mde-demonstration-amsi.md

Lines changed: 124 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
ms.topic: how-to
14-
ms.date: 08/19/2025
14+
ms.date: 09/01/2025
1515
search.appverid: met150
1616
ms.custom:
1717
- partner-contribution
@@ -52,17 +52,34 @@ In this demonstration article, you have two engine choices to test AMSI:
5252
```powershell
5353
$testString = "AMSI Test Sample: " + "7e72c3ce-861b-4339-8740-0ac1484c1386"
5454
Invoke-Expression $testString
55-
```
55+
```powershell
5656
57-
2. On your device, open PowerShell as an administrator.
57+
1. On your device, open PowerShell as an administrator.
5858
59-
3. Type `Powershell -ExecutionPolicy Bypass AMSI_PoSh_script.ps1`, and then press **Enter**.
59+
1. Type `Powershell -ExecutionPolicy Bypass AMSI_PoSh_script.ps1`, and then press **Enter**.
6060
6161
The result should be as follows:
6262
63-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-powershell-results.png" alt-text="Screenshot showing the results of the AMSI test sample. It should show a threat was detected." lightbox="media/mde-demonstrations-amsi/test-amsi-powershell-results.png":::
63+
```powershell
64+
Invoke-Expression : At line:1 char:1
65+
66+
+ AMSI Test Sample: 7e72c3ce-861b-4339-8740-8ac1484c1386
67+
68+
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
69+
70+
This script contains malicious content and has been blocked by your antivirus software.
71+
72+
At C:\Users\Admin\Desktop\AMSI_PoSh_script.ps1:3 char:1
73+
74+
+ Invoke-Expression $testString
75+
76+
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
77+
78+
+ CategoryInfo : ParserError: (:) [Invoke-Expression], ParseException
79+
80+
+ FullyQualifiedErrorId : ScriptContainedMaliciousContent,Microsoft.PowerShell.Commands.InvokeExpressionCommand
81+
```
6482
65-
6683
### Testing AMSI with VBScript
6784
6885
1. Save the following VBScript as `AMSI_vbscript.vbs`:
@@ -74,20 +91,63 @@ In this demonstration article, you have two engine choices to test AMSI:
7491
WScript.Echo result
7592
```
7693

77-
2. On your Windows Device, open Command Prompt as an administrator.
94+
1. On your Windows Device, open Command Prompt as an administrator.
7895

7996
1. Type `wscript AMSI_vbscript.vbs`, and then press **Enter**.
8097

8198
The result should be as follows:
8299

83-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png" alt-text="Screenshot showing the AMSI test results. It should show that antivirus software blocked the script." lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png":::
100+
```vbscript
101+
Windows Script Host
102+
103+
Script: C:\Users\Admin\Desktop\AMSI_vbscript.vbs
104+
105+
Line: 3
106+
107+
Char: 1
108+
109+
Error: This script contains malicious content and has been blocked by your antivirus software.: 'eval'
84110

111+
Code: 800A802D
112+
113+
Source: Microsoft VBScript runtime error
114+
```
85115

86116
### Verifying the test results
87117

88118
In your protection history, you should be able to see the following information:
89119

90-
:::image type="content" source="media/mde-demonstrations-amsi/verifying-results.png" alt-text="Screenshot showing the AMSI test results. The information should show that a threat was blocked and cleaned." lightbox="media/mde-demonstrations-amsi/verifying-results.png":::
120+
```vbscript
121+
Threat blocked
122+
123+
Detected: Virus: Win32/MpTest!amsi
124+
125+
Status: Cleaned
126+
127+
This threat or app was cleaned or quarantined before it became active on your device.
128+
129+
Details: This program is dangerous and replicates by infecting other files.
130+
131+
Affected items:
132+
133+
amsi: \Device\HarddiskVolume3\Windows\System32\WindowsPowershell\v1.0\powershell.exe
134+
135+
or
136+
137+
amsi: C:\Users\Admin\Desktop\AMSI_vbscript.vbs
138+
139+
and/or you might see:
140+
141+
Threat blocked
142+
143+
Detected: Virus: Win32/MpTest!amsi
144+
145+
Status: Cleaned
146+
147+
This threat or app was cleaned or quarantined before it became active on your device.
148+
149+
Details: This program is dangerous and replicates by infecting other files
150+
```
91151

92152
### Get the list of Microsoft Defender Antivirus threats
93153

@@ -101,17 +161,68 @@ You can view detected threats by using the Event log or PowerShell.
101161

102162
3. Look for `event ID 1116`. You should see the following information:
103163

104-
:::image type="content" source="media/mde-demonstrations-amsi/eventid1116.png" alt-text="Screenshot showing Event ID 1116, which says malware or unwanted software was detected." lightbox="media/mde-demonstrations-amsi/eventid1116.png":::
164+
```powershell
165+
166+
Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
167+
168+
For more information please see the following: https://go.microsoft.com/fwlink/?linkid=37020&name=Virus:Win32/MpTest!amsi&t
169+
170+
Name: Virus:Win32/MpTest!amsi
171+
172+
ID: 2147694217
173+
174+
Severity: Severe
175+
176+
Category: Virus
177+
178+
Path: \Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or C:\Users\Admin\Desktop\AMSI_jscri
179+
180+
Detection Origin: Local machine or Unknown
181+
182+
Detection Type: Concrete
183+
184+
Detection Source: System
185+
186+
User: NT AUTHORITY\SYSTEM
105187
106-
##### Use PowerShell
188+
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or C:\Windows\System32\cscript.exe or C:\Windows\Sy
189+
190+
Security intelligence Version: AV: 1.419.221.0, AS: 1.419.221.0, NIS: 1.419.221.0
191+
192+
Engine Version: AM: 1.1.24080.9, NIS: 1.1.24080.9
193+
```
194+
195+
#### Use PowerShell
107196

108197
1. On your device, open PowerShell.
109198

110-
2. Type the following command: `Get-MpThreat`.
199+
1. Type the following command: `Get-MpThreat`.
111200

112201
You might see the following results:
113202

114-
:::image type="content" source="media/mde-demonstrations-amsi/get-mpthreat-results.png" alt-text="Screenshot showing the results of the Get-MpThreat command. It should show that an AMSI threat was detected." lightbox="media/mde-demonstrations-amsi/get-mpthreat-results.png":::
203+
```powershell
204+
CategoryID : 42
205+
206+
DidThreatExecute : True
207+
208+
IsActive : True
209+
210+
Resources :
211+
212+
RollupStatus : 97
213+
214+
SchemaVersion : 1.0.0.0
215+
216+
SeverityID : 5
217+
218+
ThreatID : 2147694217
219+
220+
ThreatName : Virus:Win32/MpTest!amsi
221+
222+
TypeID : 0
223+
224+
PSComputerName :
225+
```
115226
116227
117228
## See also

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: limwainstein
88
ms.reviewer: noamhadash, pahuijbr, yongrhee
99
ms.localizationpriority: medium
1010
ms.date: 08/20/2025
11-
manager: orspodek
11+
manager: bagol
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -44,11 +44,8 @@ Learn more:
4444

4545
|Feature |Preview/GA |Description |
4646
|---------|------------|-------------|
47-
|[Microsoft Defender Core service](/defender-endpoint/microsoft-defender-core-service-overview) |GA |- Microsoft Defender Core service, now in GA, helps with the stability and performance of Microsoft Defender Antivirus.<br>- Support for Azure Stack HCI OS is rolling out across commercial and government clouds.|
48-
49-
## July 2025
50-
51-
- (Preview) Added support for Azure Stack HCI OS, version 23H2 and later. This support will roll out gradually across all clouds and regions in July.
47+
|Azure Stack HCI OS support (version 23H2 and later) |Preview |Added support for Azure Stack HCI OS, version 23H2 and later. Support for Azure Stack HCI OS is rolling out across commercial and government clouds. |
48+
|[Microsoft Defender Core service](/defender-endpoint/microsoft-defender-core-service-overview) |GA |Microsoft Defender Core service, now in GA, helps with the stability and performance of Microsoft Defender Antivirus.|
5249

5350
## April 2025
5451

defender-endpoint/whats-new-mde-archive.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ description: See what features were available for Microsoft Defender for Endpoin
44
search.appverid: met150
55
ms.service: defender-endpoint
66
ms.subservice: reference
7-
ms.author: ewalsh
8-
author: emmwalshh
7+
ms.author: lwainstein
8+
author: lwainstein
99
ms.localizationpriority: medium
1010
ms.date: 04/04/2025
11-
manager: deniseb
11+
manager: bagol
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security

defender-endpoint/windows-whatsnew.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ title: What's new in Microsoft Defender for Endpoint on Windows
33
description: Learn about the latest feature releases of Microsoft Defender for Endpoint on Windows Client and Server.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: lwainstein
7+
author: lwainstein
88
ms.localizationpriority: medium
99
ms.date: 06/11/2025
10-
manager: deniseb
10+
manager: bagol
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security

0 commit comments

Comments
 (0)