Skip to content

Commit 1ad4ef5

Browse files
authored
Merge pull request #986 from MicrosoftDocs/main
Publish main to live 07/19/2024, 3:30 PM
2 parents df3a225 + af5828d commit 1ad4ef5

File tree

4 files changed

+18
-17
lines changed

4 files changed

+18
-17
lines changed

defender-endpoint/microsoft-defender-core-service-configurations-and-experimentation.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: YongRhee-MSFT
77
ms.author: yongrhee
88
manager: deniseb
99
ms.localizationpriority: medium
10-
ms.date: 03/26/2024
10+
ms.date: 07/19/2024
1111
audience: ITPro
1212
ms.topic: troubleshooting
1313
ms.subservice: ngp
@@ -21,6 +21,9 @@ ms.collection:
2121

2222
This article describes the interaction between Microsoft Defender Core Service and the Experimentation and Configuration Service (ECS). Microsoft Defender Core Service is a part of Microsoft Defender Antivirus and communicates with ECS to request and receive different kinds of payloads. These payloads include configurations, feature rollouts, and experiments.
2323

24+
> [!CAUTION]
25+
> If you disable communications with the service, this will affect Microsoft's ability to respond to a severe bug in a timely manner.
26+
2427
> [!IMPORTANT]
2528
> Make sure clients can access the following URLs so payloads can be received:
2629
>
@@ -31,27 +34,25 @@ This article describes the interaction between Microsoft Defender Core Service a
3134
>
3235
>Enterprise U.S. Government customers should allow the following URLs:
3336
> - `*.events.data.microsoft.com`
34-
> - `*.endpoint.security.microsoft.us (GCC-H & DoD)`
35-
> - `*.gccmod.ecs.office.com (GCC-M) *.config.ecs.gov.teams.microsoft.us (GCC-H)`
36-
> - `*.config.ecs.dod.teams.microsoft.us (DoD)`
37+
> - `*.endpoint.security.microsoft.us (GCC-H & DoD)`
38+
> - `*.gccmod.ecs.office.com (GCC-M)`
39+
>- `*.config.ecs.gov.teams.microsoft.us (GCC-H)`
40+
> - `*.config.ecs.dod.teams.microsoft.us (DoD)`
3741
3842
> [!NOTE]
39-
> This applies to Microsoft Defender Antivirus platform update version [4.18.24030](microsoft-defender-antivirus-updates.md) or later.
43+
> The information in this article applies to Microsoft Defender Antivirus platform update version [4.18.24030](microsoft-defender-antivirus-updates.md) or later.
4044
4145
## Configurations
4246

4347
Configurations are the payload meant to ensure product health, security, and privacy compliance, and are intended to have the same value for all the users (based on platforms and channels.) This could be to enable a feature flag for a domain action, and can also be used to disable a feature flag in the event of a bug.
4448

45-
## Controlled Feature Rollout
49+
## Controlled feature rollout
4650

47-
Controlled Feature Rollout (CFR) is a procedure for slowly increasing the size of the user group that receives a feature. By distributing a new feature to a randomly selected subset of the user population, it's possible to compare user feedback to an equally sized control group without the feature to measure the impact of the feature.
51+
Controlled feature rollout (CFR) is a procedure for slowly increasing the size of the user group that receives a feature. By distributing a new feature to a randomly selected subset of the user population, it's possible to compare user feedback to an equally sized control group without the feature to measure the impact of the feature.
4852

4953
## Experiments
5054

51-
Microsoft Defender Core Service builds have features and functionality that are still in development or are experimental. Experiments are like CFR, but the size of the user group is much smaller for testing the new concept. These features are hidden by default until the feature's rolled out or the experiment's finished. Experiment flags are used to enable and disable these features.
52-
53-
> [!CAUTION]
54-
> If you disable communications with the service, this will affect Microsoft's ability to respond to a severe bug in a timely manner.
55+
Currently, Microsoft Defender Core service doesn't do any experimental testing. Development is carried out via the [Gradual Rollout process](/defender-endpoint/manage-gradual-rollout#microsoft-gradual-rollout-model). If this changes, an announcement will be posted in the [Message Center](/microsoft-365/admin/manage/message-center).
5556

5657
## See also
5758

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ For more information on what's new with other Microsoft Defender security produc
4141

4242
## July 2024
4343

44-
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, and if the entity isn't submitted again, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
44+
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
4545

4646
- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.
4747

defender-office-365/submissions-admin.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -288,7 +288,7 @@ After a few moments, the block entry is available on the **URL** tab on the **Te
288288

289289
For spoofed senders, this value is meaningless, because entries for spoofed senders never expire.
290290

291-
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean, and if the email message isn't submitted again.
291+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean.
292292

293293
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
294294

@@ -348,7 +348,7 @@ After a few moments, the associated allow entries appear on the **Domains & addr
348348
- **30 days**
349349
- **Specific date**: The maximum value is 30 days from today.
350350

351-
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email attachment is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email attachment is clean, and if the email attachment isn't submitted again.
351+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email attachment is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email attachment is clean.
352352

353353
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item.
354354

@@ -406,7 +406,7 @@ For URLs reported as false positives, we allow subsequent messages that contain
406406
- **30 days**
407407
- **Specific date**: The maximum value is 30 days from today.
408408

409-
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious URL is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the URL is clean, and if the URL isn't submitted again.
409+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious URL is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the URL is clean.
410410

411411
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item.
412412

@@ -1100,7 +1100,7 @@ In the **Submit to Microsoft for analysis** flyout that opens, do the following
11001100
- **30 days**
11011101
- **Specific date**: The maximum value is 30 days from today.
11021102

1103-
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean, and if the email message isn't submitted again.
1103+
When **45 days after last used date** is selected, the last used date of the allow entry is updated when the malicious email message is encountered during mail flow. The allow entry is kept for 45 days after the filtering system determines that the email message is clean.
11041104

11051105
- **Allow entry note (optional)**: Enter optional information about why you're allowing this item. For spoofed senders, any value you enter here isn't shown in the allow entry on the **Spoofed senders** tab on the **Tenant Allow/Block Lists** page.
11061106

includes/allow-entry-facts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ search.appverid: met150
1616
>
1717
> During mail flow or time of click, if messages containing the entities in the allow entries pass other checks in the filtering stack, the messages are delivered (all filters associated with the allowed entities are skipped). For example, if a message passes [email authentication checks](../defender-office-365/email-authentication-about.md), URL filtering, and file filtering, a message from an allowed sender email address is delivered if it's also from an allowed sender.
1818
>
19-
> By default, allow entries for [domains and email addresses](../defender-office-365/submissions-admin.md#report-good-email-to-microsoft), [files](../defender-office-365/submissions-admin.md#report-good-email-attachments-to-microsoft), and [URLs](../defender-office-365/submissions-admin.md#report-good-urls-to-microsoft) are kept for 45 days after the filtering system determines that the entity is clean. if the entity isn't submitted again, the allow entry is automatically removed after 45 days. Or you can set allow entries to expire up to 30 days after you create them. Allow entries for [spoofed senders](../defender-office-365/tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) never expire.
19+
> By default, allow entries for [domains and email addresses](../defender-office-365/submissions-admin.md#report-good-email-to-microsoft), [files](../defender-office-365/submissions-admin.md#report-good-email-attachments-to-microsoft), and [URLs](../defender-office-365/submissions-admin.md#report-good-urls-to-microsoft) are kept for 45 days after the filtering system determines that the entity is clean, and then the allow entry is removed. Or you can set allow entries to expire up to 30 days after you create them. Allow entries for [spoofed senders](../defender-office-365/tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) never expire.

0 commit comments

Comments
 (0)