Skip to content

Commit 1c156ce

Browse files
authored
Merge branch 'main' into WI423594-add-video-to-saas-initiative-article
2 parents 82fea5c + 244d9f2 commit 1c156ce

File tree

50 files changed

+740
-366
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+740
-366
lines changed

.github/workflows/StaleBranch.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@ name: (Scheduled) Stale branch removal
22

33
permissions:
44
contents: write
5+
pull-requests: read
56

67
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
78
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.

CloudAppSecurityDocs/azip-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Follow these instructions to create the file policy:
144144

145145
1. You can get more information about these files and their sensitivity labels in the file drawer. Just select the relevant file in the **Files** page and check whether it has a sensitivity label.
146146

147-
![File drawer.](media/file-drawer.png)
147+
:::image type="content" source="media/file-policies/file-drawer.png" alt-text="Screenshot showing the file drawer." lightbox="media/file-policies/file-drawer.png":::
148148

149149
1. Then, you can create file policies in Defender for Cloud Apps to control files that are shared inappropriately and find files that are labeled and were recently modified.
150150

CloudAppSecurityDocs/data-protection-policies.md

Lines changed: 163 additions & 27 deletions
Large diffs are not rendered by default.
File renamed without changes.
49.2 KB
Loading
24.2 KB
Loading
8.38 KB
Loading

defender-endpoint/TOC.yml

Lines changed: 27 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -252,14 +252,14 @@
252252
href: manage-sys-extensions-using-jamf.md
253253
- name: Manual deployment
254254
href: manage-sys-extensions-manual-deployment.md
255-
255+
256256
- name: Defender for Endpoint on Linux
257257
items:
258258
- name: Deploy Defender for Endpoint on Linux
259259
items:
260-
- name: 1 - Prerequisites
260+
- name: Prerequisites
261261
href: mde-linux-prerequisites.md
262-
- name: 2 - Choose a deployment method
262+
- name: Choose a deployment method
263263
items:
264264
- name: Installer script based deployment
265265
href: linux-installer-script.md
@@ -277,28 +277,28 @@
277277
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
278278
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
279279
href: mde-linux-deployment-on-sap.md
280-
- name: 3 - Configuration
280+
- name: Configure Defender for Endpoint on Linux
281+
items:
282+
- name: Configure security policies and settings
283+
href: linux-preferences.md
284+
- name: Static proxy configuration
285+
href: linux-static-proxy-configuration.md
286+
- name: Configure antivirus scans
281287
items:
282-
- name: Configure security policies and settings
283-
href: linux-preferences.md
284-
- name: Static proxy configuration
285-
href: linux-static-proxy-configuration.md
286-
- name: Configure antivirus scans
287-
items:
288-
- name: Schedule antivirus scans using Anacron
289-
href: schedule-antivirus-scan-anacron.md
290-
- name: Schedule antivirus scans using Crontab
291-
href: schedule-antivirus-scan-crontab.md
292-
- name: Network protection for Linux
293-
href: network-protection-linux.md
294-
- name: Configure and validate exclusions on Linux
295-
href: linux-exclusions.md
296-
- name: Configure eBPF-based sensor
297-
href: linux-support-ebpf.md
298-
- name: Detect and block Potentially Unwanted Applications
299-
href: linux-pua.md
300-
- name: Configure Offline Security Intelligence Update
301-
href: linux-support-offline-security-intelligence-update.md
288+
- name: Schedule antivirus scans using Anacron
289+
href: schedule-antivirus-scan-anacron.md
290+
- name: Schedule antivirus scans using Crontab
291+
href: schedule-antivirus-scan-crontab.md
292+
- name: Network protection for Linux
293+
href: network-protection-linux.md
294+
- name: Configure and validate exclusions on Linux
295+
href: linux-exclusions.md
296+
- name: Configure eBPF-based sensor
297+
href: linux-support-ebpf.md
298+
- name: Detect and block Potentially Unwanted Applications
299+
href: linux-pua.md
300+
- name: Configure Offline Security Intelligence Update
301+
href: linux-support-offline-security-intelligence-update.md
302302
- name: Update Defender for Endpoint on Linux
303303
items:
304304
- name: Update Defender for Endpoint on Linux
@@ -307,7 +307,7 @@
307307
href: linux-update-mde-linux.md
308308
- name: Privacy for Defender for Endpoint on Linux
309309
href: linux-privacy.md
310-
- name: Resources for Microsoft Defender for Endpoint on Linux
310+
- name: Additional resources for Defender for Endpoint on Linux
311311
href: linux-resources.md
312312
- name: Mobile Threat Defense
313313
items:
@@ -781,6 +781,8 @@
781781
- name: Configure Microsoft Defender Antivirus scans
782782
href: schedule-antivirus-scans.md
783783
items:
784+
- name: Schedule scans using Intune
785+
href: schedule-antivirus-scans-intune.md
784786
- name: Schedule scans using Group Policy
785787
href: schedule-antivirus-scans-group-policy.md
786788
- name: Schedule scans using PowerShell

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/04/2025
18+
ms.date: 04/30/2025
1919
search.appverid: met150
2020
---
2121

@@ -253,8 +253,8 @@ For rules with the "Rule State" specified:
253253

254254
> [!NOTE]
255255
> To protect your environment from vulnerable drivers, you should first implement these:
256-
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
257-
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
256+
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
257+
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
258258
> For Windows 11 or later, and Windows Server core 1809 or later, or Windows Server 2019 or later, you should also enable [Microsoft Windows vulnerable driver blocklist](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules),
259259
> Then as another layer of defense, you should enable this attack surface reduction rule.
260260
@@ -544,7 +544,9 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
544544
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
545545

546546
> [!NOTE]
547-
> If `CcmExec.exe` (SCCM Agent) is detected on the device, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
547+
> If you're utilizing Configuration Manager (CM, previously known as MEMCM or SCCM) with CcmExec.exe` (SCCM Agent), we recommend running it in audit mode for at least 60 days.
548+
> Once you're prepared to switch to block mode, ensure you deploy the appropriate ASR rules, considering any necessary rule exclusions.
549+
548550

549551
Intune name: `Persistence through WMI event subscription`
550552

defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md

Lines changed: 15 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Windows Server includes automatic exclusions, based on server role.
66
ms.service: defender-endpoint
77
ms.subservice: ngp
88
ms.localizationpriority: medium
9-
ms.date: 03/28/2025
9+
ms.date: 05/01/2025
1010
author: emmwalshh
1111
ms.author: ewalsh
1212
ms.topic: conceptual
@@ -30,21 +30,17 @@ search.appverid: met150
3030

3131
- Windows Server
3232

33+
## Important notes about automatic exclusions on Windows Server
3334

34-
> [!IMPORTANT]
35-
> ## Important notes about automatic exclusions on Windows Server
36-
>
37-
> - [Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
38-
> - Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
39-
> - Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
40-
> - Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
41-
> - Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
42-
> - Appropriate exclusions must be set for software that isn't included with the operating system.
43-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in and automatic exclusions.
35+
- [Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
36+
- Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
37+
- Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
38+
- Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
39+
- Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
40+
- Appropriate exclusions must be set for software that isn't included with the operating system.
41+
- The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes.
4442

45-
## Overview
46-
47-
This article describes types of exclusions that you don't have to define for Microsoft Defender Antivirus:
43+
This article describes the two main types of exclusions that you don't have to define for Microsoft Defender Antivirus:
4844

4945
- [Automatic exclusions](#automatic-server-role-exclusions) for roles on Windows Server 2016 and later.
5046
- [Built-in exclusions](#built-in-exclusions) for operating system files on all versions of Windows.
@@ -240,10 +236,9 @@ This section lists the folder exclusions that are delivered automatically when y
240236

241237
## Built-in exclusions
242238

243-
> [!NOTE]
244-
> - Please see [Important Notes](#important-notes-about-automatic-exclusions-on-windows-server)
245-
> - Default locations could be different than the locations that are described in this article.
246-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
239+
Make sure to review [Important notes about automatic exclusions](#important-notes-about-automatic-exclusions-on-windows-server) (in this article). Keep in mind that default locations could be different than the locations that are described in this article.
240+
241+
The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
247242

248243
Because Microsoft Defender Antivirus is built into Windows, it doesn't require exclusions for operating system files on any version of Windows.
249244

@@ -396,9 +391,7 @@ If necessary, you can add or remove custom exclusions. To do that, see the follo
396391
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
397392
- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)
398393
- [Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)
399-
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
400-
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
401-
- [Configure Defender for Endpoint on Android features](android-configure.md)
402-
- [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
394+
- [Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint](onboard-client.md)
395+
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
403396

404397
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)