Skip to content

Commit 1ce9032

Browse files
authored
Merge branch 'main' into poliveria-dex-mdc-ga-07072025
2 parents 8f10b34 + e385a3a commit 1ce9032

File tree

162 files changed

+2462
-2290
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

162 files changed

+2462
-2290
lines changed

.openpublishing.redirection.defender-office-365.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,11 @@
5959
"source_path": "defender-office-365/step-by-step-guides/deploy-and-configure-the-report-message-add-in.md",
6060
"redirect_url": "/defender-office-365/submissions-outlook-report-messages",
6161
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "defender-office-365/tenant-wide-setup-for-increased-security.md",
65+
"redirect_url": "/security/zero-trust/zero-trust-identity-device-access-policies-overview",
66+
"redirect_document_id": false
6267
}
6368
]
6469
}

ATPDocs/deploy/deploy-defender-identity.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ Identify your architecture and your requirements, and then use the table below t
2323
|Server configuration |Server Operating System |Recommended deployment |
2424
|---------|---------|---------|---------|
2525
|Domain controller | Windows Server 2019 or later with the [March 2024 Cumulative Update](https://support.microsoft.com/topic/march-12-2024-kb5035857-os-build-20348-2340-a7953024-bae2-4b1a-8fc1-74a17c68203c) or later.<br> * **See Note**.|[Defender for Identity sensor v3.x (Preview)](prerequisites-sensor-version-3.md)<br> * **See Note**. |
26-
|Domain controller |Windows Server 2016 or earlier |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
27-
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md) | NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
28-
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md) | NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
29-
|[Entra Connect](active-directory-federation-services.md)| NA |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
26+
|Domain controller |Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
27+
|[Active Directory Federation Services (AD FS)](active-directory-federation-services.md) | Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
28+
|[Active Directory Certificate Services (AD CS)](active-directory-federation-services.md) | Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
29+
|[Entra Connect](active-directory-federation-services.md)| Windows Server 2016 or later |[Defender for Identity sensor v2.x](prerequisites-sensor-version-2.md) |
3030

3131
> [!NOTE]
3232
> The Defender for Identity sensor version 3.x is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.

ATPDocs/whats-new.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## August 2025
2727

28-
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks - note that the number of triggered alerts may increase.
28+
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks. As a result, the number of triggered alerts might increase.
2929

3030
## July 2025
3131

@@ -37,17 +37,17 @@ For more information, see [Configure scoped access for Microsoft Defender for Id
3737

3838
### New security posture assessments for unmonitored identity servers
3939

40-
Microsoft Defender for Identity now includes three security posture assessments that detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
40+
Microsoft Defender for Identity three new security posture assessments detect when Microsoft Entra Connect, Active Directory Federation Services (ADFS), or Active Directory Certificate Services (ADCS) servers are present in your environment but aren't monitored.
4141

4242
Use these assessments to improve monitoring coverage and strengthen your hybrid identity security posture.
4343

44-
For more details, see:
44+
For more information, see:
4545

4646
[Security Assessment: Unmonitored ADCS servers](unmonitored-active-directory-certificate-services-server.md)
4747

4848
[Security Assessment: Unmonitored ADFS servers](unmonitored-active-directory-federation-services-servers.md)
4949

50-
[Security Assessment: Unmonitored Entra Connect servers](unmonitored-entra-connect-servers.md)
50+
[Security Assessment: Unmonitored Microsoft Entra Connect servers](unmonitored-entra-connect-servers.md)
5151

5252

5353

@@ -65,7 +65,7 @@ Scoping by Active Directory domains helps:
6565

6666
- Support operational boundaries: Align access for SOC analysts, identity administrators, and regional teams.
6767

68-
For more information see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
68+
For more information, see: [Configure scoped access for Microsoft Defender for Identity](configure-scoped-access.md).
6969

7070

7171
### Okta integration is now available in Microsoft Defender for Identity
@@ -106,7 +106,7 @@ Defender for Identity now supports deploying its new sensor on Domain Controller
106106
The Activation Page now displays all servers from your device inventory, including those not currently eligible for the new Defender for Identity sensor. This enhancement increases transparency into sensor eligibility, helping you identify noneligible servers and take action to update and onboard them for enhanced identity protection.
107107

108108

109-
### Local administrators collection (using SAM-R queries) feature will be disabled
109+
### Local administrators collection (using SAM-R queries) feature is disabled
110110
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change occurs automatically by the specified date, and no administrative action is required.
111111

112112
### New Health Issue
@@ -152,7 +152,7 @@ For more information, see: [Investigate and protect Service Accounts | Microsoft
152152

153153
### Enhanced Identity Inventory
154154

155-
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.
155+
The Identities page under *Assets* was updated to provide better visibility and management of identities across your environment.
156156
The updated Identities Inventory page now includes the following tabs:
157157

158158
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -406,8 +406,8 @@ This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
406406

407407
> [!IMPORTANT]
408408
> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
409-
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and isn't specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
410-
> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
409+
> This rule uses cloud-delivered protection to update its trusted list regularly.
410+
> You can specify individual files or folders by using folder paths or fully qualified resource names. It also supports the **ASROnlyPerRuleExclusions** setting.
411411
412412
Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
413413

defender-endpoint/mac-whatsnew.md

Lines changed: 24 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -70,12 +70,24 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
7070

7171
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
7272

73+
### Jul-2025 (Build: 101.25062.0005 | Release version: 20.125062.5.0)
74+
75+
| Build: | **101.25062.0005** |
76+
|--------------------|----------------------|
77+
| Release version: | **20.125062.5.0** |
78+
| Engine version: | **1.1.25040.3000** |
79+
| Signature version: | **1.427.248.0** |
80+
81+
##### What's new
82+
83+
- Bug and performance fixes
84+
7385
### Jun-2025 (Build: 101.25052.0012 | Release version: 20.125052.12.0)
7486

75-
| Build: | **101.25052.0012** |
76-
|--------------------|-----------------------|
77-
| Release version: | **20.125052.12.0** |
78-
| Engine version: | **1.1.25060.3000** |
87+
| Build: | **101.25052.0012** |
88+
|--------------------|----------------------|
89+
| Release version: | **20.125052.12.0** |
90+
| Engine version: | **1.1.25060.3000** |
7991
| Signature version: | **1.431.226.0** |
8092

8193
##### What's new
@@ -84,10 +96,10 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
8496

8597
### May-2025 (Build: 101.25042.0009 | Release version: 20.125042.9.0)
8698

87-
| Build: | **101.25042.0009** |
88-
|--------------------|-----------------------|
89-
| Release version: | **20.125042.9.0** |
90-
| Engine version: | **1.1.25040.3000** |
99+
| Build: | **101.25042.0009** |
100+
|--------------------|----------------------|
101+
| Release version: | **20.125042.9.0** |
102+
| Engine version: | **1.1.25040.3000** |
91103
| Signature version: | **1.429.521.0** |
92104

93105
##### What's new
@@ -97,10 +109,10 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
97109

98110
### Apr-2025 (Build: 101.25032.0006 | Release version: 20.125032.6.0)
99111

100-
| Build: | **101.25032.0006** |
101-
|--------------------|-----------------------|
102-
| Release version: | **20.125032.6.0** |
103-
| Engine version: | **1.1.25020.3000** |
112+
| Build: | **101.25032.0006** |
113+
|--------------------|----------------------|
114+
| Release version: | **20.125032.6.0** |
115+
| Engine version: | **1.1.25020.3000** |
104116
| Signature version: | **1.427.158.0** |
105117

106118
##### What's new

defender-endpoint/microsoft-defender-core-service-overview.md

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -33,37 +33,50 @@ To enhance your endpoint security experience, Microsoft is releasing the Microso
3333
- Mid April 2024 to Enterprise customers running Windows clients.
3434
- Beginning of July 2024 to U.S. Government customers running Windows clients.
3535

36-
- Mid January 2025 to Enterprise customers running Windows Server.
36+
The Microsoft Defender Core service for Windows Server is releasing with [Microsoft Defender Antivirus platform version 4.18.25050.5.](/defender-endpoint/microsoft-defender-antivirus-updates)
3737

38-
3. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
38+
- Mid July 2025 to Enterprise customers running Windows Server 2019 or later.
39+
40+
- Mid September 2025 to Enterprise customers running the [unified Microsoft Defender for Endpoint client](/defender-endpoint/update-agent-mma-windows) for Windows Server 2012 R2 or Windows Server 2016.
41+
42+
1. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
3943

40-
4. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:
44+
1. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:
4145

4246
Enterprise customers should allow the following URLs:
4347

4448
- `*.endpoint.security.microsoft.com`
49+
4550
- `ecs.office.com/config/v1/MicrosoftWindowsDefenderClient`
51+
4652
- `*.events.data.microsoft.com`
4753

4854
If you don't want to use the wildcards for `*.events.data.microsoft.com`, you can use:
4955

5056
- `us-mobile.events.data.microsoft.com/OneCollector/1.0`
5157
- `eu-mobile.events.data.microsoft.com/OneCollector/1.0`
58+
5259
- `uk-mobile.events.data.microsoft.com/OneCollector/1.0`
60+
5361
- `au-mobile.events.data.microsoft.com/OneCollector/1.0`
62+
5463
- `mobile.events.data.microsoft.com/OneCollector/1.0`
55-
64+
5665
Enterprise U.S. Government customers should allow the following URLs:
5766

5867
- `*.events.data.microsoft.com`
68+
5969
- `*.endpoint.security.microsoft.us (GCC-H & DoD)`
70+
6071
- `*.gccmod.ecs.office.com (GCC-M)`
72+
6173
- `*.config.ecs.gov.teams.microsoft.us (GCC-H)`
74+
6275
- `*.config.ecs.dod.teams.microsoft.us (DoD)`
6376

64-
5. If you're using [Application Control for Windows](/windows/security/application-security/application-control/windows-defender-application-control/wdac), or you're running non-Microsoft antivirus or endpoint detection and response software, make sure to add the processes mentioned earlier to your allowlist.
77+
1. If you're using [Application Control for Windows](/windows/security/application-security/application-control/windows-defender-application-control/wdac), or you're running non-Microsoft antivirus or endpoint detection and response software, make sure to add the processes mentioned earlier to your allowlist.
6578

66-
6. Consumers don't need to take any actions to prepare.
79+
1. Consumers don't need to take any actions to prepare.
6780

6881
## Microsoft Defender Antivirus processes and services
6982

@@ -191,7 +204,8 @@ On the script page of the Run Script wizard, choose your script from the list (M
191204
#### Use the Registry to update the policies for Microsoft Defender Core service.
192205

193206
1. Select **Start**, and then open Regedit.exe as an administrator.
194-
2. Go to `HKLM\Software\Policies\Microsoft\Windows Defender\Features`
207+
1. Go to `HKLM\Software\Policies\Microsoft\Windows Defender\Features`
208+
195209
3. Set the values:
196210

197211
`DisableCoreService1DSTelemetry` (dword) 0 (hex)

0 commit comments

Comments
 (0)