Skip to content

Commit 1da0c2e

Browse files
authored
Merge pull request #3010 from MicrosoftDocs/winserver2025
Winserver2025
2 parents 0178b1c + eef5d05 commit 1da0c2e

24 files changed

+183
-164
lines changed

defender-endpoint/aggregated-reporting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier3
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 01/21/2025
15+
ms.date: 03/04/2025
1616
appliesto:
1717
- Microsoft Defender for Endpoint Plan 2
1818
---
@@ -38,8 +38,8 @@ The following requirements must be met before turning on aggregated reporting:
3838

3939
Aggregated reporting supports the following:
4040

41-
- Client version: Windows version 2411 and above
42-
- Operating systems: Windows 11 22H2, Windows Server 2022, Windows 11 Enterprise, Windows 10 20H2, 21H1, 21H2, Windows Server version 20H2, and Windows Server 2019
41+
- Client version: Windows version 2411 and later
42+
- Operating systems: Windows 11 22H2, Windows 11 Enterprise, Windows 10 20H2, 21H1, 21H2, Windows Server 2025, Windows Server 2022, Windows Server 2019, or Windows Server version 20H2
4343

4444
## Turn on aggregated reporting
4545

defender-endpoint/attack-surface-reduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ You can set attack surface reduction rules for devices that are running any of t
144144
> [!NOTE]
145145
> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution) for this feature to work.
146146
147-
Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), if you have Windows E5, you get advanced management capabilities. The advanced capabilities - available only in Windows E5 - include:
147+
Although attack surface reduction rules don't require a [Windows E5 license](/windows/deployment/deploy-enterprise-licenses), if you have Windows E5, you get advanced management capabilities. The advanced capabilities - available only in Windows E5 - include:S
148148

149149
- The monitoring, analytics, and workflows available in [Defender for Endpoint](microsoft-defender-endpoint.md)
150150
- The reporting and configuration capabilities in [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender).

defender-endpoint/automated-investigations.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.subservice: edr
66
author: denisebmsft
77
ms.author: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 08/31/2022
9+
ms.date: 03/04/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -86,6 +86,7 @@ Currently, AIR only supports the following OS versions:
8686
- Windows Server 2016 (Preview)
8787
- Windows Server 2019
8888
- Windows Server 2022
89+
- Windows Server 2025
8990
- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441)) or later
9091
- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464/windows-10-update-kb4493464)) or later
9192
- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
17-
ms.date: 02/04/2025
17+
ms.date: 03/04/2025
1818
ms.subservice: onboard
1919
---
2020

@@ -25,10 +25,13 @@ ms.subservice: onboard
2525
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
2626
- [Microsoft Defender XDR](/defender-xdr)
2727
- Virtual desktop infrastructure (VDI) devices
28-
- Windows 10 and Windows 11
29-
- Windows Server 2019 and Windows Server 2022
28+
- Windows 11
29+
- Windows 10
3030
- Windows Server 2025 (beginning in February 2025 and rolling out over the next several weeks)
31-
- [Windows Server 2012 R2 and Windows Server 2016](/defender-endpoint/configure-server-endpoints#windows-server-2016-and-windows-server-2012-r2)
31+
- Windows Server 2022
32+
- Windows Server 2019
33+
- Windows Server 2016
34+
- Windows Server 2012 R2
3235
- Windows Server 2008
3336

3437

defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Windows Server includes automatic exclusions, based on server role.
66
ms.service: defender-endpoint
77
ms.subservice: ngp
88
ms.localizationpriority: medium
9-
ms.date: 02/04/2025
9+
ms.date: 03/04/2025
1010
author: emmwalshh
1111
ms.author: ewalsh
1212
ms.topic: conceptual
@@ -327,7 +327,7 @@ The list of built-in exclusions in Windows is kept up to date as the threat land
327327
In Windows Server 2016 and later, the predefined exclusions delivered by [Security intelligence updates](microsoft-defender-antivirus-updates.md#security-intelligence-updates) only exclude the default paths for a role or feature. If you installed a role or feature in a custom path, or you want to manually control the set of exclusions, make sure to opt out of the automatic exclusions delivered in Security intelligence updates. But keep in mind that the exclusions that are delivered automatically are optimized for Windows Server 2016 and later. See [Important points about exclusions](configure-exclusions-microsoft-defender-antivirus.md#important-points-about-exclusions) before defining your exclusion lists.
328328

329329
> [!WARNING]
330-
> Opting out of automatic exclusions might adversely impact performance, or result in data corruption. Automatic server role exclusions are optimized for Windows Server 2016, Windows Server 2019, and Windows Server 2022 and later.
330+
> Opting out of automatic exclusions might adversely impact performance, or result in data corruption. Automatic server role exclusions are optimized for Windows Server 2016, Windows Server 2019, Windows Server 2022, and Windows Server 2025.
331331
332332

333333
Because predefined exclusions only exclude **default paths**, if you move NTDS and SYSVOL folders to another drive or path that is *different from the original path*, you must add exclusions manually. See [Configure the list of exclusions based on folder name or file extension](configure-extension-file-exclusions-microsoft-defender-antivirus.md#configure-the-list-of-exclusions-based-on-folder-name-or-file-extension).

defender-endpoint/controlled-folders.md

Lines changed: 20 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Protect important folders from ransomware from encrypting your files with controlled folder access
3-
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
3+
description: Files in default folders can be protected from changes through malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 11/19/2024
6+
ms.date: 03/04/2025
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -37,10 +37,17 @@ search.appverid: met150
3737
3838
## What is controlled folder access?
3939

40-
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
40+
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on:
41+
- Windows 11
42+
- Windows 10
43+
- Windows Server 2025
44+
- Windows Server 2022
45+
- Windows Server 2019
46+
- Windows Server 2016
47+
- Windows Server 2012 R2
4148

4249
> [!NOTE]
43-
> Scripting engines like PowerShell are not trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
50+
> Scripting engines like PowerShell aren't trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
4451
4552
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
4653

@@ -51,11 +58,11 @@ Controlled folder access works best with [Microsoft Defender for Endpoint](micro
5158

5259
Controlled folder access works by only allowing trusted apps to access protected folders. Protected folders are specified when controlled folder access is configured. Typically, commonly used folders, such as those used for documents, pictures, downloads, and so on, are included in the list of controlled folders.
5360

54-
Controlled folder access works with a list of trusted apps. Apps that are included in the list of trusted software work as expected. Apps that are not included in the list are prevented from making any changes to files inside protected folders.
61+
Controlled folder access works with a list of trusted apps. Apps that are included in the list of trusted software work as expected. Apps that aren't included in the list are prevented from making any changes to files inside protected folders.
5562

56-
Apps are added to the list based upon their prevalence and reputation. Apps that are highly prevalent throughout your organization and that have never displayed any behavior deemed malicious are considered trustworthy. Those apps are added to the list automatically.
63+
Apps are added to the list based upon their prevalence and reputation. Apps that are highly prevalent throughout your organization and that haven't ever displayed any behavior deemed malicious are considered trustworthy. Those apps are added to the list automatically.
5764

58-
Apps can also be added manually to the trusted list by using Configuration Manager or Intune. Additional actions can be performed from the Microsoft Defender portal.
65+
Apps can also be added manually to the trusted list by using Configuration Manager or Intune. Other actions can be performed in the Microsoft Defender portal.
5966

6067
## Why controlled folder access is important
6168

@@ -69,7 +76,7 @@ You can use [audit mode](overview-attack-surface-reduction.md) to evaluate how c
6976

7077
Windows system folders are protected by default, along with several other folders:
7178

72-
The protected folders include common system folders (including boot sectors), and you can add additional folders. You can also allow apps to give them access to the protected folders. The Windows systems folders that are protected by default are:
79+
The protected folders include common system folders (including boot sectors), and you can add other folders. You can also allow apps to give them access to the protected folders. The Windows systems folders that are protected by default are:
7380

7481
- `c:\Users\<username>\Documents`
7582
- `c:\Users\Public\Documents`
@@ -86,7 +93,7 @@ Default folders appear in the user's profile, under **This PC**, as shown in the
8693
![Protected Windows default systems folders](media/defaultfolders.png)
8794

8895
> [!NOTE]
89-
> You can configure additional folders as protected, but you cannot remove the Windows system folders that are protected by default.
96+
> You can configure more folders as protected, but you can't remove the Windows system folders that are protected by default.
9097
9198
## Requirements for controlled folder access
9299

@@ -96,7 +103,7 @@ Controlled folder access requires enabling [Microsoft Defender Antivirus real-ti
96103

97104
## Review controlled folder access events in the Microsoft Defender portal
98105

99-
Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md) in the Microsoft Defender portal; see [Microsoft Defender for Endpoint in Microsoft Defender XDR](/defender-xdr/microsoft-365-security-center-mde).
106+
Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](investigate-alerts.md) in the Microsoft Defender portal. For more information, see [Microsoft Defender for Endpoint in Microsoft Defender XDR](/defender-xdr/microsoft-365-security-center-mde).
100107

101108
You can query Microsoft Defender for Endpoint data by using [Advanced hunting](/defender-xdr/advanced-hunting-overview). If you're using [audit mode](overview-attack-surface-reduction.md), you can use [advanced hunting](/defender-xdr/advanced-hunting-overview) to see how controlled folder access settings would affect your environment if they were enabled.
102109

@@ -141,16 +148,16 @@ You can use the Windows Security app to view the list of folders that are protec
141148

142149
3. Under **Ransomware protection**, select **Manage ransomware protection**.
143150

144-
4. If controlled folder access is turned off, you'll need to turn it on. Select **protected folders**.
151+
4. If controlled folder access is turned off, you need to turn it on. Select **protected folders**.
145152

146153
5. Do one of the following steps:
147154

148155
- To add a folder, select **+ Add a protected folder**.
149156
- To remove a folder, select it, and then select **Remove**.
150157

151158
> [!IMPORTANT]
152-
> Do not add local share paths (loopbacks) as protected folders. Use the local path instead. For example, if you have shared `C:\demo` as `\\mycomputer\demo`, do not add `\\mycomputer\demo` to the list of protected folders. Instead add `C:\demo`.
159+
> Don't add local share paths (loopbacks) as protected folders. Use the local path instead. For example, if you have shared `C:\demo` as `\\mycomputer\demo`, don't add `\\mycomputer\demo` to the list of protected folders. Instead add `C:\demo`.
153160
154-
[Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
161+
[Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you can't remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
155162

156163
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/customize-controlled-folders.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 10/17/2024
18+
ms.date: 03/04/2025
1919
---
2020

2121
# Customize controlled folder access
@@ -33,7 +33,13 @@ ms.date: 10/17/2024
3333
> [!TIP]
3434
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3535
36-
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients.
36+
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on:
37+
38+
- Windows 11
39+
- Windows 10
40+
- Windows Server 2025
41+
- Windows Server 2022
42+
- Windows Server 2019
3743

3844
> [!IMPORTANT]
3945
> Controlled folder access is not supported on Linux servers.

defender-endpoint/defender-endpoint-demonstration-app-reputation.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -30,10 +30,16 @@ Test how Microsoft Defender for Endpoint SmartScreen helps you identify phishing
3030

3131
## Scenario requirements and setup
3232

33-
- Windows 11 or Windows 10
34-
- Windows Server 2022 or Windows Server 2019 or Windows Server 2016 or Windows Server 2012 R2 or Windows Server 2008 R2
35-
- Microsoft Edge or Internet Explorer browser required
36-
- To turn ON/OFF, go to **Settings** > **Update & Security** > **Windows Security** > **Open Windows Security** > **App & browser control** > **Check apps and files**
33+
- The following versions of Windows are supported:
34+
- Windows 11
35+
- Windows 10
36+
- Windows Server 2025
37+
- Windows Server 2022
38+
- Windows Server 2019
39+
- Windows Server 2016
40+
- Windows Server 2012 R2
41+
- Windows Server 2008 R2
42+
- Microsoft Edge or Internet Explorer browser required.
3743

3844
## Scenario Demos
3945

defender-endpoint/defender-endpoint-demonstration-attack-surface-reduction-rules.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: asr
17-
ms.date: 01/15/2024
17+
ms.date: 03/04/2025
1818
---
1919

2020
# Attack surface reduction rules demonstrations
@@ -34,8 +34,8 @@ Attack surface reduction rules target specific behaviors that are typically used
3434

3535
## Scenario requirements and setup
3636

37-
- Windows 11, Windows 10 1709 build 16273 or later
38-
- Windows Server 2022, Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 with the unified MDE client.
37+
- Windows client devices must be running Windows 11, Windows 10 1709 build 16273, or later
38+
- Windows server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, or Windows Server 2012 R2 (with the unified MDE client).
3939
- Microsoft Defender Antivirus
4040
- Microsoft 365 Apps (Office; required for Office rules and sample)
4141
- [Download attack surface reduction PowerShell scripts](https://demo.wd.microsoft.com/Content/WindowsDefender_ASR_scripts.zip)

defender-endpoint/defender-endpoint-demonstration-exploit-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: asr
17-
ms.date: 01/15/2024
17+
ms.date: 03/04/2025
1818
---
1919

2020
# Exploit protection (EP) demonstrations
@@ -31,8 +31,8 @@ Exploit Protection automatically applies exploit mitigation settings system wide
3131

3232
## Scenario requirements and setup
3333

34-
- Windows 11 or Windows 10 1709 build 16273 or newer
35-
- Windows Server 2022, Windows Server 2019, and Windows Server 2016.
34+
- Windows client devices must be running Windows 11 or Windows 10 1709 build 16273 or newer
35+
- Windows server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, or Windows Server 2016.
3636
- Run PowerShell commands:
3737

3838
```powershell

0 commit comments

Comments
 (0)