Skip to content

Commit 1f51933

Browse files
authored
Merge branch 'main' into WI446820-find-all-mdi-docs-with-the-word-on-prem
2 parents 8e16632 + ccf1b8b commit 1f51933

File tree

11 files changed

+28
-20
lines changed

11 files changed

+28
-20
lines changed

defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -886,9 +886,9 @@ sections:
886886
887887
- BM state: Behavior Monitoring state (Enabled or Disabled)
888888
889-
- Antivirus signature age: Antivirus signature age (in days)
889+
- Antivirus signature age: Antivirus signature age (in days). Calculated as the time starting from the Security Intelligence Update (SIU) release date, to the current date. Before a signature is updated for the first time, it'll display an age of 65535 days.
890890
891-
- Antispyware signature age: Antispyware signature age (in days)
891+
- Antispyware signature age: Antispyware signature age (in days). Timestamp reflecting the Security Intelligence Update (SIU) release date (not the local installation time). Before the timestamp is updated for the first time, its value is null.
892892
893893
- Last quick scan age: Last quick scan age (in days)
894894

defender-for-identity/deploy/activate-sensor.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ The **Activation** page displays all servers from your device inventory. Defende
1919

2020
You can choose to activate eligible domain controllers either automatically, where Defender for Identity activates them as soon as they're discovered, or manually, by selecting specific domain controllers from the list of eligible servers.
2121

22-
[![Screenshot that shows the Defender for Identity sensor activation page.](media/activate-capabilities/activation-page.png)](media/activate-capabilities/activation-page.png#lightbox)
22+
23+
[![Screenshot that shows how to auto and manual activation.](media/activate-sensor/1.png)](media/activate-sensor/1.png#lightbox)
2324

2425
|Activation State |Next steps |
2526
|---------|---------|
@@ -39,12 +40,13 @@ The process for activating the sensor depends on your configuration.
3940
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Identities** > **Activation**.
4041
1. Select the domain controller where you want to activate Defender for Identity, and select **Activate**. Confirm your selection when prompted.
4142

42-
[![Screenshot that shows how to activate the new sensor.](media/activate-capabilities/activate.png)](media/activate-capabilities/activate.png#lightbox)
43-
43+
[![Screenshot that shows how to activate an new server.](media/activate-sensor/image.png)](media/activate-sensor/image.png#lightbox)
44+
45+
4446
1. When the activation is complete, a green success banner shows. In the banner, select **Click here to see the onboarded servers**. This takes you to the **Sensors** page, where you can check your sensor health.
45-
46-
[![Screenshot that shows how to see the onboarded servers.](media/activate-capabilities/successfully-activated.png)](media/activate-capabilities/successfully-activated.png#lightbox)
47-
47+
48+
[![Screenshot that shows successful activation.](media/activate-sensor/image1.png)](media/activate-sensor/image1.png#lightbox)
49+
4850
<!--## Onboard the domain controller
4951
5052
If the domain controller has not been onboarded to Defender for Endpoint for Servers, follow these steps to activate the sensor.
76.2 KB
Loading
76.1 KB
Loading
58.3 KB
Loading

defender-for-identity/whats-new.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ This API allows customers to:
3535
* Enable or disable the automatic activation of eligible servers
3636
* Activate or deactivate the agent on eligible servers
3737
38+
3839
For more information, see [Managing unified agent actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta).
3940

4041
### Microsoft Defender for Identity sensor version updates

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: chrisda
88
ms.author: chrisda
99
manager: bagol
1010
ms.localizationpriority: medium
11-
ms.date: 09/12/2025
11+
ms.date: 09/15/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -48,7 +48,7 @@ For more information on what's new with other Microsoft Defender security produc
4848
- Standard, shared, and private channels
4949
- Meeting conversations
5050

51-
[User reported settings](submissions-user-reported-messages-custom-mailbox.md) determine whether reported messages are sent to the specified reporting mailbox, to Microsoft, or both.
51+
[User reported settings](submissions-user-reported-messages-custom-mailbox.md) determine whether reported messages are sent to the specified reporting mailbox, to Microsoft, or both. Also added support for Teams message reporting on Teams mobile client.
5252

5353
## Aug 2025
5454

defender-office-365/scc-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ Managing permissions in Defender for Office 365 or Microsoft Purview gives users
118118
|**Privacy Management Investigators**|Investigators of privacy management solution that can investigate policy matches, view message content, and take remediation actions.|Case Management <br/><br/> Compliance Manager Reader <br/><br/> Data Classification Content Viewer <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Investigation <br/><br/> View-Only Case|
119119
|**Privacy Management Viewers**|Viewer of privacy management solution that can access the available dashboards and widgets.|Compliance Manager Reader <br/><br/> Data Classification List Viewer <br/><br/> Privacy Management Viewer|
120120
|**Purview Administrators**|Create, edit, and delete domains and perform role assignments.|Admin Unit Extension Manager <br/><br/> Purview Domain Manager <br/><br/> Role Management|
121-
|Purview Agent Management|To enable, setup and manage the AI agents withing Purview|Purview Content Analyst|
121+
|Purview Agent Management|To enable, setup and manage the AI agents within Purview|Purview Content Analyst|
122122
|**Quarantine Administrator**|Members can access all Quarantine actions. For more information, see [Manage quarantined messages and files as an admin](quarantine-admin-manage-messages-files.md)|Quarantine|
123123
|**Records Management**|Members can configure all aspects of records management, including retention labels and disposition reviews.|Disposition Management <br/><br/> RecordManagement <br/><br/> Retention Management <br/><br/> Scope Manager|
124124
|**Reviewer**|Members can access review sets in [eDiscovery (Premium)](/purview/ediscovery-overview) cases. Members of this role group can see and open the list of cases on the **eDiscovery > Advanced** page in the Microsoft Purview portal that they're members of. After the user accesses an eDiscovery (Premium) case, they can select **Review sets** to access case data. This role doesn't allow the user to preview the results of a collection search that's associated with the case or do other search or case management tasks. Members of this role group can only access the data in a review set.|Review|

defender-office-365/submissions-teams.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom:
1717
description: "Admins can configure whether users can report malicious message in Microsoft Teams."
1818
ms.service: defender-office-365
19-
ms.date: 09/11/2025
19+
ms.date: 09/15/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -26,9 +26,14 @@ appliesto:
2626

2727
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
2828

29-
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report messages in Microsoft Teams. Admins can also get visibility into the Teams messages that users are reporting.
29+
In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defender XDR, admins can decide whether users can report messages in Microsoft Teams. The following clients support message reporting:
3030

31-
Users can report messages in Teams from chats, standard, private and shared channels, and meeting conversations. Users can report messages as malicious or non-malicious.
31+
- The Microsoft Teams desktop client.
32+
- The Microsoft Teams Web App.
33+
- The Microsoft Teams app for iOS/iPadOS: Version 7.15 or later.
34+
- The Microsoft Teams for Android: Version 1416/1.0.0.2025153104 or later.
35+
36+
Users can report mmessages as malicious or non-malicious in Teams from chats, standard, private and shared channels, and meeting conversations. Admins can also get visibility into Teams messages that users are reporting.
3237

3338
> [!NOTE]
3439
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).

defender-office-365/submissions-users-report-message-add-in-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ appliesto:
3030
[!INCLUDE [MDO Trial banner](../includes/mdo-trial-banner.md)]
3131

3232
> [!IMPORTANT]
33-
> The Microsoft Report Message and Report Phishing add-ins are now in maintenance mode and will eventually be deprecated. We recommend transitioning from the add-ins to the built-in **Report** button. The **Report** button is supported in virtuall all consumer and entrprise Outlook clients. For more information, see the [Frequently asked questions](#frequently-asked-questions) section in this article.
33+
> The Microsoft Report Message and Report Phishing add-ins are now in maintenance mode and will eventually be deprecated. We recommend transitioning from the add-ins to the built-in **Report** button. The **Report** button is supported in virtually all consumer and enterprise Outlook clients. For more information, see the [Frequently asked questions](#frequently-asked-questions) section in this article.
3434
3535
The built-in **Report** button in [supported versions of Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook) makes it easy for users to report false positives and false negatives to Microsoft for analysis. False positives are good email that was blocked or sent to the Junk Email folder. False negatives are unwanted email or phishing that was delivered to the Inbox.
3636

@@ -178,7 +178,7 @@ We recommend that you try the built-in **Report** button. If you're still facing
178178

179179
### Q: I can't scope the built-in Report button, which prevents me from rolling it out. What can I do?
180180

181-
A: This behavior is by design. We think the built-in **Report** button provides a base level of protection for all users, including shared and delegate mailboxes. Scoping the built-in **Report** button to a limited number of users can result in forgetting about those users, which leavs a security gap that can be exploited by attackers. Many customers totaling more than a million users migrated smoothly to the the built-in **Report** button smoothly without scoping ability. Instead, they scoped non-Microsoft add-in buttons or the Microsoft add-ins as they rolled out the built-in **Report** button across the organization.
181+
A: This behavior is by design. We think the built-in **Report** button provides a base level of protection for all users, including shared and delegate mailboxes. Scoping the built-in **Report** button to a limited number of users can result in forgetting about those users, which leaves a security gap that can be exploited by attackers. Many customers totaling more than a million users migrated smoothly to the built-in **Report** button without scoping ability. Instead, they scoped non-Microsoft add-in buttons or the Microsoft add-ins as they rolled out the built-in **Report** button across the organization.
182182

183183
If you're looking to scope the functionality for experimentation, we recommend using a test environment.
184184

@@ -192,7 +192,7 @@ A: No. Unfortunately, due to the previously stated reasons, the add-ins will be
192192

193193
### Q: What is the recommendation for moving from the add-ins to a non-Microsoft reporting add-in?
194194

195-
A: After you, remove the add-in from the integrated apps from the **Deployed apps** tab of the **Integrated apps** page as previously described, install the non-Microsoft add-in as per their instructions.
195+
A: After you remove the add-in from the **Deployed apps** tab of the **Integrated apps** page as previously described, install the non-Microsoft add-in according to their instructions.
196196

197197
On the [User reported settings page](submissions-user-reported-messages-custom-mailbox.md) in the Defender portal, you need to do the following steps:
198198

0 commit comments

Comments
 (0)