Skip to content

Commit 1f6624f

Browse files
authored
Merge branch 'main' into docs-editor/network-protection-macos-1727383041
2 parents 01395e0 + 30c7205 commit 1f6624f

7 files changed

+343
-9
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: deniseb
66
ms.author: deniseb
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 09/24/2024
9+
ms.date: 09/26/2024
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -58,21 +58,34 @@ For more information on Microsoft Defender for Endpoint on other operating syste
5858

5959
## macOS Deprecation
6060

61-
Microsoft Defender for Endpoint no longer supports Big Sur (11)
61+
- Microsoft Defender for Endpoint no longer supports Big Sur (11).
62+
- macOS 12 (Monterey) will not be supported starting December 2024.
6263

6364
## Releases for Defender for Endpoint on Mac
6465

6566
### Behavior Monitoring for macOS is now in public preview
6667

6768
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
6869

70+
### Sep-2024 (Build: 101.24072.0007 | Release version: 20.124072.7)
71+
72+
| Build: | **101.24072.0007** |
73+
|--------------------|-----------------------|
74+
| Release version: | **20.124072.7** |
75+
| Engine version: | **1.1.24080.9** |
76+
| Signature version: | **1.411.410.0** |
77+
78+
##### What's new
79+
80+
- Resolved the issue causing outdated vulnerability assessments impacting some MAC OSs devices
81+
6982
### Aug-2024 (Build: 101.24072.0006 | Release version: 20.124072.6.0)
7083

71-
| Build: | **101.24072.0006** |
84+
| Build: | **101.24072.0006** |
7285
|--------------------|-----------------------|
73-
| Release version: | 20.124072.6.0 |
74-
| Engine version: | 1.1.24060.7 |
75-
| Signature version: | 1.417.325.0 |
86+
| Release version: | 20.124072.6.0 |
87+
| Engine version: | 1.1.24060.7 |
88+
| Signature version: | 1.417.325.0 |
7689

7790
##### What's new
7891

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,8 @@
240240
href: tenant-allow-block-list-files-configure.md
241241
- name: Allow or block URLs using the Tenant Allow/Block List
242242
href: tenant-allow-block-list-urls-configure.md
243+
- name: Allow or block IP addresses using the Tenant Allow/Block List
244+
href: tenant-allow-block-list-ip-addresses-configure.md
243245
- name: Admin submissions
244246
href: submissions-admin.md
245247
- name: Create block sender lists

defender-office-365/tenant-allow-block-list-about.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
1010
ms.localizationpriority: medium
11-
ms.date: 09/19/2024
11+
ms.date: 09/20/2024
1212
search.appverid:
1313
- MET150
1414
ms.collection:
@@ -32,7 +32,7 @@ appliesto:
3232
3333
In Microsoft 365 organizations with mailboxes in Exchange Online or standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, you might disagree with the EOP or Microsoft Defender for Office 365 filtering verdict. For example, a good message might be marked as bad (a false positive), or a bad message might be allowed through (a false negative).
3434

35-
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow for incoming messages from external senders.
35+
The Tenant Allow/Block List in the Microsoft Defender portal gives you a way to manually override the Defender for Office 365 or EOP filtering verdicts. The list is used during mail flow or time of click for incoming messages from external senders.
3636

3737
Entries for **Domains and email addresses** and **Spoofed senders** apply to internal messages sent within the organization. Block entries for **Domains and email addresses** also prevent users in the organization from *sending* email to those blocked domains and addresses.
3838

@@ -43,6 +43,7 @@ For usage and configuration instructions, see the following articles:
4343
- **Domains and email addresses** and **spoofed senders**: [Allow or block emails using the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
4444
- **Files**: [Allow or block files using the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
4545
- **URLs**: [Allow or block URLs using the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md).
46+
- **IP addresses**: [Allow or block IP addresses using the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md).
4647

4748
These articles contain procedures in the Microsoft Defender portal and in PowerShell.
4849

@@ -70,7 +71,11 @@ In the Tenant Allow/Block List, you can also directly create block entries for t
7071

7172
- **[Spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders)**: If you manually override an existing allow verdict from [spoof intelligence](anti-spoofing-spoof-intelligence.md), the blocked spoofed sender becomes a manual block entry that appears only on the **Spoofed senders** tab in the Tenant Allow/Block List.
7273

73-
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire. Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) never expire.
74+
- **[IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses)**: If you manually create a block entry, all incoming email messages from that IP address are dropped at the edge of the service.
75+
76+
By default, block entries for [domains and email addresses](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-domains-and-email-addresses), [files](tenant-allow-block-list-files-configure.md#create-block-entries-for-files) and [URLs](tenant-allow-block-list-urls-configure.md#create-block-entries-for-urls) expire after 30 days, but you can set them to expire up 90 days or to never expire.
77+
78+
Block entries for [spoofed senders](tenant-allow-block-list-email-spoof-configure.md#create-block-entries-for-spoofed-senders) and [IP addresses](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) never expire.
7479

7580
## Allow entries in the Tenant Allow/Block List
7681

@@ -82,6 +87,8 @@ In most cases, you can't directly create allow entries in the Tenant Allow/Block
8287
- If spoof intelligence already blocked the message as spoofing, use the **Submissions** page at <https://security.microsoft.com/reportsubmission> to [report the email to Microsoft](submissions-admin.md#report-good-email-to-microsoft) as **I've confirmed it's clean**, and then select **Allow this message**.
8388
- You can proactively create [an allow entry for a spoofed sender](tenant-allow-block-list-email-spoof-configure.md#create-allow-entries-for-spoofed-senders) on the **Spoofed sender** tab in the Tenant Allow/Block List before [spoof intelligence](anti-spoofing-spoof-intelligence.md) identifies and blocks the message as spoofing.
8489

90+
- **IP Addresses**: You can proactively create an [an allow entry for an IP address](tenant-allow-block-list-ip-addresses-configure.md#create-block-entries-for-ip-addresses) on the **IP addresses** tab in the Tenant Allow/Block List to override the IP filters for incoming messages.
91+
8592
The following list describes what happens in the Tenant Allow/Block List when you submit something to Microsoft as a false positive on the **Submissions** page:
8693

8794
- **Email attachments** and **URLs**: An allow entry is created and the entry appears on the **Files** or **URLs** tab in the Tenant Allow/Block List respectively.

defender-office-365/tenant-allow-block-list-email-spoof-configure.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -543,3 +543,4 @@ For submission instructions for impersonation false positives, see [Report good
543543
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
544544
- [Allow or block files in the Tenant Allow/Block List](tenant-allow-block-list-files-configure.md)
545545
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
546+
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

defender-office-365/tenant-allow-block-list-files-configure.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -283,3 +283,4 @@ For detailed syntax and parameter information, see [Remove-TenantAllowBlockListI
283283
- [Manage allows and blocks in the Tenant Allow/Block List](tenant-allow-block-list-about.md)
284284
- [Allow or block emails in the Tenant Allow/Block List](tenant-allow-block-list-email-spoof-configure.md)
285285
- [Allow or block URLs in the Tenant Allow/Block List](tenant-allow-block-list-urls-configure.md)
286+
- [Allow or block IP addresses in the Tenant Allow/Block List](tenant-allow-block-list-ip-addresses-configure.md)

0 commit comments

Comments
 (0)