Skip to content

Commit 2b219f3

Browse files
Merge pull request #3649 from MicrosoftDocs/main
[AutoPublish] main to live - 05/02 15:32 PDT | 05/03 04:02 IST
2 parents f411302 + 97901e1 commit 2b219f3

File tree

7 files changed

+108
-75
lines changed

7 files changed

+108
-75
lines changed

defender-endpoint/TOC.yml

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -252,14 +252,14 @@
252252
href: manage-sys-extensions-using-jamf.md
253253
- name: Manual deployment
254254
href: manage-sys-extensions-manual-deployment.md
255-
255+
256256
- name: Defender for Endpoint on Linux
257257
items:
258258
- name: Deploy Defender for Endpoint on Linux
259259
items:
260-
- name: 1 - Prerequisites
260+
- name: Prerequisites
261261
href: mde-linux-prerequisites.md
262-
- name: 2 - Choose a deployment method
262+
- name: Choose a deployment method
263263
items:
264264
- name: Installer script based deployment
265265
href: linux-installer-script.md
@@ -277,28 +277,28 @@
277277
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
278278
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
279279
href: mde-linux-deployment-on-sap.md
280-
- name: 3 - Configuration
280+
- name: Configure Defender for Endpoint on Linux
281+
items:
282+
- name: Configure security policies and settings
283+
href: linux-preferences.md
284+
- name: Static proxy configuration
285+
href: linux-static-proxy-configuration.md
286+
- name: Configure antivirus scans
281287
items:
282-
- name: Configure security policies and settings
283-
href: linux-preferences.md
284-
- name: Static proxy configuration
285-
href: linux-static-proxy-configuration.md
286-
- name: Configure antivirus scans
287-
items:
288-
- name: Schedule antivirus scans using Anacron
289-
href: schedule-antivirus-scan-anacron.md
290-
- name: Schedule antivirus scans using Crontab
291-
href: schedule-antivirus-scan-crontab.md
292-
- name: Network protection for Linux
293-
href: network-protection-linux.md
294-
- name: Configure and validate exclusions on Linux
295-
href: linux-exclusions.md
296-
- name: Configure eBPF-based sensor
297-
href: linux-support-ebpf.md
298-
- name: Detect and block Potentially Unwanted Applications
299-
href: linux-pua.md
300-
- name: Configure Offline Security Intelligence Update
301-
href: linux-support-offline-security-intelligence-update.md
288+
- name: Schedule antivirus scans using Anacron
289+
href: schedule-antivirus-scan-anacron.md
290+
- name: Schedule antivirus scans using Crontab
291+
href: schedule-antivirus-scan-crontab.md
292+
- name: Network protection for Linux
293+
href: network-protection-linux.md
294+
- name: Configure and validate exclusions on Linux
295+
href: linux-exclusions.md
296+
- name: Configure eBPF-based sensor
297+
href: linux-support-ebpf.md
298+
- name: Detect and block Potentially Unwanted Applications
299+
href: linux-pua.md
300+
- name: Configure Offline Security Intelligence Update
301+
href: linux-support-offline-security-intelligence-update.md
302302
- name: Update Defender for Endpoint on Linux
303303
items:
304304
- name: Update Defender for Endpoint on Linux
@@ -307,7 +307,7 @@
307307
href: linux-update-mde-linux.md
308308
- name: Privacy for Defender for Endpoint on Linux
309309
href: linux-privacy.md
310-
- name: Resources for Microsoft Defender for Endpoint on Linux
310+
- name: Additional resources for Defender for Endpoint on Linux
311311
href: linux-resources.md
312312
- name: Mobile Threat Defense
313313
items:

defender-endpoint/defender-endpoint-plan-1.md

Lines changed: 15 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: overview
1010
ms.service: defender-endpoint
1111
ms.subservice: onboard
1212
ms.localizationpriority: medium
13-
ms.date: 02/13/2025
13+
ms.date: 05/02/2025
1414
ms.reviewer: shlomiakirav
1515
f1.keywords: NOCSH
1616
ms.collection:
@@ -83,23 +83,14 @@ To learn more, see the following articles:
8383

8484
Your organization's attack surfaces are all the places where you're vulnerable to cyberattacks. With Defender for Endpoint Plan 1, you can reduce your attack surfaces by protecting the devices and applications that your organization uses. The attack surface reduction capabilities that are included in Defender for Endpoint Plan 1 are described in the following sections.
8585

86-
- [Overview of Microsoft Defender for Endpoint Plan 1](#overview-of-microsoft-defender-for-endpoint-plan-1)
87-
- [Defender for Endpoint Plan 1 capabilities](#defender-for-endpoint-plan-1-capabilities)
88-
- [Next-generation protection](#next-generation-protection)
89-
- [Manual response actions](#manual-response-actions)
90-
- [Attack surface reduction](#attack-surface-reduction)
91-
- [Attack surface reduction rules](#attack-surface-reduction-rules)
92-
- [Ransomware mitigation](#ransomware-mitigation)
93-
- [Device control](#device-control)
94-
- [Web protection](#web-protection)
95-
- [Network protection](#network-protection)
96-
- [Network firewall](#network-firewall)
97-
- [Application control](#application-control)
98-
- [Centralized management](#centralized-management)
99-
- [Role-based access control](#role-based-access-control)
100-
- [Reporting](#reporting)
101-
- [APIs](#apis)
102-
- [Next steps](#next-steps)
86+
- [Attack surface reduction](#attack-surface-reduction)
87+
- [Attack surface reduction rules](#attack-surface-reduction-rules)
88+
- [Ransomware mitigation](#ransomware-mitigation)
89+
- [Device control](#device-control)
90+
- [Web protection](#web-protection)
91+
- [Network protection](#network-protection)
92+
- [Network firewall](#network-firewall)
93+
- [Application control](#application-control)
10394

10495
To learn more about attack surface reduction capabilities in Defender for Endpoint, see [Overview of attack surface reduction](overview-attack-surface-reduction.md).
10596

@@ -191,17 +182,17 @@ With the Defender for Endpoint APIs, you can automate workflows and integrate wi
191182

192183
To learn more, see [Defender for Endpoint APIs](api/management-apis.md).
193184

194-
- **Microsoft Defender for Servers Plan 1 or Plan 2** (*recommended for enterprise customers*) as part of the [Defender for Cloud](/azure/defender-for-cloud/defender-for-cloud-introduction) offering. To learn more. see [Overview of Microsoft Defender for Servers](/azure/defender-for-cloud/defender-for-servers-introduction).
195-
- **Microsoft Defender for Endpoint Server** (*recommended for enterprise customers*). To learn more, see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md).
196-
- **Microsoft Defender for Business servers** (*for small and medium-sized businesses who have [Microsoft Defender for Business](/defender-business/mdb-overview)*). To learn more, see [How to get Microsoft Defender for Business servers](/defender-business/get-defender-business#how-to-get-microsoft-defender-for-business-servers).
197-
198-
See [Microsoft licensing and product terms](https://www.microsoft.com/en-us/licensing/product-licensing/products).
199-
200185
## Next steps
201186

202187
- [Set up and configure Defender for Endpoint Plan 1](mde-p1-setup-configuration.md)
188+
189+
## Related content
190+
203191
- [Get started with Defender for Endpoint Plan 1](mde-plan1-getting-started.md)
204192
- [Manage Defender for Endpoint Plan 1](preferences-setup.md)
205193
- [Learn about exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
194+
- [Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint](onboard-client.md)
195+
- [Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
196+
- [Microsoft Defender for Endpoint - Mobile Threat Defense](mtd.md)
206197

207198
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/mac-install-manually.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
ms.subservice: macos
1818
search.appverid: met150
19-
ms.date: 04/16/2025
19+
ms.date: 05/01/2025
2020
---
2121

2222
# Manual deployment for Microsoft Defender for Endpoint on macOS
@@ -33,7 +33,7 @@ ms.date: 04/16/2025
3333
This article describes how to deploy Microsoft Defender for Endpoint on macOS manually. A successful deployment requires the completion of all of the following steps:
3434

3535
- [Download installation and onboarding packages](#download-installation-and-onboarding-packages)
36-
- [Application installation (macOS 11 and newer versions)](#application-installation-macos-11-and-newer-versions)
36+
- [Application installation (macOS 13 and newer versions)](#application-installation-macos-13-and-newer-versions)
3737
- [Onboarding Package](#onboarding-package)
3838
- [Grant Full Disk Access](#allow-full-disk-access)
3939
- [Ensure Background Execution](#background-execution)
@@ -64,23 +64,23 @@ Download the installation and onboarding packages from Microsoft Defender portal
6464

6565
6. Copy the *wdav.pkg* and *MicrosoftDefenderATPOnboardingMacOs.sh* to the device where you want to deploy the Microsoft Defender for Endpoint on macOS.
6666

67-
## Application installation (macOS 11 and newer versions)
67+
## Application installation (macOS 13 and newer versions)
6868

6969
To complete this process, you must have admin privileges on the device.
7070

7171
1. Do one of the following steps:
7272

73-
- Navigate to the downloaded *wdav.pkg* in **Finder** and open it.
73+
- Navigate to the downloaded *wdav.pkg* in **Finder** and open it.
7474

7575
Or
7676

77-
- You can download the *wdav.pkg*- from **Terminal**
78-
77+
- You can download the *wdav.pkg*- from **Terminal**.
78+
7979
```console
80-
sudo installer -store -pkg /Users/admin/Downloads/wdav.pkg -target /
80+
sudo installer -pkg /Users/admin/Downloads/wdav.pkg -target /
8181
```
82-
83-
:::image type="content" source="media/monterey-install-1.png" alt-text="Screenshot that shows the installation process for the application":::
82+
83+
:::image type="content" source="media/monterey-install-1.png" alt-text="Screenshot that shows the installation process for the application.":::
8484

8585
2. Select **Continue**.
8686

@@ -111,7 +111,7 @@ To complete this process, you must have admin privileges on the device.
111111

112112
9. Select **Install Software**.
113113

114-
10. At the end of the installation process, for macOS Big Sur (11.0) or latest version, you're prompted to approve the system extensions used by the product. Select **Open Security Preferences**.
114+
10. At the end of the installation process, for macOS Ventura (13.0) or latest version, you're prompted to approve the system extensions used by the product. Select **Open Security Preferences**.
115115

116116
:::image type="content" source="media/monterey-install-2.png" alt-text="Screenshot that shows the system extension approval":::
117117

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.localizationpriority: medium
1616
ms.topic: troubleshooting
17-
ms.date: 04/10/2025
17+
ms.date: 05/02/2025
1818
---
1919

2020
# Vulnerability support in Microsoft Defender Vulnerability Management
@@ -33,6 +33,21 @@ This article provides information on inaccuracies that have been reported. You c
3333
3434
The following tables present the relevant vulnerability information organized by month.
3535

36+
## April 2025
37+
38+
| Inaccuracy report ID | Description | Fix date |
39+
|---|---|---|
40+
| 86936 | Defender Vulnerability Management doesn't currently support Trimble SketchUp | 22-Apr-25 |
41+
| - | Defender Vulnerability Management doesn't currently support CVE-2024-30098 | 22-Apr-25 |
42+
| - | Defender Vulnerability Management doesn't currently support CVE-2025-20206 | 22-Apr-25 |
43+
| 57842 | Fixed inaccurate detections in Snow Inventory Agent | 23-Apr-25 |
44+
| 92184 | Fixed inaccurate detections in Amazon Send to Kindle | 23-Apr-25 |
45+
| 91112 | Fixed incorrect detections in Vendor- Jabra | 23-Apr-25 |
46+
| 88590 | Fixed incorrect detections in Vendor- PDF Exchange Editor | 23-Apr-25 |
47+
| - | Fixed inaccuracy in Mattermost Desktop vulnerability- CVE-2023-5920 | 24-Apr-25 |
48+
| - | Fixed inaccuracy in OpenSSL vulnerabilities- CVE-2024-9143, CVE-2024-13176 & CVE-2024-12797 | 24-Apr-25 |
49+
| 94679 | Fixed inaccuracy in Secure Client by adding 1.0 as invalid version | 29-Apr-25 |
50+
3651
## March 2025
3752

3853
| Inaccuracy report ID | Description | Fix date |
@@ -65,7 +80,7 @@ The following tables present the relevant vulnerability information organized by
6580
| 89577 | Fixed inaccuracy in Gog Galaxy vulnerability - CVE-2023-50915 | 16-Feb-25 |
6681
| - | Fixed inaccuracy in 6 HP Firmware Vulnerabilities | 16-Feb-25 |
6782
| 93100 | Fixed inaccuracy in Python CVE-2024-12254 | 16-Feb-25 |
68-
| - | Fixed inaccuracy in Corel WinZip vulnerbility - CVE-2024-8811 | 23-Feb-25 |
83+
| - | Fixed inaccuracy in Corel WinZip vulnerability - CVE-2024-8811 | 23-Feb-25 |
6984
| - | Fixed inaccuracy in Palo Alto Networks GlobalProtect | 26-Feb-25 |
7085
| - | Fixed inaccuracy in RTT PDF Explorer | 26-Feb-25 |
7186
| 89928 | Fixed inaccurate detections of Python by excluding invalid paths - "incontrol.exe" and "proccess_comuniccao.exe" | 26-Feb-25 |

defender-xdr/advanced-hunting-limits.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- cx-ti
1919
- cx-ah
2020
ms.topic: how-to
21-
ms.date: 10/29/2024
21+
ms.date: 05/02/2025
2222
---
2323

2424
# Use the advanced hunting query resource report
@@ -43,6 +43,8 @@ Refer to the following table to understand existing quotas and usage parameters.
4343

4444
In the unified Microsoft Defender portal, you are able to run queries over Microsoft Sentinel tables by onboarding a workspace. [Log analytics workspace limits](/azure/azure-monitor/service-limits#log-analytics-workspaces) therefore also apply.
4545

46+
For advanced hunting in multitenant organizations, see [Quotas in advanced hunting in multitenant management](/unified-secops-platform/mto-advanced-hunting#quotas).
47+
4648
> [!NOTE]
4749
> A separate set of quotas and parameters apply to advanced hunting queries performed through the API. [Read about advanced hunting APIs](./api-advanced-hunting.md)
4850

defender-xdr/custom-detection-rules.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ appliesto:
2222
- Microsoft Defender XDR
2323
- Microsoft Sentinel in the Microsoft Defender portal
2424
ms.topic: how-to
25-
ms.date: 02/10/2025
25+
ms.date: 05/02/2025
2626
---
2727

2828
# Create and manage custom detections rules
@@ -75,13 +75,14 @@ In the Microsoft Defender portal, go to **Advanced hunting** and select an exist
7575

7676

7777
To create a custom detection rule, the query must return the following columns:
78-
1. `Timestamp` - Used to set the timestamp for generated alerts
79-
2. A column or combination of columns that uniquely identify the event in Defender XDR tables:
78+
1. `Timestamp` - This column is used to set the timestamp for generated alerts. The `Timestamp` that is returned from the query should not have been manipulated in the query and should be returned exactly as it appears in the raw event.
79+
80+
3. A column or combination of columns that uniquely identify the event in Defender XDR tables:
8081
- For Microsoft Defender for Endpoint tables, the `Timestamp`, `DeviceId`, and `ReportId` columns must appear in the same event
8182
- For Alert* tables, `Timestamp` must appear in the event
8283
- For Observation* tables, `Timestamp`and `ObservationId` must appear in the same event
8384
- For all others, `Timestamp` and `ReportId` must appear in the same event
84-
3. One of the following columns that contain a strong identifier for an impacted asset:
85+
4. One of the following columns that contain a strong identifier for an impacted asset:
8586
- `DeviceId`
8687
- `DeviceName`
8788
- `RemoteDeviceName`
@@ -99,6 +100,8 @@ To create a custom detection rule, the query must return the following columns:
99100
> [!NOTE]
100101
> Support for more entities will be added as new tables are added to the [advanced hunting schema](advanced-hunting-schema-tables.md).
101102
103+
104+
102105
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns.
103106

104107
There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by entity under a column such as `DeviceId`, you can still return `Timestamp` and `ReportId` by getting it from the most recent event involving each unique `DeviceId`.

0 commit comments

Comments
 (0)