Skip to content

Commit 2c9d538

Browse files
authored
Merge branch 'main' into WI336647-add-prerequisites-govern-discovered-apps
2 parents 9d5c050 + 1a9299e commit 2c9d538

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

42 files changed

+204
-262
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["ATADocs/" "ATPDocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["advanced-threat-analytics/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud-apps/" "defender-for-cloud/" "defender-for-identity/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

.openpublishing.redirection.defender-cloud-apps.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1015,5 +1015,10 @@
10151015
"redirect_url": "/defender-cloud-apps/enable-instant-visibility-protection-and-governance-actions-for-your-apps",
10161016
"redirect_document_id": true
10171017
},
1018+
{
1019+
"source_path": "defender-for-cloud-apps/cloud-discovery-anomaly-detection-policy.md",
1020+
"redirect_url": "/defender-cloud-apps/cloud-discovery-policies",
1021+
"redirect_document_id": false
1022+
}
10181023
]
10191024
}

.openpublishing.redirection.defender-identity.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -859,6 +859,11 @@
859859
"source_path": "defender-for-identity/manage-security-alerts.md",
860860
"redirect_url": "/defender-for-identity/understanding-security-alerts",
861861
"redirect_document_id": false
862-
},
862+
},
863+
{
864+
"source_path": "defender-for-identity/automated-response-exclusions.md",
865+
"redirect_url": "/defender-xdr/automatic-attack-disruption-exclusions",
866+
"redirect_document_id": false
867+
}
863868
]
864869
}

defender-business/mdb-faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,9 +163,9 @@ sections:
163163
164164
- question: Can I have a mix of Microsoft endpoint security subscriptions?
165165
answer: |
166-
Microsoft Defender for Business does not support mixed licensing, so a tenant with Defender for Business (which is included in Microsoft 365 Business Premium) along with Defender for Endpoint Plan 2 (which is included in Microsoft 365 E5 Security) defaults to the Defender for Business experience.
166+
Microsoft Defender for Business does not support mixed licensing, so a tenant with Defender for Business (which is included in Microsoft 365 Business Premium) along with Defender for Endpoint Plan 2 (which is included in the Microsoft Defender Suite) defaults to the Defender for Business experience.
167167
168-
For example, if you have 80 users licensed for Defender for Business (as part of a Microsoft 365 Business Premium subscription), and you add Microsoft 365 E5 Security for 30 of those users, the experience for all users defaults to Defender for Business. If you want to change that to the Defender for Endpoint Plan 2 experience, you should license all users for Defender for Endpoint Plan 2 (either through the standalone version of Defender for Endpoint Plan 2 or Microsoft 365 E5 Security), and then contact Microsoft Support to request the switch for your tenant.
168+
For example, if you have 80 users licensed for Defender for Business (as part of a Microsoft 365 Business Premium subscription), and you add the Microsoft Defender Suite for 30 of those users, the experience for all users defaults to Defender for Business. If you want to change that to the Defender for Endpoint Plan 2 experience, you should license all users for Defender for Endpoint Plan 2 (either through the standalone version of Defender for Endpoint Plan 2 or the Microsoft Defender Suite), and then contact Microsoft Support to request the switch for your tenant.
169169
170170
For more information, see [Manage your subscription settings](mdb-manage-subscription.md).
171171

defender-business/mdb-manage-subscription.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ ms.collection:
2222

2323
[Microsoft Defender for Business](mdb-overview.md) and [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint) are endpoint security subscriptions that your organization can use to protect devices, such as computers, tablets, and phones.
2424

25-
As your organization grows, you might be thinking about changing from Defender for Business to Defender for Endpoint. For example, if you have Defender for Business as part of a [Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-overview) subscription, and you add Microsoft 365 E5 Security to your subscription, you now have Defender for Endpoint Plan 2 capabilities while retaining the Defender for Business experience.
25+
As your organization grows, you might be thinking about changing from Defender for Business to Defender for Endpoint. For example, if you have Defender for Business as part of a [Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-overview) subscription, and you add the Microsoft Defender Suite to your subscription, you now have Defender for Endpoint Plan 2 capabilities while retaining the Defender for Business experience.
2626

2727
This article describes how to view your current license state and, if needed, change your experience from Defender for Business to Defender for Endpoint.
2828

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: medium
77
audience: ITPro
88
author: paulinbar
99
ms.author: painbar
10-
ms.reviewer: sugamar, yongrhee
10+
ms.reviewer: sugamar, ericlaw
1111
manager: bagol
1212
ms.custom: asr
1313
ms.topic: reference
@@ -462,7 +462,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
462462

463463
### Block Office applications from creating executable content
464464

465-
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
465+
This rule prevents Office apps, including Word, Excel, and PowerPoint, from being used as a vector to persist malicious code on disk. Malware that abuses Office as a vector might attempt to save malicious components to disk that would survive a computer reboot and persist on the system. This rule defends against this persistence technique by blocking access (open/execute) to the code written to disk. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
466466

467467
Intune name: `Office apps/macros creating executable content`
468468

@@ -579,10 +579,7 @@ Dependencies: Microsoft Defender Antivirus
579579

580580
### Block rebooting machine in Safe Mode
581581

582-
> [!NOTE]
583-
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
584-
585-
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
582+
This rule prevents the execution of certain commands to restart machines in Safe Mode. In Windows' Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such abuse of Safe Mode by preventing commonly abused commands like `bcdedit` and `bootcfg` from restarting machines in Safe Mode. Safe Mode is still accessible manually from the Windows Recovery Environment.
586583

587584
Intune Name: ` Block rebooting machine in Safe Mode`
588585

@@ -598,6 +595,9 @@ Advanced hunting action type:
598595

599596
Dependencies: Microsoft Defender Antivirus
600597

598+
> [!NOTE]
599+
> This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
600+
601601
### Block untrusted and unsigned processes that run from USB
602602

603603
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr)
@@ -620,9 +620,6 @@ Dependencies: Microsoft Defender Antivirus
620620

621621
### Block use of copied or impersonated system tools
622622

623-
> [!NOTE]
624-
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
625-
626623
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
627624

628625
Intune Name: `Block use of copied or impersonated system tools`
@@ -641,6 +638,9 @@ Advanced hunting action type:
641638

642639
Dependencies: Microsoft Defender Antivirus
643640

641+
> [!NOTE]
642+
> This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
643+
644644
### Block Webshell creation for Servers
645645

646646
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a crafted script that allows an attacker to control the compromised server.
@@ -654,7 +654,7 @@ GUID: `a8f5898e-1dc8-49a9-9878-85004b8a61e6`
654654
Dependencies: Microsoft Defender Antivirus
655655

656656
> [!NOTE]
657-
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management. This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Exchange servers.
657+
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management. This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
658658
659659
### Block Win32 API calls from Office macros
660660

defender-endpoint/data-storage-privacy.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- essentials-compliance
1717
ms.topic: concept-article
1818
search.appverid: met150
19-
ms.date: 05/12/2025
19+
ms.date: 09/03/2025
2020
appliesto:
2121
- Microsoft Defender for Endpoint Plan 1
2222
- Microsoft Defender for Endpoint Plan 2
@@ -43,7 +43,7 @@ Information collected includes file data (file names, sizes, and hashes), proces
4343

4444
Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/?linkid=827578).
4545

46-
This data enables Defender for Endpoint to:
46+
This data lets Defender for Endpoint:
4747

4848
- Proactively identify indicators of attack (IOAs) in your organization
4949
- Generate alerts if a possible attack was detected
@@ -53,20 +53,26 @@ Microsoft doesn't use your data for advertising.
5353

5454
## Data location
5555

56-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
56+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, India, or the United Arab Emirates (UAE). Customer data collected by the service might be stored in: (a) the geolocation of the tenant as identified during provisioning or, (b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
5757

58-
(a) the geo-location of the tenant as identified during provisioning; or
58+
(a) the geolocation of the tenant as identified during provisioning; or
5959

60-
(b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
60+
(b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
6161

62-
## Data Retention
62+
## Data retention
6363

6464
Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal.
6565

6666
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
6767

6868
In the advanced hunting investigation experience, it's accessible via a query for 30 days.
6969

70+
## Data recovery
71+
72+
The Microsoft Defender for Endpoint (MDE) service incorporates a regional disaster recovery strategy aligned with Microsoft's broader resiliency framework. For more information, see [Resiliency and continuity - Microsoft Service Assurance | Microsoft Learn](/compliance/assurance/assurance-resiliency-and-continuity). In the event of a service disruption, all MDE components are designed to fail over to a paired region within the same geographic boundary, thereby maintaining data residency requirements.
73+
74+
However, due to current service limitations in the United Arab Emirates, MDE components that depend on Azure Synapse workloads are supported with zonal resiliency only. At this time, for the workloads, there is no cross-region business continuity and disaster recovery (BCDR) capability available. For more information on Synapse’s disaster recovery capabilities, refer to the official documentation.
75+
7076
## Data sharing for Microsoft Defender for Endpoint
7177

7278
Microsoft Defender for Endpoint shares data, including customer data, among the following Microsoft products, also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -178,20 +178,15 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
178178
- For DEBIAN the mdatp package requires `libc6 >= 2.23`.
179179

180180
> [!NOTE]
181+
> For versions 101.25042.0003 and later, no external dependencies are required, whereas versions older than 101.25032.0000 require additional packages:
182+
> - RPM-based distributions: `mde-netfilter`, `pcre`, `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2`
183+
> - DEBIAN-based distributions: `mde-netfilter`, `libpcre3`, `libnetfilter-queue1`, `libglib2.0-0`
181184
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
182185
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or older, the following additional dependency on the auditd package exists for mdatp:
183186
> - The mdatp RPM package requires `audit`, `semanage`.
184187
> - For DEBIAN, the mdatp package requires `auditd`.
185188
> - For Mariner, the mdatp package requires `audit`.
186-
>
187-
> For versions older than `101.25032.0000`, the following requirements apply:
188-
> - RPM package needs: `mde-netfilter` and `pcre`
189-
> - DEBIAN package needs: `mde-netfilter` and `libpcre3`
190-
>
191-
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
192-
> The `mde-netfilter` package also has the following package dependencies:
193-
> - For DEBIAN, the `mde-netfilter` package requires `libnetfilter-queue1` and `libglib2.0-0`
194-
> - For RPM, the `mde-netfilter` package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
189+
195190

196191
## Installation instructions
197192

defender-endpoint/microsoft-defender-endpoint-mac-prerequisites.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,10 +48,10 @@ This article lists the prerequisites for installing and configuring Microsoft De
4848
### System requirements
4949

5050
These three most recent major releases of macOS are supported.
51+
- 26 (Tahoe)
52+
5153
- 15.0.1 (Sequoia)
5254
- 14 (Sonoma)
53-
- 13 (Ventura)
54-
5555
> [!NOTE]
5656
> Beta versions of macOS aren't supported, but new releases of macOS are supported from day 1.
5757
@@ -82,7 +82,7 @@ You can also configure Defender for Endpoint on macOS locally
8282
Microsoft Defender for Endpoint on macOS requires one of the following Microsoft Volume Licensing offers:
8383

8484
- Microsoft 365 E5
85-
- Microsoft 365 E5 Security
85+
- Microsoft Defender Suite
8686
- Microsoft 365 A5
8787
- Windows 10 Enterprise E5
8888
- Microsoft 365 Business Premium

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ After you've enabled the service, you might need to configure your network or fi
8989
Defender for Endpoint on Mac requires one of the following Microsoft Volume Licensing offers:
9090

9191
- Microsoft 365 E5
92-
- Microsoft 365 E5 Security
92+
- Microsoft Defender Suite
9393
- Microsoft 365 A5
9494
- Windows 10 Enterprise E5
9595
- Microsoft 365 Business Premium

0 commit comments

Comments
 (0)