You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .acrolinx-config.edn
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
{:changed-files-limit60
2
2
:allowed-branchname-matches ["main""release-.*"]
3
-
:allowed-filename-matches ["ATADocs/""ATPDocs/""CloudAppSecurityDocs/""defender/""defender-business/""defender-endpoint/""defender-for-cloud/""defender-for-iot/""defender-office-365/""defender-vulnerability-management/""defender-xdr/""exposure-management/""unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3
+
:allowed-filename-matches ["advanced-threat-analytics/""defender/""defender-business/""defender-endpoint/""defender-for-cloud-apps/""defender-for-cloud/""defender-for-identity/""defender-for-iot/""defender-office-365/""defender-vulnerability-management/""defender-xdr/""exposure-management/""unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
Copy file name to clipboardExpand all lines: defender-business/mdb-faq.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -163,9 +163,9 @@ sections:
163
163
164
164
- question: Can I have a mix of Microsoft endpoint security subscriptions?
165
165
answer: |
166
-
Microsoft Defender for Business does not support mixed licensing, so a tenant with Defender for Business (which is included in Microsoft 365 Business Premium) along with Defender for Endpoint Plan 2 (which is included in Microsoft 365 E5 Security) defaults to the Defender for Business experience.
166
+
Microsoft Defender for Business does not support mixed licensing, so a tenant with Defender for Business (which is included in Microsoft 365 Business Premium) along with Defender for Endpoint Plan 2 (which is included in the Microsoft Defender Suite) defaults to the Defender for Business experience.
167
167
168
-
For example, if you have 80 users licensed for Defender for Business (as part of a Microsoft 365 Business Premium subscription), and you add Microsoft 365 E5 Security for 30 of those users, the experience for all users defaults to Defender for Business. If you want to change that to the Defender for Endpoint Plan 2 experience, you should license all users for Defender for Endpoint Plan 2 (either through the standalone version of Defender for Endpoint Plan 2 or Microsoft 365 E5 Security), and then contact Microsoft Support to request the switch for your tenant.
168
+
For example, if you have 80 users licensed for Defender for Business (as part of a Microsoft 365 Business Premium subscription), and you add the Microsoft Defender Suite for 30 of those users, the experience for all users defaults to Defender for Business. If you want to change that to the Defender for Endpoint Plan 2 experience, you should license all users for Defender for Endpoint Plan 2 (either through the standalone version of Defender for Endpoint Plan 2 or the Microsoft Defender Suite), and then contact Microsoft Support to request the switch for your tenant.
169
169
170
170
For more information, see [Manage your subscription settings](mdb-manage-subscription.md).
Copy file name to clipboardExpand all lines: defender-business/mdb-manage-subscription.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ ms.collection:
22
22
23
23
[Microsoft Defender for Business](mdb-overview.md) and [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint) are endpoint security subscriptions that your organization can use to protect devices, such as computers, tablets, and phones.
24
24
25
-
As your organization grows, you might be thinking about changing from Defender for Business to Defender for Endpoint. For example, if you have Defender for Business as part of a [Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-overview) subscription, and you add Microsoft 365 E5 Security to your subscription, you now have Defender for Endpoint Plan 2 capabilities while retaining the Defender for Business experience.
25
+
As your organization grows, you might be thinking about changing from Defender for Business to Defender for Endpoint. For example, if you have Defender for Business as part of a [Microsoft 365 Business Premium](/microsoft-365/business-premium/m365bp-overview) subscription, and you add the Microsoft Defender Suite to your subscription, you now have Defender for Endpoint Plan 2 capabilities while retaining the Defender for Business experience.
26
26
27
27
This article describes how to view your current license state and, if needed, change your experience from Defender for Business to Defender for Endpoint.
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.localizationpriority: medium
7
7
audience: ITPro
8
8
author: paulinbar
9
9
ms.author: painbar
10
-
ms.reviewer: sugamar, yongrhee
10
+
ms.reviewer: sugamar, ericlaw
11
11
manager: bagol
12
12
ms.custom: asr
13
13
ms.topic: reference
@@ -462,7 +462,7 @@ Dependencies: Microsoft Defender Antivirus, AMSI
462
462
463
463
### Block Office applications from creating executable content
464
464
465
-
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk. Malware that abuses Office as a vector might attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
465
+
This rule prevents Office apps, including Word, Excel, and PowerPoint, from being used as a vector to persist malicious code on disk. Malware that abuses Office as a vector might attempt to save malicious components to disk that would survive a computer reboot and persist on the system. This rule defends against this persistence technique by blocking access (open/execute) to the code written to disk. This rule also blocks execution of untrusted files that might have been saved by Office macros that are allowed to run in Office files.
@@ -579,10 +579,7 @@ Dependencies: Microsoft Defender Antivirus
579
579
580
580
### Block rebooting machine in Safe Mode
581
581
582
-
> [!NOTE]
583
-
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
584
-
585
-
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
582
+
This rule prevents the execution of certain commands to restart machines in Safe Mode. In Windows' Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such abuse of Safe Mode by preventing commonly abused commands like `bcdedit` and `bootcfg` from restarting machines in Safe Mode. Safe Mode is still accessible manually from the Windows Recovery Environment.
586
583
587
584
Intune Name: ` Block rebooting machine in Safe Mode`
588
585
@@ -598,6 +595,9 @@ Advanced hunting action type:
598
595
599
596
Dependencies: Microsoft Defender Antivirus
600
597
598
+
> [!NOTE]
599
+
> This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
600
+
601
601
### Block untrusted and unsigned processes that run from USB
602
602
603
603
With this rule, admins can prevent unsigned or untrusted executable files from running from USB removable drives, including SD cards. Blocked file types include executable files (such as .exe, .dll, or .scr)
@@ -620,9 +620,6 @@ Dependencies: Microsoft Defender Antivirus
620
620
621
621
### Block use of copied or impersonated system tools
622
622
623
-
> [!NOTE]
624
-
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
625
-
626
623
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
627
624
628
625
Intune Name: `Block use of copied or impersonated system tools`
@@ -641,6 +638,9 @@ Advanced hunting action type:
641
638
642
639
Dependencies: Microsoft Defender Antivirus
643
640
641
+
> [!NOTE]
642
+
> This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
643
+
644
644
### Block Webshell creation for Servers
645
645
646
646
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a crafted script that allows an attacker to control the compromised server.
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management. This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Exchange servers.
657
+
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management. This rule is not yet recognized by Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show it as "Not applicable".
Copy file name to clipboardExpand all lines: defender-endpoint/data-storage-privacy.md
+12-6Lines changed: 12 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- essentials-compliance
17
17
ms.topic: concept-article
18
18
search.appverid: met150
19
-
ms.date: 05/12/2025
19
+
ms.date: 09/03/2025
20
20
appliesto:
21
21
- Microsoft Defender for Endpoint Plan 1
22
22
- Microsoft Defender for Endpoint Plan 2
@@ -43,7 +43,7 @@ Information collected includes file data (file names, sizes, and hashes), proces
43
43
44
44
Microsoft stores this data securely in Microsoft Azure and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/?linkid=827578).
45
45
46
-
This data enables Defender for Endpoint to:
46
+
This data lets Defender for Endpoint:
47
47
48
48
- Proactively identify indicators of attack (IOAs) in your organization
49
49
- Generate alerts if a possible attack was detected
@@ -53,20 +53,26 @@ Microsoft doesn't use your data for advertising.
53
53
54
54
## Data location
55
55
56
-
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, or India. Customer data collected by the service might be stored in: (a) the geo-location of the tenant as identified during provisioning or, (b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
56
+
Defender for Endpoint operates in the Microsoft Azure data centers in the European Union, the United Kingdom, the United States, Australia, Switzerland, India, or the United Arab Emirates (UAE). Customer data collected by the service might be stored in: (a) the geolocation of the tenant as identified during provisioning or, (b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data. For more information, see [Where your Microsoft 365 customer data is stored](/microsoft-365/enterprise/o365-data-locations).
57
57
58
-
(a) the geo-location of the tenant as identified during provisioning; or
58
+
(a) the geolocation of the tenant as identified during provisioning; or
59
59
60
-
(b) the geo-location as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
60
+
(b) the geolocation as defined by the data storage rules of an online service if this online service is used by Defender for Endpoint to process such data.
61
61
62
-
## Data Retention
62
+
## Data retention
63
63
64
64
Data from Microsoft Defender for Endpoint is retained for 180 days, visible across the portal.
65
65
66
66
Your data is kept and is available to you while the license is under grace period or suspended mode. At the end of this period, that data will be erased from Microsoft's systems to make it unrecoverable, no later than 180 days from contract termination or expiration.
67
67
68
68
In the advanced hunting investigation experience, it's accessible via a query for 30 days.
69
69
70
+
## Data recovery
71
+
72
+
The Microsoft Defender for Endpoint (MDE) service incorporates a regional disaster recovery strategy aligned with Microsoft's broader resiliency framework. For more information, see [Resiliency and continuity - Microsoft Service Assurance | Microsoft Learn](/compliance/assurance/assurance-resiliency-and-continuity). In the event of a service disruption, all MDE components are designed to fail over to a paired region within the same geographic boundary, thereby maintaining data residency requirements.
73
+
74
+
However, due to current service limitations in the United Arab Emirates, MDE components that depend on Azure Synapse workloads are supported with zonal resiliency only. At this time, for the workloads, there is no cross-region business continuity and disaster recovery (BCDR) capability available. For more information on Synapse’s disaster recovery capabilities, refer to the official documentation.
75
+
70
76
## Data sharing for Microsoft Defender for Endpoint
71
77
72
78
Microsoft Defender for Endpoint shares data, including customer data, among the following Microsoft products, also licensed by the customer. For customers in the Government Community Cloud (GCC), data sharing between government and commercial cloud environments may occur, depending on the location of the service offering.
Copy file name to clipboardExpand all lines: defender-endpoint/mde-linux-prerequisites.md
+4-9Lines changed: 4 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -178,20 +178,15 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
178
178
- For DEBIAN the mdatp package requires `libc6 >= 2.23`.
179
179
180
180
> [!NOTE]
181
+
> For versions 101.25042.0003 and later, no external dependencies are required, whereas versions older than 101.25032.0000 require additional packages:
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
182
185
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or older, the following additional dependency on the auditd package exists for mdatp:
183
186
> - The mdatp RPM package requires `audit`, `semanage`.
184
187
> - For DEBIAN, the mdatp package requires `auditd`.
185
188
> - For Mariner, the mdatp package requires `audit`.
186
-
>
187
-
> For versions older than `101.25032.0000`, the following requirements apply:
188
-
> - RPM package needs: `mde-netfilter` and `pcre`
189
-
> - DEBIAN package needs: `mde-netfilter` and `libpcre3`
190
-
>
191
-
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
192
-
> The `mde-netfilter` package also has the following package dependencies:
193
-
> - For DEBIAN, the `mde-netfilter` package requires `libnetfilter-queue1` and `libglib2.0-0`
194
-
> - For RPM, the `mde-netfilter` package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
0 commit comments