You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-updates.md
+30-7Lines changed: 30 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
3
3
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: high
6
-
ms.date: 04/01/2025
6
+
ms.date: 04/09/2025
7
7
audience: ITPro
8
8
ms.topic: reference
9
9
author: emmwalshh
@@ -197,18 +197,41 @@ During the technical support (only) phase, commercially reasonable support incid
197
197
> [!NOTE]
198
198
> If you're manually deploying Microsoft Defender Antivirus Platform Update, or if you're using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
199
199
200
-
## How to roll back an update
200
+
## How to install an update
201
+
202
+
To install the latest security intelligence and antivirus engine updates, you can use any of the following methods:
201
203
202
-
In the unfortunate event that you encounter issues after a platform update, you can roll back to the previous or the inbox version of the Microsoft Defender platform.
204
+
- Windows Update
205
+
- Windows Update server (WSUS)
206
+
- Software Update server (SUP)
207
+
- File server
208
+
- Windows Security app: See [Microsoft Defender Antivirus in the Windows Security app](/defender-endpoint/microsoft-defender-security-center-antivirus)
- To roll back to the previous version, run the following command:
214
+
For more information, see [Manage the sources for Microsoft Defender Antivirus protection updates](/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus).
To get the latest platform updates, you can use any of the following methods:
207
217
208
-
- To roll back this update to the version shipped with the Operating System ("%ProgramFiles%\Windows Defender")
218
+
- Windows Update
219
+
- Windows Update server (WSUS)
220
+
- Software Update server (SUP)
221
+
- Windows Security app: See [Microsoft Defender Antivirus in the Windows Security app](/defender-endpoint/microsoft-defender-security-center-antivirus)
222
+
- The [Windows Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623)
In the unfortunate event that you encounter issues after an update, you can roll back to the previous or the inbox version.
227
+
228
+
| Scenario | Command |
229
+
|--|--|
230
+
| Roll security intelligence updates back to the previous or to the original inbox version of the security intelligence version |`"%programdata%\Microsoft\Windows Defender\Platform\<version>\MpCmdRun.exe"-RemoveDefinitions`|
231
+
| Roll the engine version back to the previous version |`"%programdata%\Microsoft\Windows Defender\Platform\<version>\MpCmdRun.exe"-RemoveDefinitions -Engine`|
232
+
| Roll a platform update back to the previous version |`"%programdata%\Microsoft\Windows Defender\Platform\<version>\MpCmdRun.exe" -RevertPlatform`|
233
+
| Roll updates back to the version shipped with the operating system (`%ProgramFiles%\Windows Defender`) |`"%programdata%\Microsoft\Windows Defender\Platform\<version>\MpCmdRun.exe" -ResetPlatform`|
234
+
212
235
## Platform version included with Windows 10 releases
213
236
214
237
The table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-microsoft-defender.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,13 +49,13 @@ In Microsoft Defender, you can connect workspaces by selecting **Connect a works
49
49
After connecting your Microsoft Sentinel workspace and Microsoft Defender XDR advanced hunting data, you can start querying Microsoft Sentinel data from the advanced hunting page. For an overview of advanced hunting features, read [Proactively hunt for threats with advanced hunting](advanced-hunting-overview.md).
50
50
51
51
## What to expect for Defender XDR tables streamed to Microsoft Sentinel
52
-
-**Use tables with longer data retention period in queries** – Advanced hunting follows the maximum data retention period configured for the Defender XDR tables (see [Understand quotas](advanced-hunting-limits.md#understand-advanced-hunting-quotas-and-usage-parameters)). If you stream Defender XDR tables to Microsoft Sentinel and have a data retention period longer than 30 days for said tables, you can query for the longer period in advanced hunting.
52
+
-**Use tables with longer data retention period in queries** – Advanced hunting follows the maximum data retention period configured for the Defender XDR tables (see [Understand quotas](advanced-hunting-limits.md#understand-advanced-hunting-quotas-and-usage-parameters)). If you [stream Defender XDR tables](/defender-xdr/streaming-api) to Microsoft Sentinel and have a data retention period longer than 30 days for said tables, you can query for the longer period in advanced hunting.
53
53
-**Use Kusto operators you've used in Microsoft Sentinel** – In general, queries from Microsoft Sentinel work in advanced hunting, including queries that use the `adx()` operator. There might be cases where IntelliSense warns you that the operators in your query don't match the schema, however, you can still run the query and it should still be executed successfully.
54
54
-**Use the time filter dropdown instead of setting the time span in the query** – If you're filtering ingestion of Defender XDR tables to Sentinel instead of streaming the tables as is, don't filter the time in the query as this might generate incomplete results. If you set the time in the query, the streamed, filtered data from Sentinel is used because it usually has the longer data retention period. If you would like to make sure you're querying all Defender XDR data for up to 30 days, use the time filter dropdown provided in the query editor instead.
55
55
-**View `SourceSystem` and `MachineGroup` columns for Defender XDR data that have been streamed from Microsoft Sentinel** – Since the columns `SourceSystem` and `MachineGroup` are added to Defender XDR tables once they're streamed to Microsoft Sentinel, they also appear in results in advanced hunting in Defender. However, they remain blank for Defender XDR tables that weren't streamed (tables that follow the default 30-day data retention period).
56
56
57
57
> [!NOTE]
58
-
> Using the unified portal, where you can query Microsoft Sentinel data after connecting a Microsoft Sentinel workspace, does not automatically mean you can also query Defender XDR data while in Microsoft Sentinel. Raw data ingestion of Defender XDR should still be configured in Microsoft Sentinel for this to happen.
58
+
> Using the unified portal, where you can query Microsoft Sentinel data after connecting a Microsoft Sentinel workspace, doesn't automatically mean you can also query Defender XDR data while in Microsoft Sentinel. Raw data ingestion of Defender XDR should still be configured in Microsoft Sentinel for this to happen.
59
59
60
60
## Where to find your Microsoft Sentinel data
61
61
You can use advanced hunting KQL (Kusto Query Language) queries to hunt through Microsoft Defender XDR and Microsoft Sentinel data.
@@ -86,10 +86,10 @@ In the unified portal, in addition to viewing the schema column names and descri
86
86
- The Microsoft Sentinel `SecurityAlert` table is replaced by `AlertInfo` and `AlertEvidence` tables, which both contain all the data on alerts. While SecurityAlert isn't available in the schema tab, you can still use it in queries using the advanced hunting editor. This provision is made so as not to break existing queries from Microsoft Sentinel that use this table.
87
87
- Guided hunting mode and take actions capabilities are supported for Defender XDR data only.
88
88
- Custom detections have the following limitations:
89
-
- Custom detections are not available for KQL queries that do not include Defender XDR data.
90
-
- Near real-time detection frequency is not available for detections that include Microsoft Sentinel data.
91
-
- Custom functions that were created and saved in Microsoft Sentinel are not supported.
92
-
- Defining entities from Sentinel data is not yet supported in custom detections.
89
+
- Custom detections aren't available for KQL queries that don't include Defender XDR data.
90
+
- Near real-time detection frequency isn't available for detections that include Microsoft Sentinel data.
91
+
- Custom functions that were created and saved in Microsoft Sentinel aren't supported.
92
+
- Defining entities from Sentinel data isn't yet supported in custom detections.
93
93
- Bookmarks aren't supported in the advanced hunting experience. They're supported in the **Microsoft Sentinel > Threat management > Hunting** feature. Alternatively, you can use the [Link to incident](advanced-hunting-defender-results.md#link-query-results-to-an-incident) feature to link query results to new or existing incidents.
94
94
- If you're streaming Defender XDR tables to Log Analytics, there might be a difference between the`Timestamp` and `TimeGenerated` columns. In case the data arrives to Log Analytics after 48 hours, it's being overridden upon ingestion to `now()`. Therefore, to get the actual time the event happened, we recommend relying on the `Timestamp` column.
95
95
- When prompting [Security Copilot](advanced-hunting-security-copilot.md) for advanced hunting queries, you might find that not all Microsoft Sentinel tables are currently supported. However, support for these tables can be expected in the future.
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,10 @@ You can also get product updates and important notifications through the [messag
40
40
- (Preview) The [OAuthAppInfo](advanced-hunting-oauthappinfo-table.md) table is now available for preview in advanced hunting. The table contains information about Microsoft 365-connected OAuth applications registered with Microsoft Entra ID and available in the Defender for Cloud Apps app governance capability.
41
41
42
42
- The `OnboardingStatus` and `NetworkAdapterDnsSuffix` columns are now available in the [`DeviceNetworkInfo`](advanced-hunting-devicenetworkinfo-table.md) table in advanced hunting.
43
-
43
+
- (Preview) The following advanced hunting schema tables are now available for preview to help you look through Microsoft Teams events and related information:
44
+
- The [MessageEvents](advanced-hunting-messageevents-table.md) table contains details about messages sent and received within your organization at the time of delivery
45
+
- The [MessagePostDeliveryEvents](advanced-hunting-messagepostdeliveryevents-table.md) table contains information about security events that occurred after the delivery of a Microsoft Teams message in your organization
46
+
- The [MessageUrlInfo](advanced-hunting-messageurlinfo-table.md) table contains information about URLs sent through Microsoft Teams messages in your organization
0 commit comments