Skip to content

Commit 340f1a9

Browse files
authored
Merge branch 'main' into WI429399-update-cloud-app-catalog-screenshots
2 parents 0f6c4fb + a54cf84 commit 340f1a9

15 files changed

+153
-74
lines changed

defender-endpoint/android-configure.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,15 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
109109
> [!NOTE]
110110
> - The other config keys of Network Protection will only work if the parent key '**Enable Network Protection in Microsoft Defender'** is enabled.
111111
> - To ensure comprehensive protection against Wi-Fi threats, users should enable location permission and select the "Allow All the Time" option. This permission is optional but highly recommended, even when the app is not actively in use. If location permission is denied, Defender for Endpoint will only offer limited protection against network threats and will only safeguard users from rogue certificates.
112-
**An open wi-fi network alert** is generated whenever a user connects to an open Wi-Fi network. If the user reconnects to the same network within a seven-day period, no new alert will be generated. However, connecting to a different open Wi-Fi network will result in an immediate alert.
112+
113+
> [!IMPORTANT]
114+
> Starting May 19, 2025, alerts are no longer generated in the Microsoft Defender portal for mobile devices connecting or disconnecting to an open wireless network and for downloading/installing/deleting self-signed certificates. Instead, these activities are now generated as events and are viewable in the device timeline.</br></br>
115+
> Here are a key changes about this new experience:</br>
116+
> - For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on Android available on May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.</br>
117+
> - WWhen an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.</br>
118+
> - Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including to trusted networks, are sent to the device timeline as events.
119+
> - Users allow-listed certificates: After the update, downloading/installing/deleting self-signed certificates events, including user-trusted certificates, are sent to the device timeline as events.</br>
120+
> - The previous experience of generating alerts for these activities still continue to apply to GCC tenants.
113121
114122
## Privacy Controls
115123

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 04/18/2025
18+
ms.date: 05/15/2025
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Android
@@ -28,6 +28,17 @@ ms.date: 04/18/2025
2828

2929
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030

31+
#### Alerts for activities related to open wireless connection and certificates are now detected as events
32+
33+
May 2025
34+
35+
Starting May 19, 2025, security operations center (SOC) analysts can now view the following as events instead of alerts:
36+
37+
- Connecting or disconnecting to open wireless networks
38+
- Download/installation/removal of self-signed certificates
39+
40+
These events can be viewed in the Timeline tab of a device page. For more information, see [Network protection](android-configure.md#network-protection).
41+
3142
#### Deploy Defender for Endpoint prerelease builds on Android devices using Google Play preproduction tracks
3243

3344
April 2025

defender-endpoint/ios-configure-features.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: ios
1616
search.appverid: met150
17-
ms.date: 03/27/2025
17+
ms.date: 05/15/2025
1818
---
1919

2020
# Configure Microsoft Defender for Endpoint on iOS features
@@ -167,9 +167,13 @@ Use the following procedure to set up MAM config for unenrolled devices for netw
167167

168168
6. Review and create the configuration policy.
169169

170-
> [!NOTE]
171-
> **Open Wi-Fi Network Alert:**
172-
> An alert is generated whenever a user connects to an open Wi-Fi network. If the user reconnects to the same network within a seven-day period, no new alert is generated. However, connecting to a different open Wi-Fi network results in an immediate alert.
170+
> [!IMPORTANT]
171+
> Starting May 19, 2025, alerts in the Microsoft Defender portal are no longer generated when users connect to an open wireless network. Instead, this activity now generates events and are viewable in the device timeline. With this change, security operations center (SOC) analysts can now view connection/disconnection to open wireless networks as events. If auto-remediation key is enabled, old alerts are resolved automatically after the changes take effect.</br></br>
172+
> Here are key points about this change:</br>
173+
> - For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on iOS available on May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.</br>
174+
> - When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.</br>
175+
> - Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including to user trusted networks, are sent to the device timeline as events.</br>
176+
> - This change doesn't impact GCC customers. The previous experience of receiving alerts while connecting to open wireless networks still apply to them.
173177
174178
## Coexistence of multiple VPN profiles
175179

defender-endpoint/ios-whatsnew.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: sunasing; denishdonga
88
ms.localizationpriority: medium
9-
ms.date: 03/28/2025
9+
ms.date: 05/15/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,14 @@ search.appverid: met150
2929

3030
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131

32+
#### Alerts for activities related to open wireless connections are now detected as events
33+
34+
**May 2025**
35+
36+
Starting May 19, 2025, when a user connects to an open wireless network on a mobile device, an alert is no longer generated on the Microsoft Defender portal. Instead, this activity is added as an event and viewable under the device timeline.
37+
38+
For more information, see [Configure network protection](ios-configure-features.md#configure-network-protection).
39+
3240
#### Improving Usability: Key updates to the Microsoft Defender app interface on iOS
3341

3442
**March 2025**

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 04/09/2025
6+
ms.date: 05/14/2025
77
audience: ITPro
88
ms.topic: reference
99
author: emmwalshh
@@ -98,6 +98,25 @@ Updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### April-2025 (Platform: TBD | Engine: 1.1.25040.1)
102+
103+
- Security intelligence update version: **1.429.3.0**
104+
- Release date:  **May 14, 2025 (Engine)** / (Platform pending)
105+
- Platform: (*coming soon*)
106+
- Engine: **1.1.25040.1**
107+
- Support phase: **Security and Critical Updates**
108+
109+
#### What's new
110+
111+
- Fixed TVM Block where we failed to block a trusted file
112+
- Fixed Microsoft Defender platform update timestamp to reflect the actual update time.
113+
- The [1002 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1002) (An anti-malware scan was stopped before it finished) now includes details of the stop reason.
114+
- Added more details to the [1000 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) (Scan started), like scan trigger and scan on idle.
115+
- Improved ASR file processing to correctly handle ["allow" Indicators of Compromise](/defender-endpoint/indicators-overview) (IoCs).
116+
- Improvement in health reporting for machines that are rebooted or hibernated.
117+
- Improved performance for [Smart App Control](/windows/apps/develop/smart-app-control/overview) (SAC) trusted file handling.
118+
- Improved [device control](/defender-endpoint/device-control-overview) logic for offline printers.
119+
101120
### March-2025 (Platform: 4.18.25030.2 | Engine 1.1.25030.1)
102121

103122
- Security intelligence update version: **1.427.3.0**
@@ -186,7 +205,6 @@ To install the latest security intelligence and antivirus engine updates, you ca
186205
- Windows Update
187206
- Windows Update server (WSUS)
188207
- Software Update Point (SUP)
189-
190208
- [File server](/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus)
191209
- Windows Security app: See [Microsoft Defender Antivirus in the Windows Security app](/defender-endpoint/microsoft-defender-security-center-antivirus)
192210
- Command line, as follows:

defender-endpoint/run-analyzer-linux.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: linux
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 04/01/2025
12+
ms.date: 05/14/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -45,7 +45,7 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
4545
2. Verify the download.
4646

4747
```bash
48-
echo 'B5EBD9AB36F2DB92C341ABEBB20A50551D08D769CB061EAFCC1A931EFACE305D XMDEClientAnalyzerBinary.zip' | sha256sum -c
48+
echo '4D3073F252667AC87F1229163677CB6843E0454AC4F33A526D7F55DDAA5E09E3 XMDEClientAnalyzerBinary.zip' | sha256sum -c
4949
```
5050

5151
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.

defender-endpoint/run-analyzer-macos.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: macos
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 04/11/2025
12+
ms.date: 05/14/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -37,13 +37,13 @@ If you're experiencing reliability or device health issues with Microsoft Defend
3737
If you're using a terminal, download the tool by running the following command:
3838

3939
```bash
40-
wget --quiet -O XMDEClientAnalyzerBinary.zip https://go.microsoft.com/fwlink/?linkid=2297517
40+
wget --quiet -O XMDEClientAnalyzerBinary.zip "https://go.microsoft.com/fwlink/?linkid=2297517"
4141
```
4242

4343
2. Verify the download.
4444

4545
```bash
46-
echo 'B5EBD9AB36F2DB92C341ABEBB20A50551D08D769CB061EAFCC1A931EFACE305D XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
46+
echo '4D3073F252667AC87F1229163677CB6843E0454AC4F33A526D7F55DDAA5E09E3 XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
4747
```
4848

4949
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.

defender-endpoint/troubleshoot-performance-issues.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: ewalsh
77
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
10-
ms.date: 04/01/2025
10+
ms.date: 05/14/2025
1111
audience: ITPro
1212
ms.topic: troubleshooting
1313
ms.subservice: ngp
@@ -44,7 +44,7 @@ First, you might want to check if other software is causing the issue. Read [Che
4444
|2. **Using HTA's, CHM's and different files as databases**. <br/>Anytime that Microsoft Defender Antivirus must extract and/or scan complex file formats, higher CPU utilization can occur. | Consider switching to using actual databases if you need to save info and query it. <br/><br/>As a workaround, add [Antivirus exclusions (process+path)](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus). |
4545
|3. **Using obfuscations on scripts**. <br/>If you obfuscate scripts, Microsoft Defender Antivirus in order to check if the script contains malicious payloads, it can use more CPU utilization while scanning. | Use script obfuscation only when necessary.<br/><br/>As a workaround, add [Antivirus exclusions (process+path)](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus). |
4646
|4. **Not letting the Microsoft Defender Antivirus cache finish before sealing the image**.| If you're creating a VDI image such as for a non-persistent image, make sure that cache maintenance completes before the image is sealed. <br/> For more information, see [Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment](/defender-endpoint/deployment-vdi-microsoft-defender-antivirus). |
47-
|5. **Having the wrong path exclusion(s) due to misspelling**. <br/>If you add misspelled exclusion paths, it can lead to performance issues.| Use `MpCmdRun.exe -CheckExclusion -Path` to validate path-based exclusions. |
47+
|5. **Misspelled exclusions**. <br/>| Use `MpCmdRun.exe -CheckExclusion -Path` to validate path-based exclusions. |
4848
|6. **When a path exclusion is added, it works for scanning flows**. <br/>Behavior Monitoring (BM) and Network Real-time Inspection (NRI) can still cause performance issues. |As a workaround, take these steps: <br/>1. (Preferred) For .exe's and dll's use [Indicators – File hash - allow](/defender-endpoint/indicator-file) or [Indicators – Certificate - allow](/defender-endpoint/indicator-certificates) <br/>2. (Alternative) [Add Antivirus exclusions (process+path)](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus). |
4949
|7. **File hash computation**. <br/>If you enable file hash computation, which is used for [file indicators](indicator-file.md), there's more performance overhead. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance. | This is where you, and your leadership team will have to make a decision, of having more security or less CPU utilization. <br/><br/>One possible solution is to disable the File hash computation feature. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **MpEngine**, and then enable file hash computation features. <br/>**Note**: To enable Indicators - File hash functionality, this feature must be activated.|
5050

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: ewalsh
77
author: emmwalshh
88
ms.reviewer: noamhadash, pahuijbr, yongrhee
99
ms.localizationpriority: medium
10-
ms.date: 04/17/2025
10+
ms.date: 05/14/2025
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -46,6 +46,10 @@ For more information on what's new with other Microsoft Defender security produc
4646
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4747
- [What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
4848

49+
## May 2025
50+
51+
- (GA) New setting for **"Allow Network Protection On Win Server"** to be able to manage Network Protection for Windows Server 2019 and later in Microsoft Defender for Endpoint Security Settings Management and Microsoft Intune. See [Turn on network protection](/defender-endpoint/enable-network-protection).
52+
4953
## April 2025
5054

5155
- (Preview) **Contain IP addresses of undiscovered devices**: Containing IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint is now in preview. Containing an IP address prevents attackers from spreading attacks to other non-compromised devices. See [Contain IP addresses of undiscovered devices](respond-machine-alerts.md#contain-ip-addresses-of-undiscovered-devices) for more information.

defender-office-365/anti-spam-protection-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- seo-marvel-apr2020
2020
description: Admins can learn about the anti-spam settings and filters that help prevent spam in Exchange Online Protection (EOP).
2121
ms.service: defender-office-365
22-
ms.date: 12/08/2024
22+
ms.date: 05/14/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -145,7 +145,7 @@ These settings aren't configured in the default anti-spam policy by default, or
145145

146146
² For **High confidence phishing**, the **Move message to Junk Email folder** action is effectively deprecated. Although you might be able to select the **Move message to Junk Email folder** action, high confidence phishing messages are always quarantined (equivalent to selecting **Quarantine message**).
147147

148-
³ You can this use value as a condition in mail flow rules to filter or route the message.
148+
³ You can this use value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments.
149149

150150
⁴ If the spam filtering verdict quarantines messages by default (**Quarantine message** is already selected when you get to the page), the default quarantine policy name is shown in the **Select quarantine policy** box. If you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. For more information about the quarantine policies that are used by default for spam filter verdicts, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
151151

0 commit comments

Comments
 (0)