You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Support phase: **Security and Critical Updates**
111
-
112
-
#### What's new
113
-
114
-
- Enhanced Passive Mode Scanning Behavior
115
-
When Microsoft Defender is in Passive mode, an Antivirus scan will not occur after a signature update , unless specifically set in the policy setting DisableScanOnUpdate.
116
-
- Improved Tamper Protection Handling
117
-
Optimized the configuration process for Tamper Protection in multi-threaded environments to ensure more reliable behavior.
118
-
- Digital Signature Verification Performance Boost
119
-
Enhanced the efficiency of digital signature verification to improve overall system performance.
120
-
- Refined ASR Rule Exclusion Processing
121
-
Refined exclusion processing and resolved false positives for the Attack Surface Reduction (ASR) rule: Block Office applications from injecting code into other processes.
- Support phase: **Security and Critical Updates**
131
-
132
-
#### What's new
133
-
134
-
- Added filtering to improve scan stability and prevent engine crashes
135
-
- Additional performance improvements to prevent concurrent scans. This change ensures that if a quick or full scan is already running, no additional quick or full scan scans are initiated from `MpCmdRun` or Powershell (`Start-Scan`).
136
-
- Resolved the issue where subfolder exclusions were not being honored in Microsoft Defender Antivirus scans related to non-Microsoft SIEM solutions. This fix ensures that specified subfolders are now correctly excluded from scans, preventing unnecessary detections and improving overall system performance.
- Support phase: **Security and Critical Updates**
145
-
146
-
#### What's new
147
-
148
-
- Windows multisession SKUs are now properly classified as client SKUs for signature versioning
149
-
-`EnableDynamicSignatureDroppedEventReporting` configuration is now available in Intune (see [Event ID 2011](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-2011))
150
-
- The display name and description is now displayed correctly for the [device control](/defender-endpoint/device-control-overview) filter driver in Windows services
151
-
- Improved performance for kernel driver
152
-
- Improvements to [network protection](/defender-endpoint/network-protection#overview-of-network-protection) performance related to packet loss during high network utilization
153
-
- Reliability improvements to network protection during service shutdown
154
-
- Enriched [Event ID 1000](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) to include `ScanOnlyIfIdle` and scan priority
155
-
- Improved device control Windows Portal Device (WPD) device discovery in File explorer. (For more information about device control, see [Device control policy samples and scenarios](/defender-endpoint/device-control-overview#device-control-policy-samples-and-scenarios).)
156
-
- Resolved discrepancy in [device health reports](/defender-endpoint/device-health-reports) between signature publish and signature install date and time
157
-
- Performance improvements when scanning files/folders with extended attributes
158
-
- Reliability improvement in the Defender kernel driver to avoid crashing when there's excessive disk input/output
159
-
- Added exponential backoff support to Core Service 1DS manager telemetry module to address memory consumption and DNS flooding issues
- Support phase: **Security and Critical Updates**
168
-
169
-
#### What's new
170
-
171
-
- Fixed TVM Block where we failed to block a trusted file
172
-
- Fixed Microsoft Defender platform update timestamp to reflect the actual update time.
173
-
- The [1002 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1002) (An anti-malware scan was stopped before it finished) now includes details of the stop reason.
174
-
- Added more details to the [1000 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) (Scan started), like scan trigger and scan on idle.
175
-
- Improved attack surface reduction file processing to correctly handle ["allow" Indicators of Compromise](/defender-endpoint/indicators-overview) (IoCs).
176
-
- Improvement in health reporting for machines that are rebooted or hibernated.
177
-
- Improved performance for [Smart App Control](/windows/apps/develop/smart-app-control/overview) (SAC) trusted file handling.
178
-
- Improved [device control](/defender-endpoint/device-control-overview) logic for offline printers.
179
-
180
104
### Previous version updates: Technical upgrade support only
181
105
182
106
After a new package version is released, support for the previous two versions is reduced to technical upgrade support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
- Support phase: **Technical upgrade support (only)**
42
+
43
+
What's new
44
+
45
+
- Enhanced Passive Mode Scanning Behavior When Microsoft Defender is in Passive mode, an Antivirus scan will not occur after a signature update , unless specifically set in the policy setting DisableScanOnUpdate.
46
+
- Improved Tamper Protection Handling Optimized the configuration process for Tamper Protection in multi-threaded environments to ensure more reliable behavior.
47
+
- Digital Signature Verification Performance Boost Enhanced the efficiency of digital signature verification to improve overall system performance.
48
+
- Refined ASR Rule Exclusion Processing Refined exclusion processing and resolved false positives for the Attack Surface Reduction (ASR) rule: Block Office applications from injecting code into other processes.
- Support phase: **Technical upgrade support (only)**
62
+
63
+
What's new
64
+
65
+
- Added filtering to improve scan stability and prevent engine crashes
66
+
- Additional performance improvements to prevent concurrent scans. This change ensures that if a quick or full scan is already running, no additional quick or full scan scans are initiated from `MpCmdRun` or Powershell (`Start-Scan`).
67
+
- Resolved the issue where subfolder exclusions were not being honored in Microsoft Defender Antivirus scans related to non-Microsoft SIEM solutions. This fix ensures that specified subfolders are now correctly excluded from scans, preventing unnecessary detections and improving overall system performance.
- Support phase: **Technical upgrade support (only)**
80
+
81
+
What's new
82
+
83
+
- Windows multisession SKUs are now properly classified as client SKUs for signature versioning
84
+
-`EnableDynamicSignatureDroppedEventReporting` configuration is now available in Intune (see [Event ID 2011](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-2011))
85
+
- The display name and description is now displayed correctly for the [device control](/defender-endpoint/device-control-overview) filter driver in Windows services
86
+
- Improved performance for kernel driver
87
+
- Improvements to [network protection](/defender-endpoint/network-protection#overview-of-network-protection) performance related to packet loss during high network utilization
88
+
- Reliability improvements to network protection during service shutdown
89
+
- Enriched [Event ID 1000](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) to include `ScanOnlyIfIdle` and scan priority
90
+
- Improved device control Windows Portal Device (WPD) device discovery in File explorer. (For more information about device control, see [Device control policy samples and scenarios](/defender-endpoint/device-control-overview#device-control-policy-samples-and-scenarios).)
91
+
- Resolved discrepancy in [device health reports](/defender-endpoint/device-health-reports) between signature publish and signature install date and time
92
+
- Performance improvements when scanning files/folders with extended attributes
93
+
- Reliability improvement in the Defender kernel driver to avoid crashing when there's excessive disk input/output
94
+
- Added exponential backoff support to Core Service 1DS manager telemetry module to address memory consumption and DNS flooding issues
- Support phase: **Technical upgrade support (only)**
107
+
108
+
What's new
109
+
110
+
- Fixed TVM Block where we failed to block a trusted file
111
+
- Fixed Microsoft Defender platform update timestamp to reflect the actual update time.
112
+
- The [1002 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1002) (An anti-malware scan was stopped before it finished) now includes details of the stop reason.
113
+
- Added more details to the [1000 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) (Scan started), like scan trigger and scan on idle.
114
+
- Improved attack surface reduction file processing to correctly handle ["allow" Indicators of Compromise](/defender-endpoint/indicators-overview) (IoCs).
115
+
- Improvement in health reporting for machines that are rebooted or hibernated.
116
+
- Improved performance for [Smart App Control](/windows/apps/develop/smart-app-control/overview) (SAC) trusted file handling.
117
+
- Improved [device control](/defender-endpoint/device-control-overview) logic for offline printers.
0 commit comments