Skip to content

Commit 3f469b4

Browse files
authored
Merge branch 'main' into docs-editor/submissions-outlook-report-mes-1764701982
2 parents 6c2f59e + 2d7773d commit 3f469b4

File tree

64 files changed

+335
-105
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

64 files changed

+335
-105
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
5959

6060
## Releases for Defender for Endpoint on macOS
6161

62+
6263
### Offline updates for security intelligence updates on macOS is now in public preview
6364

6465
This feature enables organizations to configure offline updates for security intelligence updates (also referred to as definition updates or signatures) on macOS using a local mirror server. For more information, see [Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS (preview)](./mac-support-offline-security-intelligence-update.md).
@@ -67,6 +68,19 @@ This feature enables organizations to configure offline updates for security int
6768

6869
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
6970

71+
### Nov-2025 (Build: 101.25102.0016 | Release version: 20.125102.16.0)
72+
73+
| Build: | **101.25102.0016** |
74+
|--------------------|-----------------------|
75+
| Release version: | **20.125102.16.0** |
76+
| Engine version: | **1.1.25090.2000** |
77+
| Signature version: | **1.435.600.0** |
78+
79+
##### What's new
80+
81+
- Bug and performance fixes
82+
83+
7084
### Oct-2025 (Build: 101.25082.0006 | Release version: 20.125082.6.0)
7185

7286
| Build: | **101.25082.0006** |

defender-for-cloud-apps/anomaly-detection-policy.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ Based on the policy results, security alerts are triggered. Defender for Cloud A
3636
> - [Suspicious inbox forwarding](#suspicious-inbox-forwarding).
3737
> - [Unusual ISP for an OAuth App](#unusual-isp-for-an-oauth-app).
3838
> - [Suspicious file access activity (by user)](#unusual-activities-by-user).
39-
> - [Ransomware activity](#ransomware-activity).
4039
>
4140
> You will continue to receive the same standard of protection without disruption to your existing security coverage. No action is required from your side.
4241
@@ -92,10 +91,6 @@ This detection identifies that users were active from an IP address that has bee
9291

9392
### Ransomware activity
9493

95-
> [!NOTE]
96-
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Ransomware payment instruction file uploaded to {Application}**.
97-
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
98-
9994
Defender for Cloud Apps extended its ransomware detection capabilities with anomaly detection to ensure a more comprehensive coverage against sophisticated Ransomware attacks. Using our security research expertise to identify behavioral patterns that reflect ransomware activity, Defender for Cloud Apps ensures holistic and robust protection. If Defender for Cloud Apps identifies, for example, a high rate of file uploads or file deletion activities it may represent an adverse encryption process. This data is collected in the logs received from connected APIs and is then combined with learned behavioral patterns and threat intelligence, for example, known ransomware extensions. For more information about how Defender for Cloud Apps detects ransomware, see [Protecting your organization against ransomware](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware).
10095

10196
### Activity performed by terminated user

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,4 +110,4 @@ We recommend running the [*Test-MdiReadiness.ps1*](https://github.com/microsoft/
110110
The *Test-MdiReadiness.ps1* script is also available from Microsoft Defender XDR, on the **Identities > Tools** page (Preview).
111111

112112
## Next step
113-
[Plan capacity for Microsoft Defender for Identity](capacity-planning.md)
113+
[Activate the Microsoft Defender for Identity sensor](activate-sensor.md)

defender-for-identity/identity-inventory.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,8 @@ There are several options you can choose from to customize the identities list v
4646
> [!NOTE]
4747
> When exporting the identities list to a CSV file, a maximum of 5,000 identities are displayed.
4848
49-
## ![A screenshot of identity inventory page.](media/identity-inventory/inventory11.png)
49+
:::image type="content" source="media/identity-inventory/inventory-page.png" alt-text="Screenshot of the identity inventory page in the Microsoft Defender portal.":::
50+
5051

5152
### Identity details
5253

defender-for-identity/link-unlink-account-to-identity.md

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Follow these steps to manually link accounts to a selected identity.
5959
1. Navigate to **Assets** > **Identity Inventory**.
6060
1. Select an **Identity** from the list.
6161

62-
:::image type="content" source="media/identity-inventory/inventory11.png" alt-text="Screenshot of the Identity Inventory page in the Defender portal. " lightbox="media/identity-inventory/inventory11.png":::
62+
:::image type="content" source="media/identity-inventory/inventory-page.png" alt-text="Screenshot of the identity inventory page in the Microsoft Defender portal." lightbox="media/identity-inventory/inventory-page.png":::
6363

6464
1. Select the **Observed in organization** tab.
6565
1. Open the **Accounts** tab.
@@ -73,22 +73,31 @@ Follow these steps to manually link accounts to a selected identity.
7373
- Security identifier (SID)
7474
- Source provider account
7575
1. Select one account from the table.
76+
77+
:::image type="content" source="media/link-unlink-account-to-identity/select-accounts.png" alt-text="Screenshot that shows a list of accounts that you can link. " lightbox="media/link-unlink-account-to-identity/select-accounts.png":::
78+
7679
1. Select **Next**.
7780
1. Enter a short justification comment explaining why you're linking these accounts.
7881
1. Your justification must:
7982
- Be between 1 and 50 characters
8083
- Use only letters, numbers, spaces, @, and _
8184
- If your input includes invalid characters or exceeds the limit, an error message will appear.
85+
86+
:::image type="content" source="media/link-unlink-account-to-identity/enter-justification.png" alt-text="Screenshot that shows where to enter the justification for why you are linking the accounts." lightbox="media/link-unlink-account-to-identity/enter-justification.png":::
87+
8288
1. Select **Next**.
8389
1. Review the selected accounts and your justification.
90+
91+
:::image type="content" source="media/link-unlink-account-to-identity/review-and-finish.png" alt-text="Screenshot that shows the review of the selected accounts and the justification." lightbox="media/link-unlink-account-to-identity/review-and-finish.png":::
92+
8493
1. Confirm that the accounts listed are correct.
8594
1. The account list refreshes automatically.
8695

8796
## Unlink accounts from an identity
8897

8998
Follow these steps to manually unlink accounts from a selected identity.
9099

91-
1. Go to **Identity Inventory > Observed in organization**
100+
1. Go to **Identity Inventory > Observed in organization**.
92101
1. Open the **Accounts** tab.
93102
1. Select one account set from the table.
94103
1. Select **Unlink account**.

defender-for-identity/media/identity-inventory/inventory11.png renamed to defender-for-identity/media/identity-inventory/inventory-page.png

File renamed without changes.
-15.5 KB
Loading
93.4 KB
Loading
99.7 KB
Loading
176 KB
Loading

0 commit comments

Comments
 (0)