Skip to content

Commit 45c6ae6

Browse files
authored
Merge pull request #3441 from MicrosoftDocs/main
MDAV relnotes -- March platform release
2 parents 7d442cc + ccc07f1 commit 45c6ae6

File tree

3 files changed

+38
-32
lines changed

3 files changed

+38
-32
lines changed

defender-endpoint/defender-antivirus-compatibility-without-mde.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
ms.reviewer: yongrhee
77
ms.service: defender-endpoint
88
ms.topic: conceptual
9-
ms.date: 01/23/2025
9+
ms.date: 04/09/2025
1010
ms.subservice: ngp
1111
search.appverid: met150
1212
ms.localizationpriority: medium
@@ -84,7 +84,7 @@ Uninstall-WindowsFeature Windows-Defender-Gui
8484

8585
**Q:** Can I use Microsoft Defender Antivirus in passive mode without onboarding to Microsoft Defender for Endpoint?
8686

87-
**A:** No. Passive mode is a functionality in Microsoft Defender for Endpoint Plan 2.
87+
**A:** No. Passive mode is a functionality in Microsoft Defender for Endpoint Plan 1, Microsoft Defender for Endpoint Plan 2 and Microsoft Defender for Business.
8888

8989
**Q:** Can I use [EDR in block mode](edr-in-block-mode.md) without onboarding to Microsoft Defender for Endpoint?
9090

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 11 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -98,17 +98,24 @@ Updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101-
### March-2025 (Engine 1.1.25030.1)
101+
### March-2025 (Platform: 4.18.25030.2 | Engine 1.1.25030.1)
102102

103103
- Security intelligence update version: **1.427.3.0**
104-
- Release date: **April 1, 2025** (Engine only)
105-
- Platform: **4.18.25020.1009**
104+
- Release date: **April 1, 2025** (Engine) / **April 9, 2025** (Platform)
105+
- Platform: **4.18.25030.2**
106106
- Engine: **1.1.25030.1**
107107
- Support phase: **Security and Critical Updates**
108108

109109
#### What's new
110110

111-
- Product improvements
111+
- Improved caching of [device control settings](device-control-policies.md) to improve reliability in occasionally connected environments.
112+
- Performance improvement in on-access scans of files in network locations.
113+
- Fixed the Defender service description to match the latest installed version.
114+
- Improved Defender engine update logic when the update is included in a custom image.
115+
- Fix in health reporting where signature update data might have been incorrect.
116+
- Fixed reporting issue with [controlled folder access](controlled-folders.md) (CFA) protected folders using the PowerShell cmdlet [Get-MpPreference](/powershell/module/defender/get-mppreference) when CFA is disabled.
117+
- Improved performance when scanning UPX-packed files (Ultimate Packer for eXecutables) and updated the validation process to verify the integrity of the packed file itself.
118+
- Added support for distinguishing regular cloud allow signatures from clean [Indicators of Compromise](indicators-overview.md) (IoC) in [attack surface reduction](attack-surface-reduction.md) (ASR).
112119

113120
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
114121

@@ -155,31 +162,6 @@ Updates contain:
155162
- Improved device control policy enforcement in offline environments.
156163
- Fixed issue in the `WDNisDrv.sys` driver that caused system hangs during shutdown.
157164

158-
### September-2024 (Platform: 4.18.24090.11 | Engine 1.1.24090.11)
159-
160-
- Security intelligence update version: **1.421.12.0**
161-
- Release date: **October 30, 2024** (Engine and Platform)
162-
- Platform: **4.18.24090.11**
163-
- Engine: **1.1.24090.11**
164-
- Support phase: **Security and Critical Updates**
165-
166-
#### What's new
167-
168-
- Improved detection logic to reduce false positives related to the Azure Site Recovery rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
169-
- Resolved an issue that could lead to a Windows device to be marked as [noncompliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
170-
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting wasn't honored.
171-
- Fixed `SharedSignatureRoot` processing when an empty value was set.
172-
- Fixed a problem with [device control](device-control-overview.md) where certain file systems (like `FAT`, `FAT32`, `exFAT`) with volume information displayed when a blocking rule was defined.
173-
- Improved performance in specific scenarios where network files were accessed.
174-
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy wasn't being honored.
175-
- Fixed potential deadlock for [custom detection rules](/defender-xdr/custom-detection-rules) on the Windows client
176-
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) weren't being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
177-
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) weren't honored
178-
179-
> [!IMPORTANT]
180-
> On Windows Server 2019 and later, a new binary (`MpDefenderCoreService.exe`) will be included in the update package to support future service improvements (more information to follow).
181-
182-
183165
### Previous version updates: Technical upgrade support only
184166

185167
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 04/01/2025
9+
ms.date: 04/07/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,30 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### September-2024 (Platform: 4.18.24090.11 | Engine 1.1.24090.11)
33+
34+
- Security intelligence update version: **1.421.12.0**
35+
- Release date: **October 30, 2024** (Engine and Platform)
36+
- Platform: **4.18.24090.11**
37+
- Engine: **1.1.24090.11**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Improved detection logic to reduce false positives related to the Azure Site Recovery rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
43+
- Resolved an issue that could lead to a Windows device to be marked as [noncompliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
44+
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting wasn't honored.
45+
- Fixed `SharedSignatureRoot` processing when an empty value was set.
46+
- Fixed a problem with [device control](device-control-overview.md) where certain file systems (like `FAT`, `FAT32`, `exFAT`) with volume information displayed when a blocking rule was defined.
47+
- Improved performance in specific scenarios where network files were accessed.
48+
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy wasn't being honored.
49+
- Fixed potential deadlock for [custom detection rules](/defender-xdr/custom-detection-rules) on the Windows client
50+
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) weren't being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
51+
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) weren't honored
52+
53+
> [!IMPORTANT]
54+
> On Windows Server 2019 and later, a new binary (`MpDefenderCoreService.exe`) will be included in the update package to support future service improvements (more information to follow).
55+
3256
### August-2024 (Platform: 4.18.24080.9 | Engine: 1.1.24080.9)
3357

3458
- Security intelligence update version: **1.419.1.0**

0 commit comments

Comments
 (0)