Skip to content

Commit 4644fcd

Browse files
committed
Merge branch 'main' into Submissions-chrisda
2 parents 5514fea + d10b1b6 commit 4644fcd

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

defender-endpoint/advanced-features.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 10/17/2024
17+
ms.date: 02/25/2025
1818
---
1919

2020
# Configure advanced features in Defender for Endpoint
@@ -96,7 +96,7 @@ This setting is turned on by default and is applied tenant wide. If you don't wa
9696

9797
Turning on this feature allows you to create indicators for IP addresses, domains, or URLs, which determine whether they'll be allowed or blocked based on your custom indicator list.
9898

99-
To use this feature, devices must be running Windows 10 version 1709 or later, or Windows 11. They should also have network protection in block mode and version 4.18.1906.3 or later of the antimalware platform [see KB 4052623](https://go.microsoft.com/fwlink/?linkid=2099834).
99+
To use this feature, devices must be running Windows 10 version 1709 or later, or Windows 11.
100100

101101
For more information, see [Overview of indicators](indicators-overview.md).
102102

unified-secops-platform/microsoft-threat-actor-naming.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ The following table lists publicly disclosed threat actor names with their origi
131131
|Sangria Tempest|Ukraine, Financially motivated|ELBRUS|
132132
|Sapphire Sleet|North Korea|COPERNICIUM, Genie Spider, BlueNoroff, CageyChameleon, CryptoCore|
133133
|Satin Typhoon|China|SCANDIUM, COMBINE, TG-0416, SILVERVIPER, DYNAMITE PANDA, Red Wraith, APT18, Elderwood Group, Wekby|
134-
|Seashell Blizzard|Russia|IRIDIUM, BE2, UAC-0113, Blue Echidna, Sandworm, PHANTOM, BlackEnergy Lite, APT44|
134+
|[Seashell Blizzard](https://www.microsoft.com/en-us/security/blog/2025/02/12/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation/)|Russia|IRIDIUM, BE2, UAC-0113, Blue Echidna, Sandworm, PHANTOM, BlackEnergy Lite, APT44|
135135
|[Secret Blizzard](https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/)|Russia|KRYPTON, VENOMOUS BEAR, Uroburos, Snake, Blue Python, Turla, WRAITH, ATG26|
136136
|Sefid Flood|Iran, Influence operations||
137137
|Shadow Typhoon|China|DarkShadow, Oro0lxy|

0 commit comments

Comments
 (0)