Skip to content

Commit 495880c

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-an-1738152940
2 parents 1aa1a95 + 8d2d35c commit 495880c

27 files changed

+199
-44
lines changed

CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ If you require more than 10 data sources, we recommend that you split the data s
4646
To work with a network appliance that isn't listed, select **Other > Customer log format** or **Other (manual only)**. For more information, see [Working with the custom log parser](custom-log-parser.md).
4747

4848
>[!NOTE]
49-
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings or your firewall/proxy.
49+
>Integrating with secure transfer protocols (FTPS and Syslog – TLS) often requires additional settings on your firewall/proxy. For more information, see [Advanced log collector management](log-collector-advanced-management.md).
5050
5151
Repeat this process for each firewall and proxy whose logs can be used to detect traffic on your network.
5252

CloudAppSecurityDocs/index.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,8 @@ landingContent:
4848
links:
4949
- text: Basic setup
5050
url: general-setup.md
51+
- text: Connect cloud apps
52+
url: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
5153
- text: View and manage security posture
5254
url: security-saas.md
5355
- linkListType: concept
@@ -70,8 +72,6 @@ landingContent:
7072
links:
7173
- text: Calculate risk scores
7274
url: risk-score.md
73-
- text: Connect cloud apps
74-
url: enable-instant-visibility-protection-and-governance-actions-for-your-apps.md
7575
- text: Collect logs
7676
url: discovery-docker.md
7777
- text: Discover and manage shadow IT
@@ -137,4 +137,4 @@ landingContent:
137137
- text: Monitor and respond to unusual data usage
138138
url: app-governance-monitor-apps-unusual-data-usage.md
139139
- text: Secure apps with app hygiene
140-
url: app-governance-secure-apps-app-hygiene-features.md
140+
url: app-governance-secure-apps-app-hygiene-features.md

CloudAppSecurityDocs/log-collector-advanced-management.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,9 @@ You should be able to view the following contents:
5050
- `ssl_update`
5151
- `config.json`
5252

53-
### Customize certificate files
53+
### Add certificate files
5454

55-
This procedure describes how to customize the certificate files used for secure connections to the cloud discovery Docker instance.
55+
This procedure describes how to add the required certificate files used for secure connections to the cloud discovery Docker instance.
5656

5757
1. Open an FTP client and connect to the log collector host.
5858

@@ -63,7 +63,7 @@ This procedure describes how to customize the certificate files used for secure
6363
| **FTP** |- **pure-ftpd.pem**: Includes the key and certificate data |
6464
| **Syslog** |- **ca.pem**: The certificate authority's certificate that was used to sign the client’s certificate. <br>- **server-key.pem** and **server-cert.pem**: The log collector's certificate and key <br><br>Syslog messages are sent over TLS to the log collector, which requires mutual TLS authentication, including authenticating both the client and server certificates. |
6565

66-
Filenames are mandatory. If any of the files are missing, the update fails.
66+
Files are mandatory. If any of the files for the receiver type are missing, the update fails.
6767

6868
1. In a terminal window, run:
6969

@@ -161,7 +161,7 @@ docker cp Proxy-CA.crt Ubuntu-LogCollector:/var/adallom/ftp/discovery
161161
162162
To secure the docker image and ensure that only one IP address is allowed to send the syslog messages to the log collector, create an IP table rule on the host machine to allow input traffic and drop the traffic coming over specific ports, such as TCP/601 or UDP/514, depending on the deployment.
163163
164-
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4`` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
164+
The following command shows an example of how to create an IP table rule that can be added to the host machine. This table rule allows the IP address `1.2.3.4` to connect to the log collector container over TCP port 601, and drop all other connections coming from other IP addresses over the same port.
165165
166166
```bash
167167
iptables -I DOCKER-USER \! --src 1.2.3.4 -m tcp -p tcp --dport 601 -j DROP
@@ -171,7 +171,7 @@ iptables -I DOCKER-USER \! --src 1.2.3.4 -m tcp -p tcp --dport 601 -j DROP
171171
172172
The container is now ready.
173173
174-
Run the **collector_config** command using the API token that you used during the creation of your log collector. For example:
174+
Run the `collector_config` command using the API token that you used during the creation of your log collector. For example:
175175
176176
:::image type="content" source="media/log-collector-advanced-tasks/docker-3.png" alt-text="Screenshot of the Create log collector dialog." border="false":::
177177
@@ -520,7 +520,7 @@ Compare the output file (`/tmp/log.log`) to the messages stored in the `/var/ada
520520
When updating your log collector:
521521
522522
- **Before installing the new version**, make sure to stop your log collector and remove the current image.
523-
- **After installing the new version**, [update your certificate files](#customize-certificate-files).
523+
- **After installing the new version**, [update your certificate files](#add-certificate-files).
524524
525525
## Next steps
526526

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-linux
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 12/16/2024
18+
ms.date: 01/30/2025
1919
---
2020

2121
# Configure offline security intelligence update for Microsoft Defender for Endpoint on Linux
@@ -187,7 +187,7 @@ Use the following sample `mdatp_managed.json` and update the parameters as per t
187187
},
188188
"antivirusEngine": {
189189
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
190-
"offlineDefintionUpdateFallbackToCloud":false,
190+
"offlineDefinitionUpdateFallbackToCloud":false,
191191
"offlineDefinitionUpdate": "enabled"
192192
},
193193
"features": {

defender-endpoint/mac-whatsnew.md

Lines changed: 22 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,8 @@
22
title: What's new in Microsoft Defender for Endpoint on Mac
33
description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on Mac.
44
ms.service: defender-endpoint
5-
author: emmwalshh
6-
ms.author: ewalsh
7-
ms.reviewer: joshbregman
5+
author: deniseb
6+
ms.author: deniseb
87
manager: deniseb
98
ms.localizationpriority: medium
109
ms.date: 01/24/2025
@@ -16,6 +15,7 @@ ms.collection:
1615
ms.topic: reference
1716
ms.subservice: macos
1817
search.appverid: met150
18+
ms.reviewer: mavel
1919
---
2020

2121
# What's new in Microsoft Defender for Endpoint on Mac
@@ -64,18 +64,32 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
6464

6565
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
6666

67+
### Jan-2025 (Build: 101.24122.0005 | Release version: 20.124122.5.0)
68+
69+
| Build: | **101.24122.0005** |
70+
|--------------------|-----------------------|
71+
| Release version: | **20.124122.4.0** |
72+
| Engine version: | **1.1.24080.11** |
73+
| Signature version: | **1.419.351.0** |
74+
75+
##### What's new
76+
77+
- Removed support of macOS 12, the minimal requirement is now macOS 13.0 or later
78+
- Fix: Defender quarantines a file even if it is marked as immutable
79+
- `mdatp health` can return [`out_of_date`](device-health-microsoft-defender-antivirus-health.md#up-to-date-definitions) status for `definitions_status`
80+
- Bug and performance fixes
81+
6782
### Dec-2024 (Build: 101.24102.0018 | Release version: 20.124102.18.0)
6883

69-
| Build: | **101.24102.0018** |
84+
| Build: | **101.24102.0018** |
7085
|--------------------|-----------------------|
71-
| Release version: | **20.124102.18.0** |
72-
| Engine version: | **1.1.24080.10** |
73-
| Signature version: | **1.419.298.0** |
86+
| Release version: | **20.124102.18.0** |
87+
| Engine version: | **1.1.24080.10** |
88+
| Signature version: | **1.419.298.0** |
7489

7590
##### What's new
7691

7792
- **Improved User/Group Permission Handling** - Added reporting in `mdatp-health` for user/group permission issues for Defender files. On restart Defender attempts to cure these issues.
78-
7993
- Bug and performance fixes.
8094

8195

defender-office-365/anti-malware-policies-configure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.collection:
1717
description: Admins can learn how to view, create, modify, and remove anti-malware policies in Exchange Online Protection (EOP).
1818
ms.custom:
1919
ms.service: defender-office-365
20-
ms.date: 01/06/2025
20+
ms.date: 01/29/2025
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -81,6 +81,9 @@ You can configure anti-malware policies in the Microsoft Defender portal or in P
8181
- The specified Microsoft 365 Groups.
8282
- **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
8383

84+
> [!TIP]
85+
> Subdomains are automatically included unless you specifically exclude them. For example, a policy that includes contoso.com also includes marketing.contoso.com unless you exclude marketing.contoso.com.
86+
8487
Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
8588

8689
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.

defender-office-365/anti-phishing-policies-eop-configure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom:
1616
description: Admins can learn how to create, modify, and delete the anti-phishing policies that are available in Exchange Online Protection (EOP) organizations with or without Exchange Online mailboxes.
1717
ms.service: defender-office-365
1818
search.appverid: met150
19-
ms.date: 01/06/2025
19+
ms.date: 01/29/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
---
@@ -78,6 +78,9 @@ For anti-phishing policy procedures in organizations with Microsoft Defender for
7878
- The specified Microsoft 365 Groups.
7979
- **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
8080

81+
> [!TIP]
82+
> Subdomains are automatically included unless you specifically exclude them. For example, a policy that includes contoso.com also includes marketing.contoso.com unless you exclude marketing.contoso.com.
83+
8184
Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
8285

8386
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.

defender-office-365/anti-phishing-policies-mdo-configure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom:
1616
description: Admins can learn how to create, modify, and delete the advanced anti-phishing policies that are available in organizations with Microsoft Defender for Office 365.
1717
ms.service: defender-office-365
1818
search.appverid: met150
19-
ms.date: 4/8/2024
19+
ms.date: 01/29/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-xdr/microsoft-365-defender" target="_blank">Microsoft Defender XDR</a>
@@ -84,6 +84,9 @@ For anti-phishing policy procedures in organizations without Defender for Office
8484
- The specified Microsoft 365 Groups.
8585
- **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
8686

87+
> [!TIP]
88+
> Subdomains are automatically included unless you specifically exclude them. For example, a policy that includes contoso.com also includes marketing.contoso.com unless you exclude marketing.contoso.com.
89+
8790
Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
8891

8992
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.

defender-office-365/anti-spam-policies-configure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.custom:
1717
description: Admins can learn how to view, create, modify, and delete anti-spam policies in Exchange Online Protection (EOP).
1818
ms.service: defender-office-365
19-
ms.date: 01/06/2025
19+
ms.date: 01/29/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -86,6 +86,9 @@ You can configure anti-spam policies in the Microsoft Defender portal or in Powe
8686
- The specified Microsoft 365 Groups.
8787
- **Domains**: All recipients in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
8888

89+
> [!TIP]
90+
> Subdomains are automatically included unless you specifically exclude them. For example, a policy that includes contoso.com also includes marketing.contoso.com unless you exclude marketing.contoso.com.
91+
8992
Click in the appropriate box, start typing a value, and then select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
9093

9194
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.

defender-office-365/outbound-spam-policies-configure.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can learn how to view, create, modify, and delete outbound spam policies in Exchange Online Protection (EOP).
2020
ms.service: defender-office-365
21-
ms.date: 08/01/2024
21+
ms.date: 01/29/2025
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -78,6 +78,9 @@ You can configure outbound spam policies in the Microsoft Defender portal or in
7878
- The specified Microsoft 365 Groups.
7979
- **Domains**: All senders in the organization with a primary email address in the specified [accepted domain](/exchange/mail-flow-best-practices/manage-accepted-domains/manage-accepted-domains).
8080

81+
> [!TIP]
82+
> Subdomains are automatically included unless you specifically exclude them. For example, a policy that includes contoso.com also includes marketing.contoso.com unless you exclude marketing.contoso.com.
83+
8184
Click in the appropriate box, start typing a value, and select the value that you want from the results. Repeat this process as many times as necessary. To remove an existing value, select :::image type="icon" source="media/m365-cc-sc-remove-selection-icon.png" border="false"::: next to the value.
8285

8386
For users or groups, you can use most identifiers (name, display name, alias, email address, account name, etc.), but the corresponding display name is shown in the results. For users or groups, enter an asterisk (\*) by itself to see all available values.

0 commit comments

Comments
 (0)