Skip to content

Commit 4c051e9

Browse files
Merge pull request #5058 from MicrosoftDocs/main
[AutoPublish] main to live - 09/16 01:34 PDT | 09/16 14:04 IST
2 parents 55a4355 + 6438612 commit 4c051e9

File tree

3 files changed

+5
-3
lines changed

3 files changed

+5
-3
lines changed

defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -886,9 +886,9 @@ sections:
886886
887887
- BM state: Behavior Monitoring state (Enabled or Disabled)
888888
889-
- Antivirus signature age: Antivirus signature age (in days)
889+
- Antivirus signature age: Antivirus signature age (in days). Calculated as the time starting from the Security Intelligence Update (SIU) release date, to the current date. Before a signature is updated for the first time, it'll display an age of 65535 days.
890890
891-
- Antispyware signature age: Antispyware signature age (in days)
891+
- Antispyware signature age: Antispyware signature age (in days). Timestamp reflecting the Security Intelligence Update (SIU) release date (not the local installation time). Before the timestamp is updated for the first time, its value is null.
892892
893893
- Last quick scan age: Last quick scan age (in days)
894894

defender-office-365/submissions-teams.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ In organizations with Microsoft Defender for Office 365 Plan 2 or Microsoft Defe
3333
- The Microsoft Teams app for iOS/iPadOS: Version 7.15 or later.
3434
- The Microsoft Teams for Android: Version 1416/1.0.0.2025153104 or later.
3535

36-
Users can report mmessages as malicious or non-malicious in Teams from chats, standard, private and shared channels, and meeting conversations. Admins can also get visibility into Teams messages that users are reporting.
36+
Users can report messages as malicious or non-malicious in Teams from chats, standard, private and shared channels, and meeting conversations. Admins can also get visibility into Teams messages that users are reporting.
3737

3838
> [!NOTE]
3939
> User reporting of messages in Teams is not supported in U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD).

exposure-management/whats-new.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,8 @@ On-premises Attack Path now terminate automatically when they reach End Game ass
3434

3535
The changes bring greater clarity, focus, and prioritization empowering security teams to mitigate the most critical risks with confidence.
3636

37+
Read more about it in this blog: [Refining Attack Paths: Prioritizing Real-World, Exploitable Threats](https://techcommunity.microsoft.com/blog/securityexposuremanagement/refining-attack-paths-prioritizing-real-world-exploitable-threats/4454051)
38+
3739
For more information, see [Overview of attack paths](work-attack-paths-overview.md) and [Review attack paths](review-attack-paths.md).
3840

3941
## May 2025

0 commit comments

Comments
 (0)