You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/remediation-actions.md
+13-7Lines changed: 13 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,23 +27,27 @@ Watch the following video to learn more about remediation actions in Defender fo
27
27
28
28
To perform any of the [supported actions](#supported-actions), you need to:
29
29
30
-
- Configure the account that Microsoft Defender for Identity will use to perform them. By default, the Microsoft Defender for Identity sensor installed on a domain controller will impersonate the *LocalSystem* account of the domain controller and perform the above actions. However, you can change this default behavior by [setting up a gMSA account](manage-action-accounts.md) and scope the permissions as you need.
30
+
- Configure the account that Microsoft Defender for Identity will use to perform them. By default, the Microsoft Defender for Identity sensor installed on a domain controller will impersonate the *LocalSystem* account of the domain controller and perform the above actions. However, you can change this default behavior by [setting up a gMSA account](manage-action-accounts.md) and scope the permissions as you need.
31
31
32
32
- Be signed into Microsoft Defender XDR to with relevant permissions. For Defender for Identity actions, you'll need a custom role with **Response (manage)** permissions. For more information, see [Create custom roles with Microsoft Defender XDR Unified RBAC](/microsoft-365/security/defender/create-custom-rbac-roles).
33
33
34
34
## Supported actions
35
35
36
-
The following Defender for Identity actions can be performed directly on your on-premises identities:
36
+
The following Defender for Identity actions can be performed on Identities:
37
37
38
-
-**Disable user in Active Directory**: This will temporarily prevent a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.
38
+
-**Disable user in Active Directory** - This temporarily prevents a user from signing in to the on-premises network. This can help prevent compromised users from moving laterally and attempting to exfiltrate data or further compromise the network.
39
39
40
-
-**Reset user password**– This will prompt the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
40
+
-**Reset user password**- This prompts the user to change their password on the next logon, ensuring that this account can't be used for further impersonation attempts.
41
41
42
-
-**Mark User Compromised** - The user’s risk level is set to High
42
+
-**Mark User Compromised** - The user's risk level is set to High.
43
43
44
-
-**Suspend User in Entra ID** - Block new sign-ins and access to cloud resources
44
+
-**Suspend User in Entra ID** - Block new sign-ins and access to cloud resources.
45
45
46
-
-**Require User to Sign In Again** - Revoke a user’s active sessions
46
+
-**Require User to Sign In Again** - Revoke a user's active sessions.
47
+
48
+
-**Suspend User in Okta** - Temporarily disables a user account. This action can be used when a legit user account was found to be compromised and needed to be disabled.
49
+
50
+
-**Deactivate User in Okta** - This action can be used when a non-legit malicious account was detected, to deactivate the account permanently.
47
51
48
52
Depending on your Microsoft Entra ID roles, you might see additional Microsoft Entra ID actions, such as requiring users to sign in again and confirming a user as compromised. For more information, see [Remediate risks and unblock users](/entra/id-protection/howto-identity-protection-remediate-unblock).
49
53
@@ -56,6 +60,8 @@ Depending on your Microsoft Entra ID roles, you might see additional Microsoft E
56
60
|Require User to Sign In Again | - Global Administrator <br>|
57
61
| Disable/Enable User in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
58
62
| Force Password Reset in Active Directory | Refer to [Required permissions Defender for Identity in Microsoft Defender XDR](/defender-for-identity/role-groups#required-permissions-defender-for-identity-in-microsoft-defender-xdr)|
63
+
| Suspend User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
64
+
| Deactivate User in Okta | A custom role defined with permissions for Response (manage) Or One of the following Microsoft Entra roles: <br> - Security Operator <br> - Security Administrator <br> - Global Administrator|
Copy file name to clipboardExpand all lines: defender-endpoint/behavior-monitor-macos.md
+8-11Lines changed: 8 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
6
6
manager: deniseb
7
7
ms.service: defender-endpoint
8
8
ms.topic: overview
9
-
ms.date: 06/06/2025
9
+
ms.date: 06/27/2025
10
10
ms.subservice: ngp
11
11
audience: ITPro
12
12
ms.collection:
@@ -32,25 +32,22 @@ f1.keywords: NOCSH
32
32
- Microsoft Defender Antivirus
33
33
- Supported [versions of macOS](/defender-endpoint/microsoft-defender-endpoint-mac)
34
34
35
-
> [!IMPORTANT]
36
-
> Some information relates to pre-released product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
37
-
38
35
## Overview of behavior monitoring
39
36
40
37
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them.
41
38
42
39
## Prerequisites
43
40
44
41
- The device must be onboarded to Microsoft Defender for Endpoint.
45
-
-[Preview features](/defender-endpoint/preview) must be enabled in the [Microsoft Defender portal](https://security.microsoft.com).
46
-
- The device must be in the [Beta channel](/defender-endpoint/mac-updates) (formerly `InsiderFast`).
47
-
- The minimum Microsoft Defender for Endpoint version number must be Beta (Insiders-Fast): [101.24042.0002](/defender-endpoint/mac-whatsnew#may-2024-build-101240420008---release-version-2012404280) or newer. The version number refers to the `app_version` (also known as **Platform update**).
42
+
- For the best experience, Microsoft Defender should be up-to-date with the latest version.
43
+
- The minimum Microsoft Defender for Endpoint version number must be [101.25032.0006](/defender-endpoint/mac-whatsnew#apr-2025-build-101250320006---release-version-2012503260) or newer. The version number refers to the `app_version` (also known as **Platform update**).
48
44
- Real-time protection (RTP) must be enabled.
49
45
-[Cloud-delivered protection](/defender-endpoint/mac-preferences) must be enabled.
50
-
- The device must be explicitly enrolled in the preview program.
51
46
52
47
## Deployment instructions for behavior monitoring
53
48
49
+
Behavior Monitoring will soon be on by default. You can confirm your device’s enrollment status by checking the output of ***mdatp health --details features*** in your terminal. If not already enabled, you must configure it.
50
+
54
51
To deploy behavior monitoring in Microsoft Defender for Endpoint on macOS, you must change the behavior monitoring policy using one of the following methods:
55
52
56
53
-[Intune](#intune-deployment)
@@ -243,7 +240,7 @@ Once done, disable behavior monitoring statistics:
If the issue persists, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
243
+
If the issue persists, especially after a reboot, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
247
244
248
245
## Network real-time inspection for macOS
249
246
@@ -283,12 +280,12 @@ NRI should have a low impact on network performance. Instead of holding the conn
Copy file name to clipboardExpand all lines: defender-endpoint/configure-device-connectivity.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.reviewer: pahuijbr
15
15
search.appverid: MET150
16
16
audience: ITPro
17
-
ms.date: 06/11/2025
17
+
ms.date: 06/27/2025
18
18
---
19
19
20
20
# Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint
@@ -162,11 +162,11 @@ The following table lists the current static IP ranges covered by the MicrosoftD
162
162
163
163
Configure devices to communicate through your connectivity infrastructure. Ensure devices meet prerequisites and have updated sensor and Microsoft Defender Antivirus versions. For more information, see [Configure device proxy and Internet connection settings ](configure-proxy-internet.md).
For more information, see [Verify client connectivity](verify-connectivity.md).
168
168
169
-
The following preonboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
169
+
The following pre-onboarding checks can be run on both Windows and Xplat MDE Client analyzer: [Download the Microsoft Defender for Endpoint client analyzer](overview-client-analyzer.md).
170
170
171
171
To test streamlined connectivity for devices not yet onboarded to Defender for Endpoint, you can use the Client Analyzer for Windows using the following commands:
Copy file name to clipboardExpand all lines: defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: emmwalshh
8
8
ms.author: ewalsh
9
9
ms.reviewer: yongrhee
10
10
ms.topic: how-to
11
-
ms.date: 05/08/2025
11
+
ms.date: 06/27/2025
12
12
manager: deniseb
13
13
ms.custom: nextgen
14
14
ms.collection:
@@ -33,6 +33,7 @@ Always-on protection consists of real-time protection, behavior monitoring, and
33
33
34
34
> [!NOTE]
35
35
> [Tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) helps keep always-on protection and other security settings from being changed. As a result, when tamper protection is enabled, any changes made to [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) are ignored. If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
36
+
> If a file that contains a threat is placed in an Azure file share, it's not remediated when placed. A user has to open the file for it to be detected by real-time protection.
36
37
37
38
## Manage antivirus settings with Microsoft Intune
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+17-5Lines changed: 17 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: emmwalshh
6
6
ms.author: ewalsh
7
7
manager: deniseb
8
8
ms.localizationpriority: medium
9
-
ms.date: 06/13/2025
9
+
ms.date: 06/27/2025
10
10
audience: ITPro
11
11
ms.collection:
12
12
- m365-security
@@ -62,14 +62,25 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
62
62
63
63
## macOS Deprecation
64
64
65
-
- Microsoft Defender for Endpoint no longer supports Big Sur (11).
66
-
- macOS 12 (Monterey) won't be supported starting December 2024.
65
+
- Microsoft Defender for Endpoint no longer supports macOS 11 (Big Sur) and 12 (Monterey).
67
66
68
67
## Releases for Defender for Endpoint on macOS
69
68
70
-
### Behavior Monitoring for macOS is now in public preview
69
+
### Behavior Monitoring for macOS is now generally available
71
70
72
-
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
71
+
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
@@ -96,6 +107,7 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
96
107
97
108
- Hardware UUID is now displayed in the Security Portal
98
109
- Bug and performance fixes
110
+
-**(GA) Behavior Monitoring for macOS**: For information on Behavior Monitoring for Microsoft Defender for Endpoint on macOS, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
Copy file name to clipboardExpand all lines: defender-endpoint/onboard-server.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: install-set-up-deploy
15
15
ms.subservice: onboard
16
16
search.appverid: met150
17
-
ms.date: 04/02/2025
17
+
ms.date: 06/27/2025
18
18
---
19
19
20
20
# Onboard servers through Microsoft Defender for Endpoint's onboarding experience
@@ -172,7 +172,7 @@ The following points apply to Windows Server 2016 and Windows Server 2012 R2:
172
172
173
173
- Not all attack surface reduction rules are applicable to all operating systems. See [Attack surface reduction rules](attack-surface-reduction-rules-reference.md).
174
174
175
-
- Operating system upgrades aren't supported. Offboard then uninstall before upgrading. The installer package can only be used to upgrade installations that haven't yet been updated with new anti-malware platform or EDR sensor update packages.
175
+
- Operating system upgrades are supported on Windows 10 and 11, and Windows Server 2019 or later. These versions include the necessary Defender for Endpoint components. For Windows Server 2016 and earlier, you must offboard from Defender for Endpoint and uninstall Defender for Endpoint before upgrading the OS.
176
176
177
177
- To automatically deploy and onboard the new solution using Microsoft Endpoint Configuration Manager (MECM) you need to be on [version 2207 or later](/mem/configmgr/core/plan-design/changes/whats-new-in-version-2207#improved-microsoft-defender-for-endpoint-mde-onboarding-for-windows-server-2012-r2-and-windows-server-2016). You can still configure and deploy using version 2107 with the hotfix rollup, but this requires extra deployment steps. See [Microsoft Endpoint Configuration Manager migration scenarios](server-migration.md#microsoft-endpoint-configuration-manager-migration-scenarios) for more information.
[](media/analyzer-commands.png#lightbox)
67
67
68
-
68
+
69
69
### Additional information
70
70
71
71
- The latest *preview* version of MDE Client Analyzer can be downloaded at [https://aka.ms/MDEClientAnalyzerPreview](https://aka.ms/MDEClientAnalyzerPreview).
@@ -108,24 +108,24 @@ The following script performs the first six steps of the [Running the Binary ver
echo"MDESupportTool installed at /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer"
126
-
126
+
127
127
```
128
-
128
+
129
129
#### Python Client Analyzer Install Script
130
130
131
131
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](/defender-endpoint/overview-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.
0 commit comments