Skip to content

Commit 4e213a4

Browse files
committed
Merge branch 'update-mda-ids' of https://github.com/DeCohen/defender-docs-pr into update-mda-ids
2 parents 67b296b + 309c2b8 commit 4e213a4

23 files changed

+11550
-6498
lines changed

ATADocs/suspicious-activity-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -536,9 +536,9 @@ Apply the latest patches to all of your machines, and check all security updates
536536

537537
1. [Remove WannaCry](https://support.microsoft.com/help/890830/remove-specific-prevalent-malware-with-windows-malicious-software-remo)
538538

539-
1. Data in the control of some ransom software can sometimes be decrypted. Decryption is only possible if the user hasn't restarted or turned off the computer. For more information, see [Wanna Cry Ransomware](https://answers.microsoft.com/en-us/windows/forum/windows_10-security/wanna-cry-ransomware/5afdb045-8f36-4f55-a992-53398d21ed07?auth=1)
539+
1. Data in the control of some ransom software can sometimes be decrypted. Decryption is only possible if the user hasn't restarted or turned off the computer. For more information, see [WannaCrypt ransomware worm targets out-of-date systems](https://www.microsoft.com/security/blog/2017/05/12/wannacrypt-ransomware-worm-targets-out-of-date-systems/)
540540

541-
>[!NOTE]
541+
> [!NOTE]
542542
> To disable a suspicious activity alert, contact support.
543543
544544
## See also

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ In cases like these, be sure to cover files that are larger than 50 MB by using
1919

2020
In Microsoft Defender XDR, select **Settings** > **Conditional Access App Control** > **Default behavior** to manage settings for files that are larger than 50 MB.
2121

22+
With Edge in-browser protection, in case the end user session is protected AND the policy is set to 'Always apply the selected action even if data cannot be scanned', any file larger than 50MB is blocked.
23+
2224
## Maximum file size for session policies based on content inspection
2325

2426
When you apply a session policy to block file uploads or downloads based on content inspection, the inspection is performed only on files that are smaller than 30 MB and that have fewer than 1 million characters.

defender-endpoint/data-storage-privacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ ms.date: 05/12/2025
3434
This section covers some of the most frequently asked questions regarding privacy and data handling for Defender for Endpoint.
3535

3636
> [!NOTE]
37-
> This article explains the data storage and privacy details related to Defender for Endpoint and Defender for Business. For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576), and also [Windows privacy FAQ](https://go.microsoft.com/fwlink/?linkid=827577).
37+
> This article explains the data storage and privacy details related to Defender for Endpoint and Defender for Business. For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576).
3838
3939
## What are we collecting?
4040

defender-endpoint/gov.md

Lines changed: 49 additions & 48 deletions
Large diffs are not rendered by default.

defender-endpoint/linux-whatsnew.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,12 +43,26 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### July-2025 Build: 101.25052.0007 | Release version: 30.125052.0007.0
47+
48+
|Build: |**101.25052.0007** |
49+
|-------------------|----------------------|
50+
|Released: |**July 22, 2025** |
51+
|Published: |**July 22, 2025** |
52+
|Release version: |**30.125052.0007.0** |
53+
|Engine version: |**1.1.25020.4000** |
54+
|Signature version: |**1.427.370.0** |
55+
56+
What's new
57+
- Fixed issue to generate unique Machine identifiers to ensure each onboarded device is uniquely identified.
58+
- Other stability improvements and bug fixes.
59+
4660
### June-2025 Build: 101.25042.0003 | Release version: 30.125042.0003.0
4761

4862
|Build: |**101.25042.0003** |
4963
|-------------------|----------------------|
50-
|Released: |**June 30, 2025** |
51-
|Published: |**June 30, 2025** |
64+
|Released: |**June 30, 2025** |
65+
|Published: |**June 30, 2025** |
5266
|Release version: |**30.125042.0003.0** |
5367
|Engine version: |**1.1.25020.4000** |
5468
|Signature version: |**1.427.370.0** |

defender-endpoint/mac-install-with-intune.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -484,11 +484,9 @@ To download the onboarding package from the Microsoft Defender portal:
484484

485485
1. On the **Deployment method** drop-down, select **Mobile Device Management / Microsoft Intune**.
486486

487-
![macos-download-onboarding-package](media/mac-install-with-intune/macos-download-onboarding-package.png)
488-
489-
490-
491-
3. Select **Download onboarding package**. Save it as _GatewayWindowsDefenderATPOnboardingPackage.zip_ to the same directory.
487+
![Screenshot of the Onboarding page with Deployment method Mobile Device Management / Microsoft Intune highlighted.](media/mac-install-with-intune/macos-download-onboarding-package.png)
488+
489+
1. Select **Download onboarding package**. Save it as _GatewayWindowsDefenderATPOnboardingPackage.zip_ to the same directory.
492490

493491
1. Extract the contents of the .zip file:
494492

defender-endpoint/machines-view-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier2
1414
ms.topic: article
1515
search.appverid: met150
16-
ms.date: 01/23/2025
16+
ms.date: 07/20/2025
1717
---
1818

1919
# Device inventory
@@ -46,7 +46,7 @@ There are several options you can choose from to customize the devices list view
4646
During the onboarding process, the **Devices list** is gradually populated with devices as they begin to report sensor data. Use this view to track your onboarded endpoints as they come online, or download the complete endpoint list as a CSV file for offline analysis.
4747

4848
> [!NOTE]
49-
> If you export the devices list, it contains every device in your organization. It might take a significant amount of time to download, depending on how large your organization is. Exporting the list in CSV format displays the data in an unfiltered manner. The CSV file includes all devices in the organization, regardless of any filtering applied in the view itself.
49+
> If you export the devices list, it contains every device in your organization. It might take a significant amount of time to download, depending on how large your organization is.
5050
>
5151
> In addition, when you export the devices list, the antivirus status shows as `Not-Supported`. For antivirus status, use the recently released [Microsoft Defender Antivirus health report](device-health-microsoft-defender-antivirus-health.md) instead. This report allows you to export even more details.
5252

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 15 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 06/23/2025
6+
ms.date: 07/23/2025
77
audience: ITPro
88
ms.topic: reference
99
author: emmwalshh
@@ -99,6 +99,20 @@ Updates contain:
9999
- Serviceability improvements
100100
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
101101

102+
### June-2025 (Platform: 4.18.25060.7 | Engine: 1.1.25060.6)
103+
104+
- Security intelligence update version: **1.433.2.0**
105+
- Release date: **July 22, 2025 (Engine)** / **July 22, 2025 (Platform)**
106+
- Platform: **4.18.25060.7**
107+
- Engine: **1.1.25060.6**
108+
- Support phase: **Security and Critical Updates**
109+
110+
#### What's new
111+
112+
- Added filtering to improve scan stability and prevent engine crashes
113+
- Additional performance improvements to prevent concurrent scans. This change ensures that if a quick or full scan is already running, no additional quick or full scan scans are initiated from `MpCmdRun` or Powershell (`Start-Scan`).
114+
- Resolved the issue where subfolder exclusions were not being honored in Microsoft Defender Antivirus scans related to non-Microsoft SIEM solutions. This fix ensures that specified subfolders are now correctly excluded from scans, preventing unnecessary detections and improving overall system performance.
115+
102116
### May-2025 (Platform: 4.18.25050.5 | Engine: 1.1.25050.6)
103117

104118
- Security intelligence update version: **1.431.19.0**
@@ -141,25 +155,6 @@ Updates contain:
141155
- Improved performance for [Smart App Control](/windows/apps/develop/smart-app-control/overview) (SAC) trusted file handling.
142156
- Improved [device control](/defender-endpoint/device-control-overview) logic for offline printers.
143157

144-
### March-2025 (Platform: 4.18.25030.2 | Engine 1.1.25030.1)
145-
146-
- Security intelligence update version: **1.427.3.0**
147-
- Release date: **April 1, 2025** (Engine) / **April 9, 2025** (Platform)
148-
- Platform: **4.18.25030.2**
149-
- Engine: **1.1.25030.1**
150-
- Support phase: **Security and Critical Updates**
151-
152-
#### What's new
153-
154-
- Improved caching of [device control settings](device-control-policies.md) to improve reliability in occasionally connected environments.
155-
- Performance improvement in on-access scans of files in network locations.
156-
- Fixed the Defender service description to match the latest installed version.
157-
- Improved Defender engine update logic when the update is included in a custom image.
158-
- Fix in health reporting where signature update data might have been incorrect.
159-
- Fixed reporting issue with [controlled folder access](controlled-folders.md) (CFA) protected folders using the PowerShell cmdlet [Get-MpPreference](/powershell/module/defender/get-mppreference) when CFA is disabled.
160-
- Improved performance when scanning UPX-packed files (Ultimate Packer for eXecutables) and updated the validation process to verify the integrity of the packed file itself.
161-
- Added support for distinguishing regular cloud allow signatures from clean [Indicators of Compromise](indicators-overview.md) (IoC) in [attack surface reduction](attack-surface-reduction.md) (ASR).
162-
163158
### Previous version updates: Technical upgrade support only
164159

165160
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 06/23/2025
9+
ms.date: 07/23/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,26 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### March-2025 (Platform: 4.18.25030.2 | Engine 1.1.25030.1)
33+
34+
- Security intelligence update version: **1.427.3.0**
35+
- Release date: **April 1, 2025** (Engine) / **April 9, 2025** (Platform)
36+
- Platform: **4.18.25030.2**
37+
- Engine: **1.1.25030.1**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Improved caching of [device control settings](device-control-policies.md) to improve reliability in occasionally connected environments.
43+
- Performance improvement in on-access scans of files in network locations.
44+
- Fixed the Defender service description to match the latest installed version.
45+
- Improved Defender engine update logic when the update is included in a custom image.
46+
- Fix in health reporting where signature update data might have been incorrect.
47+
- Fixed reporting issue with [controlled folder access](controlled-folders.md) (CFA) protected folders using the PowerShell cmdlet [Get-MpPreference](/powershell/module/defender/get-mppreference) when CFA is disabled.
48+
- Improved performance when scanning UPX-packed files (Ultimate Packer for eXecutables) and updated the validation process to verify the integrity of the packed file itself.
49+
- Added support for distinguishing regular cloud allow signatures from clean [Indicators of Compromise](indicators-overview.md) (IoC) in [attack surface reduction](attack-surface-reduction.md) (ASR).
50+
51+
3252
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
3353

3454
- Security intelligence update version: **1.425.1.0**

defender-xdr/advanced-hunting-microsoft-defender.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ ms.topic: concept-article
2323
appliesto:
2424
- Microsoft Defender XDR
2525
- Microsoft Sentinel in the Microsoft Defender portal
26-
ms.date: 02/10/2025
26+
ms.date: 07/22/2025
2727
---
2828

2929
# Advanced hunting with Microsoft Sentinel data in Microsoft Defender portal
@@ -34,6 +34,9 @@ Querying from a single portal across different data sets makes hunting more effi
3434

3535
[!INCLUDE [unified-soc-preview](../includes/unified-soc-preview.md)]
3636

37+
> [!NOTE]
38+
> After onboarding to the Microsoft Sentinel data lake, auxiliary log tables are no longer available in Microsoft Defender advanced hunting. Instead, you can access them through data lake exploration KQL queries in the Defender portal. For more information, see [KQL queries in the Microsoft Sentinel data lake](/azure/sentinel/datalake/kql-queries).
39+
3740
## How to access
3841

3942
### Required roles and permissions

0 commit comments

Comments
 (0)