Skip to content

Commit 5115527

Browse files
authored
Merge pull request #4185 from MicrosoftDocs/mdav-relnotes
MDAV relnotes -- ready to go
2 parents 1ae3649 + 51a3ec1 commit 5115527

File tree

3 files changed

+52
-29
lines changed

3 files changed

+52
-29
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 26 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 05/22/2025
6+
ms.date: 06/13/2025
77
audience: ITPro
88
ms.topic: reference
99
author: emmwalshh
@@ -98,6 +98,29 @@ Updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### May-2025 (Platform: 4.18.25050.5 | Engine: 1.1.25050.6)
102+
103+
- Security intelligence update version: **1.431.19.0**
104+
- Release date:  **June 13, 2025 (Engine)** / **June 13, 2025 (Platform)**
105+
- Platform: **4.18.25050.5**
106+
- Engine: **1.1.25050.6**
107+
- Support phase: **Security and Critical Updates**
108+
109+
#### What's new
110+
111+
- Windows multisession SKUs are now properly classified as client SKUs for signature versioning
112+
- `EnableDynamicSignatureDroppedEventReporting` configuration is now available in Intune (see [Event ID 2011](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-2011))
113+
- The display name and description is now displayed correctly for the [device control](/defender-endpoint/device-control-overview) filter driver in Windows services
114+
- Improved performance for kernel driver
115+
- Improvements to [network protection](/defender-endpoint/network-protection#overview-of-network-protection) performance related to packet loss during high network utilization
116+
- Reliability improvements to network protection during service shutdown
117+
- Enriched [Event ID 1000](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) to include `ScanOnlyIfIdle` and scan priority
118+
- Improved device control Windows Portal Device (WPD) device discovery in File explorer. (For more information about device control, see [Device control policy samples and scenarios](/defender-endpoint/device-control-overview#device-control-policy-samples-and-scenarios).)
119+
- Resolved discrepancy in [device health reports](/defender-endpoint/device-health-reports) between signature publish and signature install date and time
120+
- Performance improvements when scanning files/folders with extended attributes
121+
- Reliability improvement in the Defender kernel driver to avoid crashing when there's excessive disk input/output
122+
- Added exponential backoff support to Core Service 1DS manager telemetry module to address memory consumption and DNS flooding issues
123+
101124
### April-2025 (Platform: 4.18.25040.2 | Engine: 1.1.25040.1)
102125

103126
- Security intelligence update version: **1.429.3.0**
@@ -112,7 +135,7 @@ Updates contain:
112135
- Fixed Microsoft Defender platform update timestamp to reflect the actual update time.
113136
- The [1002 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1002) (An anti-malware scan was stopped before it finished) now includes details of the stop reason.
114137
- Added more details to the [1000 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) (Scan started), like scan trigger and scan on idle.
115-
- Improved ASR file processing to correctly handle ["allow" Indicators of Compromise](/defender-endpoint/indicators-overview) (IoCs).
138+
- Improved attack surface reduction file processing to correctly handle ["allow" Indicators of Compromise](/defender-endpoint/indicators-overview) (IoCs).
116139
- Improvement in health reporting for machines that are rebooted or hibernated.
117140
- Improved performance for [Smart App Control](/windows/apps/develop/smart-app-control/overview) (SAC) trusted file handling.
118141
- Improved [device control](/defender-endpoint/device-control-overview) logic for offline printers.
@@ -136,25 +159,6 @@ Updates contain:
136159
- Improved performance when scanning UPX-packed files (Ultimate Packer for eXecutables) and updated the validation process to verify the integrity of the packed file itself.
137160
- Added support for distinguishing regular cloud allow signatures from clean [Indicators of Compromise](indicators-overview.md) (IoC) in [attack surface reduction](attack-surface-reduction.md) (ASR).
138161

139-
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
140-
141-
- Security intelligence update version: **1.425.1.0**
142-
- Release date: **March 12, 2025** (Engine) / **March 31, 2025** (Platform)
143-
- Platform: **4.18.25020.1009**
144-
- Engine: **1.1.25020.1007**
145-
- Support phase: **Security and Critical Updates**
146-
147-
#### What's new
148-
149-
- Fixed deadlock issue on [VDI](deployment-vdi-microsoft-defender-antivirus.md) that occurred when loading corrupted update files from UNC share.
150-
- Systems controlled by `SharedSignatureRoot` can be updated by running signature update commands.
151-
- If you're currently using a shared signature path to update VDI environments, you can now use signature update commands through [MpCmdRun](/defender-endpoint/command-line-arguments-microsoft-defender-antivirus), PowerShell, and the user interface to update to latest drops in your signature update shares.
152-
- Shared root signature setting updates are now applied without requiring a system restart. (If this setting is turned off and on multiple times, a system reboot is necessary.)
153-
- Improved logic for handling [restore from quarantine](/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus).
154-
- Fixed fallback issue with [Update-MpSignature](/powershell/module/defender/update-mpsignature).
155-
- Increased [device control policy](device-control-policies.md) limits.
156-
- Improved security resilience for Defender update process.
157-
158162
### Previous version updates: Technical upgrade support only
159163

160164
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
@@ -296,7 +300,7 @@ After a new package version is released, support for the previous two versions i
296300
|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) | You can schedule when protection updates should be downloaded. |
297301
|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md) | If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |
298302
|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md) | You can set protection updates to be downloaded at startup or after certain cloud-delivered protection events. |
299-
|[Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)| You can specify settings, such as whether updates should occur on battery power that 's especially useful for mobile devices and virtual machines. |
303+
|[Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)| You can specify settings, such as whether updates should occur on battery power that's especially useful for mobile devices and virtual machines. |
300304
| [Microsoft Defender for Endpoint update for EDR Sensor](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac) | You can update the EDR sensor (MsSense.exe) that's included in the new Microsoft Defender for Endpoint unified solution package released in 2021. |
301305

302306
> [!TIP]

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 05/21/2025
9+
ms.date: 06/10/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,25 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
33+
34+
- Security intelligence update version: **1.425.1.0**
35+
- Release date: **March 12, 2025** (Engine) / **March 31, 2025** (Platform)
36+
- Platform: **4.18.25020.1009**
37+
- Engine: **1.1.25020.1007**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Fixed deadlock issue on [VDI](deployment-vdi-microsoft-defender-antivirus.md) that occurred when loading corrupted update files from UNC share.
43+
- Systems controlled by `SharedSignatureRoot` can be updated by running signature update commands.
44+
- If you're currently using a shared signature path to update VDI environments, you can now use signature update commands through [MpCmdRun](/defender-endpoint/command-line-arguments-microsoft-defender-antivirus), PowerShell, and the user interface to update to latest drops in your signature update shares.
45+
- Shared root signature setting updates are now applied without requiring a system restart. (If this setting is turned off and on multiple times, a system reboot is necessary.)
46+
- Improved logic for handling [restore from quarantine](/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus).
47+
- Fixed fallback issue with [Update-MpSignature](/powershell/module/defender/update-mpsignature).
48+
- Increased [device control policy](device-control-policies.md) limits.
49+
- Improved security resilience for Defender update process.
50+
3251
### January-2025 (Platform: 4.18.25010.11 | Engine: 1.1.25010.7)
3352

3453
- Security intelligence update version: **1.423.21.0**

defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.reviewer: yongrhee
88
ms.service: defender-endpoint
99
ms.topic: troubleshooting
10-
ms.date: 02/04/2025
10+
ms.date: 06/10/2025
1111
ms.localizationpriority: medium
1212
ms.custom: nextgen
1313
manager: deniseb
@@ -1136,14 +1136,14 @@ sections:
11361136
11371137
Change to default behavior: Change to dynamic signature event reporting default behavior.
11381138
1139-
When a dynamic signature is received by MDE, a 2010 event is reported. However, when the dynamic signature expires or is manually deleted a 2011 event is reported. In some cases, when a new signature is delivered to MDE sometimes hundreds of dynamic signatures expire at the same time; therefore hundreds of 2011 events are reported. The generation of so many 2011 events can cause a Security information and event management (SIEM) server to become flooded.
1139+
When a dynamic signature is received by Defender for Endpoint, a 2010 event is reported. However, when the dynamic signature expires or is manually deleted, a 2011 event is reported. In some cases, when a new signature is delivered to Defender for Endpoint, sometimes hundreds of dynamic signatures expire at the same time, resulting in hundreds of 2011 events reported. The generation of so many 2011 events can cause a Security Information and Event Management (SIEM) server to become flooded.
11401140
1141-
To avoid the previously described situation - starting with platform version 4.18.2207.7 - by default, Defender for Endpoint doesn't report 2011 events:
1141+
To avoid this situtation, beginning with [platform version 4.18.2207.7](/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support#august-2022-platform-41822077--engine-11196003), by default, Defender for Endpoint doesn't report 2011 events. Keep the following points in mind:
11421142
1143-
- This new default behavior is controlled by registry entry: `HKLM\SOFTWARE\Microsoft\Windows Defender\Reporting\EnableDynamicSignatureDroppedEventReporting`.
1144-
- The default value for `EnableDynamicSignatureDroppedEventReporting` is **false**, which means 2011 *events aren't reported*. If it's set to true, 2011 *events are reported*.
1143+
- This new default behavior is controlled by the following registry entry: `HKLM\SOFTWARE\Microsoft\Windows Defender\Reporting\EnableDynamicSignatureDroppedEventReporting`
1144+
- The default value for `EnableDynamicSignatureDroppedEventReporting` is `false`, which means 2011 events aren't reported. If it's set to `true`, 2011 events are reported.
11451145
1146-
Because 2010 signature events are timely distributed sporadically - and won't cause a spike - 2010 signature event behavior is unchanged.
1146+
Because 2010 signature events are timely distributed sporadically, this configuration doesn't cause a spike, and the 2010 signature event behavior is unchanged.
11471147
11481148
Description: Microsoft Defender Antivirus used Dynamic Signature Service to discard obsolete signatures.
11491149

0 commit comments

Comments
 (0)