Skip to content

Commit 52a423d

Browse files
authored
Merge branch 'main' into mobile-user-experience
2 parents 8ac6a82 + d395d9a commit 52a423d

File tree

67 files changed

+1265
-1611
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

67 files changed

+1265
-1611
lines changed

.openpublishing.redirection.defender-endpoint.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -94,6 +94,21 @@
9494
"source_path": "defender-endpoint/monthly-security-summary-report.md",
9595
"redirect_url": "/defender-endpoint/threat-protection-reports#monthly-security-summary",
9696
"redirect_document_id": true
97+
},
98+
{
99+
"source_path": "defender-endpoint/run-analyzer-macos-linux.md",
100+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
101+
"redirect_document_id": true
102+
},
103+
{
104+
"source_path": "defender-endpoint/download-client-analyzer.md",
105+
"redirect_url": "/defender-endpoint/overview-client-analyzer",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "defender-endpoint/comprehensive-guidance-on-linux-deployment.md",
110+
"redirect_url": "/defender-endpoint/linux-installer-script",
111+
"redirect_document_id": true
97112
}
98113
]
99114
}

CloudAppSecurityDocs/release-notes.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,16 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2121

2222
## March 2025
2323

24+
### Enhanced Identity Inventory (Preview)
25+
26+
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment. The updated Identities Inventory page now includes the following tabs:
27+
28+
- Identities: A consolidated view of identities across Active Directory, Entra ID. This Identities tab highlights key details, including identity types, and user's information.
29+
30+
- Cloud application accounts: Provides insights into accounts from connected applications via Defender for Cloud Apps, allowing investigation of account permissions, group memberships, aliases, and the applications in use.
31+
32+
For more information, see [Identity inventory details](/defender-for-identity/identity-inventory), [Cloud application accounts](/defender-cloud-apps/accounts).
33+
2434
### Role-Based Access Control scoping for "Behaviors" (Preview)
2535

2636
Defender for Cloud Apps customers can now configure Role-Based Access Control (RBAC) scoping for 'Behaviors.' This new capability allows administrators to define and manage access permissions more precisely. Administrators can ensure that users have the appropriate level of access to specific application data based on their roles and responsibilities. By using RBAC scoping, organizations can enhance their security posture, streamline operations, and reduce the risk of unauthorized access.

defender-endpoint/TOC.yml

Lines changed: 47 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -263,46 +263,54 @@
263263
items:
264264
- name: Deploy Defender for Endpoint on Linux
265265
items:
266-
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
267-
href: mde-linux-arm.md
268-
- name: Installer script based deployment
269-
href: linux-installer-script.md
270-
- name: Ansible based deployment
271-
href: linux-install-with-ansible.md
272-
- name: Chef based deployment
273-
href: linux-deploy-defender-for-endpoint-with-chef.md
274-
- name: Puppet based deployment
275-
href: linux-install-with-puppet.md
276-
- name: Saltstack-based deployment
277-
href: linux-install-with-saltack.md
278-
- name: Manual deployment
279-
href: linux-install-manually.md
280-
- name: Advanced deployment for Defender for Endpoint on Linux
281-
href: comprehensive-guidance-on-linux-deployment.md
282-
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
283-
href: mde-linux-deployment-on-sap.md
284-
- name: Configure Defender for Endpoint on Linux
285-
items:
286-
- name: Configure and validate exclusions on Linux
287-
href: linux-exclusions.md
288-
- name: Static proxy configuration
289-
href: linux-static-proxy-configuration.md
290-
- name: Set preferences
291-
href: linux-preferences.md
292-
- name: Detect and block Potentially Unwanted Applications
293-
href: linux-pua.md
294-
- name: Schedule scans with Microsoft Defender for Endpoint on Linux
295-
href: linux-schedule-scan-mde.md
296-
- name: Schedule antivirus scan in Defender for Endpoint on Linux
297-
href: schedule-antivirus-scan-in-mde.md
298-
- name: Schedule an update for Microsoft Defender for Endpoint on Linux
299-
href: linux-update-MDE-Linux.md
300-
- name: Configure eBPF-based sensor
301-
href: linux-support-ebpf.md
302-
- name: Configure Offline Security Intelligence Update
303-
href: linux-support-offline-security-intelligence-update.md
266+
- name: 1 - Prerequisites
267+
href: mde-linux-prerequisites.md
268+
- name: 2 - Choose a deployment method
269+
items:
270+
- name: Installer script based deployment
271+
href: linux-installer-script.md
272+
- name: Ansible based deployment
273+
href: linux-install-with-ansible.md
274+
- name: Chef based deployment
275+
href: linux-deploy-defender-for-endpoint-with-chef.md
276+
- name: Puppet based deployment
277+
href: linux-install-with-puppet.md
278+
- name: Saltstack-based deployment
279+
href: linux-install-with-saltack.md
280+
- name: Manual deployment
281+
href: linux-install-manually.md
282+
- name: Direct onboarding with Defender for Cloud
283+
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
284+
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
285+
href: mde-linux-arm.md
286+
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
287+
href: mde-linux-deployment-on-sap.md
288+
- name: 3 - Configuration
289+
items:
290+
- name: Configure security policies and settings
291+
href: linux-preferences.md
292+
- name: Static proxy configuration
293+
href: linux-static-proxy-configuration.md
294+
- name: Configure antivirus scans
295+
items:
296+
- name: Schedule antivirus scans using Anacron
297+
href: schedule-antivirus-scan-in-mde.md
298+
- name: Schedule antivirus scans using Crontab
299+
href: linux-schedule-scan-mde.md
300+
- name: Configure and validate exclusions on Linux
301+
href: linux-exclusions.md
302+
- name: Configure eBPF-based sensor
303+
href: linux-support-ebpf.md
304+
- name: Detect and block Potentially Unwanted Applications
305+
href: linux-pua.md
306+
- name: Configure Offline Security Intelligence Update
307+
href: linux-support-offline-security-intelligence-update.md
304308
- name: Update Defender for Endpoint on Linux
305-
href: linux-updates.md
309+
items:
310+
- name: Update Defender for Endpoint on Linux
311+
href: linux-updates.md
312+
- name: Schedule an update for Defender for Endpoint on Linux
313+
href: linux-update-mde-linux.md
306314
- name: Privacy for Defender for Endpoint on Linux
307315
href: linux-privacy.md
308316
- name: Resources for Microsoft Defender for Endpoint on Linux
@@ -495,12 +503,8 @@
495503
items:
496504
- name: Client analyzer overview
497505
href: overview-client-analyzer.md
498-
- name: Download and run the client analyzer
499-
href: download-client-analyzer.md
500506
- name: Run the client analyzer on Windows
501507
href: run-analyzer-windows.md
502-
- name: Run the client analyzer on macOS or Linux
503-
href: run-analyzer-macos-linux.md
504508
- name: Run the client analyzer on Linux
505509
href: run-analyzer-linux.md
506510
- name: Run the client analyzer on macOS

defender-endpoint/api/isolate-machine.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.topic: reference
1414
ms.subservice: reference
1515
ms.custom: api
1616
search.appverid: met150
17-
ms.date: 03/11/2025
17+
ms.date: 03/12/2025
1818
---
1919

2020
# Isolate machine API

defender-endpoint/api/unisolate-machine.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 03/01/2025
18+
ms.date: 03/12/2025
1919
---
2020

2121
# Release device from isolation API
@@ -47,7 +47,7 @@ Undo isolation of a device.
4747
> [!IMPORTANT]
4848
>
4949
> - Full isolation is available for devices on Windows 10, version 1703.
50-
> - Full isolation is available in **public preview** for all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](../microsoft-defender-endpoint-linux.md#system-requirements).
50+
> - Full isolation is available in **public preview** for all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](/defender-endpoint/mde-linux-prerequisites).
5151
> - Selective isolation is available for devices on Windows 10, version 1709 or later.
5252
> - When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
5353

defender-endpoint/check-sensor-status.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,8 +56,6 @@ You can view the device details when you click on a misconfigured or inactive de
5656

5757
- [Fix unhealthy sensors in Defender for Endpoint](fix-unhealthy-sensors.md)
5858
- [Client analyzer overview](overview-client-analyzer.md)
59-
- [Download and run the client analyzer](download-client-analyzer.md)
6059
- [Run the client analyzer on Windows](run-analyzer-windows.md)
61-
- [Run the client analyzer on macOS or Linux](run-analyzer-macos-linux.md)
6260
- [Data collection for advanced troubleshooting on Windows](data-collection-analyzer.md)
6361
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/cloud-protection-microsoft-antivirus-sample-submission.md

Lines changed: 17 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: mkaminska, yongrhee
99
manager: deniseb
1010
ms.subservice: ngp
1111
ms.topic: conceptual
12-
ms.date: 08/20/2024
12+
ms.date: 03/18/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -21,15 +21,15 @@ search.appverid: met150
2121

2222
**Applies to:**
2323

24-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
24+
- Microsoft Defender for Endpoint Plan 1 and Plan 2
25+
- Microsoft Defender for Endpoint for servers
2626
- Microsoft Defender Antivirus
2727

2828
**Platforms**
29+
2930
- Windows
3031
- macOS
3132
- Linux
32-
3333
- Windows Server
3434

3535
Microsoft Defender Antivirus uses many intelligent mechanisms for detecting malware. One of the most powerful capabilities is the ability to apply the power of the cloud to detect malware and perform rapid analysis. Cloud protection and automatic sample submission work together with Microsoft Defender Antivirus to help protect against new and emerging threats.
@@ -54,24 +54,24 @@ Microsoft Defender Antivirus and cloud protection automatically block most new,
5454

5555
3. High-precision antivirus, detecting common malware through generic and heuristic techniques.
5656

57-
4. Advanced cloud-based protection is provided for cases when Microsoft Defender Antivirus running on the endpoint needs more intelligence to verify the intent of a suspicious file.
57+
1. Advanced cloud-based protection is provided for cases when Microsoft Defender Antivirus running on the endpoint needs more intelligence to verify the intent of a suspicious file.
5858

5959
1. In the event Microsoft Defender Antivirus can't make a clear determination, file metadata is sent to the cloud protection service. Often within milliseconds, the cloud protection service can determine based on the metadata as to whether the file is malicious or not a threat.
6060

6161
- The cloud query of file metadata can be a result of behavior, mark of the web, or other characteristics where a clear verdict isn't determined.
6262
- A small metadata payload is sent, with the goal of reaching a verdict of malware or not a threat. The metadata doesn't include personal data, such as personally identifiable information (PII). Information such as filenames, are hashed.
63-
- Can be synchronous or asynchronous. For synchronous, the file won't open until the cloud renders a verdict. For asynchronous, the file opens while cloud protection performs its analysis.
63+
- Can be synchronous or asynchronous. For synchronous, the file doesn't open until the cloud renders a verdict. For asynchronous, the file opens while cloud protection performs its analysis.
6464
- Metadata can include PE attributes, static file attributes, dynamic and contextual attributes, and more (see [Examples of metadata sent to the cloud protection service](#examples-of-metadata-sent-to-the-cloud-protection-service)).
6565

6666
2. After examining the metadata, if Microsoft Defender Antivirus cloud protection can't reach a conclusive verdict, it can request a sample of the file for further inspection. This request honors the setting configuration for sample submission, as described in the following table:
67-
67+
6868
| Setting | Description |
6969
|---|---|
7070
| **Send safe samples automatically** | - Safe samples are samples considered to not commonly contain PII data. Examples include `.bat`, `.scr`, `.dll`, and `.exe`. <br/>- If file is likely to contain PII, the user gets a request to allow file sample submission.<br/>- This option is the default configuration on Windows, macOS, and Linux. |
7171
| **Always Prompt** | - If configured, the user is always prompted for consent before file submission<br/>- This setting isn't available in macOS and Linux cloud protection |
72-
| **Send all samples automatically** | - If configured, all samples are sent automatically<br/>- If you would like sample submission to include macros embedded in Word docs, you must choose **Send all samples automatically**<br/>- This setting isn't available on macOS cloud protection |
72+
| **Send all samples automatically** | - If configured, all samples are sent automatically<br/>- If you would like sample submission to include macros embedded in Word docs, you must choose **Send all samples automatically**<br/>- "Send all samples automatically" is the equivalent to "All" setting in macOS policy |
7373
| **Do not send** | - Prevents "block at first sight" based on file sample analysis<br/>- "Don't send" is the equivalent to the "Disabled" setting in macOS policy and "None" setting in Linux policy.<br/>- Metadata is sent for detections even when sample submission is disabled |
74-
74+
7575
3. After files are submitted to cloud protection, the submitted files can be **scanned**, **detonated**, and processed through **big data analysis** **machine-learning** models to reach a verdict. Turning off cloud-delivered protection limits analysis to only what the client can provide through local machine-learning models, and similar functions.
7676

7777
> [!IMPORTANT]
@@ -107,9 +107,9 @@ The following table lists examples of metadata sent for analysis by cloud protec
107107

108108
## Samples are treated as customer data
109109

110-
Just in case you're wondering what happens with sample submissions, Defender for Endpoint treats all file samples as customer data. Microsoft honors both the geographical and data retention choices your organization selected when onboarding to Defender for Endpoint.
110+
If you're wondering what happens with sample submissions, Defender for Endpoint treats all file samples as customer data. Microsoft honors both the geographical and data retention choices your organization selected when onboarding to Defender for Endpoint.
111111

112-
In addition, Defender for Endpoint has received multiple compliance certifications, demonstrating continued adherence to a sophisticated set of compliance controls:
112+
In addition, Defender for Endpoint received multiple compliance certifications, demonstrating continued adherence to a sophisticated set of compliance controls:
113113

114114
- ISO 27001
115115
- ISO 27018
@@ -129,21 +129,15 @@ There are two more scenarios where Defender for Endpoint might request a file sa
129129
| Scenario | Description |
130130
|:---|:---|
131131
|Manual file sample collection in the Microsoft Defender portal | When onboarding devices to Defender for Endpoint, you can configure settings for [endpoint detection and response (EDR)](overview-endpoint-detection-response.md). For example, there's a setting to enable sample collections from the device, which can easily be confused with the sample submission settings described in this article. <br/><br/>The EDR setting controls file sample collection from devices when requested through the Microsoft Defender portal, and is subject to the roles and permissions already established. This setting can allow or block file collection from the endpoint for features such as deep analysis in the Microsoft Defender portal. If this setting isn't configured, the default is to enable sample collection. <br/><br/>Learn about Defender for Endpoint configuration settings, see: [Onboarding tools and methods for Windows 10 devices in Defender for Endpoint](onboard-windows-client.md) |
132-
| Automated investigation and response content analysis | When [automated investigations](automated-investigations.md) are running on devices (when configured to run automatically in response to an alert or manually run), files that are identified as suspicious can be collected from the endpoints for further inspection. If necessary, the file content analysis feature for automated investigations can be disabled in the Microsoft Defender portal. <br/><br/> The file extension names can also be modified to add or remove extensions for other file types that will be automatically submitted during an automated investigation. <br/><br/> To learn more, see [Manage automation file uploads](manage-automation-file-uploads.md). |
132+
| Automated investigation and response content analysis | When [automated investigations](automated-investigations.md) are running on devices (when configured to run automatically in response to an alert or manually run), files that are identified as suspicious can be collected from the endpoints for further inspection. If necessary, the file content analysis feature for automated investigations can be disabled in the Microsoft Defender portal. <br/><br/> The file extension names can also be modified to add or remove extensions for other file types that are automatically submitted during an automated investigation. <br/><br/> To learn more, see [Manage automation file uploads](manage-automation-file-uploads.md). |
133133

134-
> [!TIP]
135-
> If you're looking for Antivirus related information for other platforms, see:
136-
> - [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)
137-
> - [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
138-
> - [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
139-
> - [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)
140-
> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
141-
> - [Configure Defender for Endpoint on Android features](android-configure.md)
142-
> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
143134

144135
## See also
145136

146-
[Next-generation protection overview](next-generation-protection.md)
137+
- [Next-generation protection overview](next-generation-protection.md)
138+
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
139+
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
140+
- [Microsoft Defender for Endpoint - Mobile Threat Defense](mtd.md)
141+
- [Configure remediation for Microsoft Defender Antivirus detections](configure-remediation-microsoft-defender-antivirus.md)
147142

148-
[Configure remediation for Microsoft Defender Antivirus detections.](configure-remediation-microsoft-defender-antivirus.md)
149143
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)