Skip to content

Commit 59750a8

Browse files
authored
Merge branch 'main' into cor1
2 parents ed6bd8c + b569de8 commit 59750a8

26 files changed

+163
-35
lines changed

defender-endpoint/linux-whatsnew.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,24 @@ This article is updated frequently to let you know what's new in the latest rele
4444
>
4545
> If you have any concerns or need assistance during this transition, contact support.
4646
47+
<details>
48+
<summary> Sept-2024 (Build: 101.24072.0001 | Release version: 30.124072.0001.0)</summary>
49+
50+
## Sept-2024 Build: 101.24072.0001 | Release version: 30.124072.0001.0
51+
52+
&ensp;Released: **September 23, 2024**<br/>
53+
&ensp;Published: **September 23, 2024**<br/>
54+
&ensp;Build: **101.24072.0001**<br/>
55+
&ensp;Release version: **30.124072.0001.0**<br/>
56+
&ensp;Engine version: **1.1.24060.6**<br/>
57+
&ensp;Signature version: **1.415.228.0**<br/>
58+
59+
**What's new**
60+
61+
- Added support for Ubuntu 24.04
62+
- Updated default engine version to `1.1.24060.6` and default signatures version to `1.415.228.0`.
63+
64+
</details>
4765

4866
<details>
4967
<summary> July-2024 (Build: 101.24062.0001 | Release version: 30.124062.0001.0)</summary>

defender-endpoint/mde-sdp-strategy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Defender for Endpoint’s kernel drivers capture system-wide signals like proces
3535

3636
The process for rolling out software and driver updates for Defender for Endpoint is shown in this image:
3737

38-
:::image type="content" alt-text="process for rolling out software and driver updates for Defender for Endpoint" source="/defender/media/defender-endpoint/mde-software-driver-updates.png" lightbox="/defender/media/defender-endpoint/mde-software-driver-updates.png":::
38+
:::image type="content" alt-text="Screenshot that shows the process for rolling out software and driver updates for Defender for Endpoint." source="/defender/media/defender-endpoint/mde-software-driver-updates.png" lightbox="/defender/media/defender-endpoint/mde-software-driver-updates.png":::
3939

4040
### Microsoft SDP for monthly updates
4141

defender-endpoint/navigate-defender-endpoint-antivirus-exclusions.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.topic: how-to
88
author: denisebmsft
99
ms.author: deniseb
1010
ms.custom: nextgen
11-
ms.date: 09/19/2024
11+
ms.date: 09/23/2024
1212
ms.reviewer: joshbregman
1313
manager: deniseb
1414
ms.collection:
@@ -239,6 +239,5 @@ Depending on what you're using, you might need to refer to the documentation for
239239
- [Submissions, suppressions and exclusions](submissions-suppressions-exclusions.md)
240240
- [Important points about exclusions](configure-exclusions-microsoft-defender-antivirus.md#important-points-about-exclusions)
241241
- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)
242-
- [Blog post: The Hitchhiker's Guide to Microsoft Defender for Endpoint exclusions](https://cloudbrothers.info/en/guide-to-defender-exclusions/)
243242

244243
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 09/18/2024
16+
ms.date: 09/23/2024
1717
---
1818

1919
# Supported Microsoft Defender for Endpoint capabilities by platform
@@ -63,13 +63,13 @@ The following table gives information about the supported Microsoft Defender for
6363

6464
<sup>[1]</sup> Refers to the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
6565

66-
<sup>[2]</sup> Feature is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview))
66+
<sup>[2]</sup> Feature is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview)).
6767

68-
<sup>[3]</sup> Feature is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview)) Or you can also use Live Response [2]
68+
<sup>[3]</sup> Feature is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview)). Or you can also use Live Response [2].
6969

70-
<sup>[4]</sup> Collect file only, is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview)) Or you can also use Live Response [2]
70+
<sup>[4]</sup> Collect file only. Or, you can use Live Response [2].
7171

72-
<sup>[5]</sup> Endpoint & network device discovery is supported on Windows Server 2019 or later, Windows 10, and Windows 11
72+
<sup>[5]</sup> Endpoint & network device discovery is supported on Windows Server 2019 or later, Windows 10, and Windows 11.
7373

7474
> [!NOTE]
7575
> Windows 7, 8.1, Windows Server 2008 R2 include support for the EDR sensor, and antivirus using System Center Endpoint Protection (SCEP).

defender-for-iot/whats-new.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -20,13 +20,11 @@ This article describes features available in Microsoft Defender for IoT in the D
2020

2121
|Service area |Updates |
2222
|---------|---------|
23-
| **OT networks** | - [New Device Category Added – Building Management Systems (BMS)](#new-device-category-added--building-management-systems-bms) |
23+
| **OT networks** | - [New Building Management Systems (BMS) device category](#new-building-management-systems-bms-device-category) |
2424

25-
### New Device Category Added – Building Management Systems (BMS)
25+
### New Building Management Systems (BMS) device category
2626

27-
A new BMS device category has been added to the MDIoT license aiming to improve BMS device discovery and security. The BMS category includes a subset of Smart Facility and Surveillance devices (previously under the IoT category) such as fire alarms, humidity sensors, security radars, etc. These devices now require an Microsoft Defender for IoT site-based license for full protection.
28-
29-
Cameras devices will remain under the IoT category.
27+
We now support the new BMS device category in Defender for IoT that improves BMS device discovery and security. The BMS category includes a subset of Smart Facility and Surveillance devices (previously under the IoT category) such as fire alarms, humidity sensors, security radars, etc. Camera devices remain under the IoT category.
3028

3129
For more information, see [overview of device discovery](device-discovery.md).
3230

defender-office-365/attack-simulation-training-faq.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- seo-marvel-apr2020
2020
description: Admins can learn about deployment considerations and frequently asked questions regarding Attack simulation and training in Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.
2121
ms.service: defender-office-365
22-
ms.date: 06/14/2024
22+
ms.date: 09/23/2024
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2525
---
@@ -361,4 +361,16 @@ A: Yes. First you archive the payload, then you delete the archived payload. For
361361

362362
### Q: Can I modify the built-in payloads?
363363

364-
A: Not directly. You can copy the payload and then modify the copy. For instructions, see [Copy payloads](attack-simulation-training-payloads.md#copy-payloads).
364+
A: Not directly. You can copy the built-in payload and then modify the copy. For instructions, see [Copy payloads](attack-simulation-training-payloads.md#copy-payloads).
365+
366+
### Q: I'm trying to run a QR code simulation, but scanning the QR code shows me 'ping successful' instead of the landing page?
367+
368+
A: When you insert a QR code in the payload editor, it maps to the base phishing URL that you selected in the **Phishing link** section \> **Select URL**. The QR code is inserted in the email message as an image. If you switch from the **Text** tab to the **Code** tab, you see the inserted image in Base64 format. The beginning of the image contains `<div id="QRcode"...>`. Make sure to verify that the finished payload contains `<div id="QRcode"...>` before you use it in a simulation.
369+
370+
During simulation creation, if you scan the QR code or you use **Send a Test** to review the payload, the QR code points to the base phishing URL that you selected.
371+
372+
When the payload is used in a simulation, the service replaces the QR code with a dynamically generated QR code to track click and compromise metrics. The size, position, and shape of the QR code matches the configuration options you configured in the payload. Scanning the QR code during an actual simulation takes you to the configured landing page.
373+
374+
### Q: I'm trying to create a payload in HTML, but the payload editor seems to remove certain content from my design?
375+
376+
A: Currently, the following HTML tags aren't supported in the payload editor: `applet, base, basefont, command, embed, frame, frameset, iframe, keygen, link, meta, noframes, noscript, param, script, object, title`.

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -444,6 +444,8 @@
444444
href: copilot-in-defender-file-analysis.md
445445
- name: Generate device summaries
446446
href: copilot-in-defender-device-summary.md
447+
- name: Summarize identities
448+
href: security-copilot-defender-identity-summary.md
447449
- name: Use guided responses
448450
href: security-copilot-m365d-guided-response.md
449451
- name: Generate KQL queries

defender-xdr/advanced-hunting-deviceevents-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ For information on other tables in the advanced hunting schema, [see the advance
6868
| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
6969
| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated — use the SHA1 column when available. |
7070
| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
71-
| `InitiatingProcessFileName` | `string` | Name of the process file name that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead |
71+
| `InitiatingProcessFileName` | `string` | Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead |
7272
| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
7373
| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
7474
| `InitiatingProcessId` | `long` | Process ID (PID) of the process that initiated the event |

defender-xdr/advanced-hunting-devicefileevents-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ For information on other tables in the advanced hunting schema, [see the advance
6060
| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
6161
| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated — use the SHA1 column when available. |
6262
| `InitiatingProcessFolderPath` | `string` | Folder containing the process (image file) that initiated the event |
63-
| `InitiatingProcessFileName` | `string` | Name of the process file name that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead |
63+
| `InitiatingProcessFileName` | `string` | Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead |
6464
| `InitiatingProcessFileSize` | `long` | Size of the process (image file) that initiated the event |
6565
| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
6666
| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |

defender-xdr/advanced-hunting-deviceimageloadevents-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ For information on other tables in the advanced hunting schema, [see the advance
5656
| `InitiatingProcessSHA1` | `string` | SHA-1 of the process (image file) that initiated the event |
5757
| `InitiatingProcessSHA256` | `string` | SHA-256 of the process (image file) that initiated the event. This field is usually not populated — use the SHA1 column when available. |
5858
| `InitiatingProcessMD5` | `string` | MD5 hash of the process (image file) that initiated the event |
59-
| `InitiatingProcessFileName` | `string` | Name of the process file name that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead |
59+
| `InitiatingProcessFileName` | `string` | Name of the process file that initiated the event; if unavailable, the name of the process that initiated the event might be shown instead |
6060
| `InitiatingProcessFileSize` | `long` | Size of the file that ran the process responsible for the event |
6161
| `InitiatingProcessVersionInfoCompanyName` | `string` | Company name from the version information of the process (image file) responsible for the event |
6262
| `InitiatingProcessVersionInfoProductName` | `string` | Product name from the version information of the process (image file) responsible for the event |

0 commit comments

Comments
 (0)