Skip to content

Commit 640c3a8

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into automatic-windows-auditing
2 parents 42ab8c2 + ecd036b commit 640c3a8

File tree

4 files changed

+27
-28
lines changed

4 files changed

+27
-28
lines changed

defender-endpoint/api/run-live-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Runs a sequence of live response commands on a device
6969

7070
- 25 concurrently running sessions (requests exceeding the throttling limit receives a "429 - Too many requests" response).
7171

72-
- If the machine isn't available, the session is queued for up to three days.
72+
- If the machine isn't available, the session is queued for up to 2 hours.
7373

7474
- RunScript command time-outs after 10 minutes.
7575

defender-endpoint/autoir-investigation-results.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,22 +20,18 @@ ms.custom:
2020
- autoir
2121
- admindeeplinkDEFENDER
2222
ms.reviewer: evaldm, isco
23-
ms.date: 04/04/2025
23+
ms.date: 11/30/2025
2424
appliesto:
2525
- Microsoft Defender for Endpoint Plan 2
2626

2727
---
2828
# View the details and results of an automated investigation
2929

30-
3130
With Microsoft Defender for Endpoint, when an [automated investigation](automated-investigations.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the necessary permissions, you can view those details in an investigation details view. The investigation details view provides you with up-to-date status and the ability to approve any pending actions.
3231

33-
## (NEW!) Unified investigation page
34-
35-
The investigation page is updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about).
32+
## Unified investigation page
3633

37-
> [!TIP]
38-
> To learn more about what's changing, see [(NEW!) Unified investigation page](/microsoft-365/security/mtp/mtp-autoir-results).
34+
The unified investigation page includes information across your devices, email, and collaboration content. It defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). For more information, see [Details and results of an automated investigation](/defender-xdr/m365d-autoir-results).
3935

4036
## Open the investigation details view
4137

@@ -69,9 +65,7 @@ Use an incident details page to view detailed information about an incident, inc
6965

7066
## Investigation details
7167

72-
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. The investigation details view resembles the following image:
73-
74-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
68+
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. In the investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
7569

7670
> [!NOTE]
7771
> - The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription doesn't include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.

defender-endpoint/linux-install-with-defender-deployment-tool.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -95,21 +95,21 @@ The Defender deployment tool enforces the following set of prerequisites checks,
9595

9696
:::image type="content" source="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png" alt-text="Screenshot showing the help command output." lightbox="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png":::
9797

98-
The following table provides examples of commands for useful scenarios.
99-
100-
| **Scenario** | **Command** |
101-
|:-------------|:------------|
102-
| Check for unmet non-blocking prerequisites | `sudo ./defender_deployment_tool.sh --pre-req-non-blocking` |
103-
| Run the connectivity test | `sudo ./defender_deployment_tool.sh --connectivity-test` |
104-
| Deploy to a custom location | `sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/` |
105-
| Deploy from the insider-slow channel | `sudo ./defender_deployment_tool.sh --channel insiders-slow` |
106-
| Deploy using a proxy | `sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>` |
107-
| Deploy a specific agent version | `sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod` |
108-
| Upgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004` |
109-
| Downgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004` |
110-
| Uninstall Defender | `sudo ./defender_deployment_tool.sh --remove` |
111-
| Only onboard if Defender is already installed | `sudo ./defender_deployment_tool.sh --only-onboard` |
112-
| Offboard Defender | `sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)* |
98+
The following table provides examples of commands for useful scenarios.
99+
100+
| **Scenario** | **Command** |
101+
|:-------------|:------------|
102+
| Check for unmet non-blocking prerequisites | `sudo ./defender_deployment_tool.sh --pre-req-non-blocking` |
103+
| Run the connectivity test | `sudo ./defender_deployment_tool.sh --connectivity-test` |
104+
| Deploy to a custom location | `sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/` |
105+
| Deploy from the insider-slow channel | `sudo ./defender_deployment_tool.sh --channel insiders-slow` |
106+
| Deploy using a proxy | `sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>` |
107+
| Deploy a specific agent version | `sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod` |
108+
| Upgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004` |
109+
| Downgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004` |
110+
| Uninstall Defender | `sudo ./defender_deployment_tool.sh --remove` |
111+
| Only onboard if Defender is already installed | `sudo ./defender_deployment_tool.sh --only-onboard` |
112+
| Offboard Defender | `sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)* |
113113

114114
## Verify deployment status
115115

@@ -204,11 +204,11 @@ Defender for Endpoint on Linux can be deployed from one of the following channel
204204
- insiders-slow
205205
- prod (production)
206206

207-
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices in insiders-fast are the first to receive updates and new features, followed later by insiders-slow and lastly by prod.
207+
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices in insiders-fast are the first to receive updates and new features, followed later by insiders-slow and lastly by prod.
208208

209209
By default, the deployment tool configures your device to use the prod channel. You can use the configuration options described in this document to deploy from a different channel.
210210

211-
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either insiders-fast or insiders-slow. If you've already deployed Defender for Endpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustrated in the following example, where the channel is changed from insiders-fast to prod:
211+
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either insiders-fast or insiders-slow. If you've already deployed Defender for Endpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustrated in the following example, where the channel is changed from insiders-fast to prod:
212212

213213
1. Remove the insiders-fast channel version of Defender for Endpoint on Linux..
214214

defender-for-cloud-apps/create-snapshot-cloud-discovery-reports.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -83,6 +83,11 @@ To successfully generate a cloud discovery report, your traffic logs must meet t
8383
1. The log file is valid and includes outbound traffic information.
8484
1. Configure the appliance to forward only traffic logs. Including unrelated logs in the configuration can inflate the ingested traffic volume.
8585

86+
> [!IMPORTANT]
87+
> ZIP upload is supported **only for a single compressed file.** ZIP archives containing multiple log files are **not supported.**
88+
> Individual log files larger than **1 GB** cannot be uploaded. Split large logs before uploading. You can upload up to 20 files per batch.
89+
90+
8691
## Next steps
8792

8893
> [!div class="nextstepaction"]

0 commit comments

Comments
 (0)