Skip to content

Commit 6667f71

Browse files
authored
Merge branch 'main' into chrisda
2 parents acef9f7 + 210acbd commit 6667f71

File tree

3 files changed

+32
-7
lines changed

3 files changed

+32
-7
lines changed

defender-endpoint/linux-whatsnew.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,9 @@ This article is updated frequently to let you know what's new in the latest rele
4141
>
4242
> If you have any concerns or need assistance during this transition, contact support.
4343
44+
> [!NOTE]
45+
> Defender for Endpoint on Linux is updated regularly. While security fixes are included as part of monthly releases, the fixes aren't always listed as a separate **Security Patch** item in these notes. If a release contains security-related updates, the updates are listed in this article under [Releases for Defender for Endpoint on Linux](#releases-for-defender-for-endpoint-on-linux) in the specific version section. For detailed information on Microsoft security updates, see the [Microsoft Security Update Guide](https://msrc.microsoft.com/update-guide).
46+
4447
## Releases for Defender for Endpoint on Linux
4548

4649
### September-2025 Build: 101.25082.0003 | Release version: 30.125082.0003.0
@@ -1426,8 +1429,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
14261429

14271430
#### What's new
14281431

1429-
- This version contains a security update for [CVE-2022-23278](https://msrc-blog.microsoft.com/2022/03/08/guidance-for-cve-2022-23278-spoofing-in-microsoft-defender-for-endpoint/)
1430-
1432+
- This version contains a security update for [CVE-2022-23278](https://www.microsoft.com/msrc/blog/2022/03/guidance-for-cve-2022-23278-spoofing-in-microsoft-defender-for-endpoint).
14311433

14321434
### Mar-2022 Build: 101.60.05 | Release version: 30.122012.16005.0
14331435

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 24 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This article describes the requirements for installing the Microsoft Defender fo
1414

1515
Before activating the Defender for Identity sensor v3.x, note that this version of the sensor is still in preview and has some limited functionality compared to version 2.x. Keep these limitations in mind before activating the sensor.
1616
The Defender for Identity sensor v3.x:
17-
- Requires that Defender for Endpoint is deployed
17+
- Requires that Defender for Endpoint is deployed
1818
- Can't be activated on a server that has a Defender for Identity sensor V2.x already deployed
1919
- Doesn't currently support VPN integration
2020
- Doesn't currently support ExpressRoute
@@ -62,6 +62,29 @@ The following table describes memory requirements on the server used for the Def
6262

6363
> [!IMPORTANT]
6464
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
65+
## Configure Unified Sensor to support advanced identity detections
66+
67+
Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability on the machine, improving security visibility and unlocking additional identity detections. Once applied, the configuration is enforced on **existing and future devices** that match the rule criteria. The tag itself is visible in the Device Inventory, providing admins with transparency and auditing capabilities.
68+
69+
**Steps to apply the configuration:**
70+
71+
1. In the **Microsoft Defender portal**, navigate to: **System > Settings > Microsoft Defender XDR > Asset Rule Management**.
72+
2. Create a new rule.
73+
3. In the side panel:
74+
75+
1. Select a **name** for the rule.
76+
77+
1. Set **rule conditions** using `Device name`, `Domain`, or `Device tag` to target the desired machines.
78+
79+
1. Ensure that the **Defender for Identity V3.x sensor** is already deployed on the selected devices.
80+
81+
1. Matching should primarily target **domain controllers** with the V3.x sensor installed.
82+
83+
1. **Add the tag** `Unified Sensor RPC Audit` to the selected devices.
84+
85+
1. Click **Submit** to save the rule.
86+
87+
Offboarding a device from this configuration can be done by **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
6588

6689
## Configure Windows auditing
6790

defender-xdr/security-copilot-in-microsoft-365-defender.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Microsoft Copilot in Microsoft Defender
2+
title: Microsoft Security Copilot in Microsoft Defender
33
description: Learn about Microsoft Security Copilot capabilities embedded in Microsoft Defender.
44
ms.service: defender-xdr
55
f1.keywords:
@@ -26,14 +26,14 @@ appliesto:
2626
#customer intent: As a security analyst, I want to learn about Microsoft Security Copilot capabilities embedded in Microsoft Defender so that I can use them to perform my security tasks efficiently.
2727
---
2828

29-
# Microsoft Copilot in Microsoft Defender
29+
# Microsoft Security Copilot in Microsoft Defender
3030

3131
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
3232

3333
> [!NOTE]
3434
> Microsoft Defender XDR provides a unified XDR experience for Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Vulnerability Management. Learn more about this pre- and post-breach defense suite in [What is Microsoft Defender XDR?](microsoft-365-defender.md)
3535
36-
This article provides an overview for users of Microsoft Copilot in Microsoft Defender, including steps to access, key capabilities, and links to the details of these capabilities.
36+
This article provides an overview for users of Microsoft Security Copilot in Microsoft Defender, including steps to access, key capabilities, and links to the details of these capabilities.
3737

3838
## Know before you begin
3939

@@ -46,7 +46,7 @@ If you're new to Security Copilot, you should familiarize yourself with it by re
4646
- [Prompting in Security Copilot](/security-copilot/prompting-security-copilot)
4747
- [Responsible AI FAQs](responsible-ai-copilot-defender.md)
4848

49-
## Microsoft Copilot integration in Microsoft Defender
49+
## Microsoft Security Copilot integration in Microsoft Defender
5050

5151
[Microsoft Security Copilot](/security-copilot/microsoft-security-copilot) brings together the power of AI and human expertise to help security teams respond to attacks faster and more effectively. Security Copilot is embedded in the Microsoft Defender portal to help provide security teams with enhanced capabilities to investigate and respond to incidents, hunt for threats, and protect their organization with relevant threat intelligence. Copilot in Defender is available to users who have provisioned access to Security Copilot.
5252

0 commit comments

Comments
 (0)