Skip to content

Commit 6d73ee5

Browse files
authored
Merge pull request #1098 from MicrosoftDocs/main
pushing updates live
2 parents 39acea5 + f544da5 commit 6d73ee5

File tree

4 files changed

+74
-25
lines changed

4 files changed

+74
-25
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 07/25/2024
6+
ms.date: 08/07/2024
77
audience: ITPro
88
ms.topic: reference
99
author: siosulli
@@ -98,6 +98,23 @@ All our updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### July-2024 (Platform: 4.18.24070.5 | Engine: 1.1.24070.3)
102+
103+
- Security intelligence update version: **1.417.14.0**
104+
- Release date: **August 7, 2024** (Engine and Platform)
105+
- Platform: **4.18.24070.5**
106+
- Engine: **1.1.24070.3**
107+
- Support phase: **Security and Critical Updates**
108+
109+
### What's new
110+
111+
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
112+
- Optimized Network Protection calls to the backend that occur as a result of suspicious connection checks.
113+
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in Defender CSP so changing this value in the console takes effect on the endpoint.
114+
- Resolved an issue where File Evidence Location was not always captured in scenarios where the Remote Location is inaccessible.
115+
- New event log added (5016) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
116+
- Fixed a prioritization issue with full scans initiated from the portal that resulted in longer than expected full scan duration.
117+
101118
### June-2024 (Platform: 4.18.24060.7 | Engine: 1.1.24060.5)
102119

103120
- Security intelligence update version: **1.415.1.0**

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
66
author: siosulli
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 07/25/2024
9+
ms.date: 08/07/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,22 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### April-2024 (Engine: 1.1.24040.1 | Platform: 4.18.24040.4)
33+
34+
- Security intelligence update version: **1.411.7.0**
35+
- Release date: **May 07, 2024** (Engine) / **May 16, 2024** (Platform)
36+
- Engine: **1.1.24040.1**
37+
- Platform: **4.18.24040.4**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Added an opt-out feature for Experimental Configuration Services (ECS) and One collector in the Core Service.
43+
- Fixed an issue where occasionally exclusions deployed via Intune were not being honored when tamper protection was enabled.
44+
- After a new engine version is released, support for older versions (N-2) will now reduce to technical support only. Engine versions older than N-2 are no longer supported.
45+
- Improved health monitoring and telemetry for [attack surface rules](overview-attack-surface-reduction.md) exclusions.
46+
- Updated inaccurate information in [Configure exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) regarding wildcard usage with contextual exclusions.
47+
3248
### March-2024 (Engine: 1.1.24030.4 | Platform: 4.18.24030.9)
3349

3450
- Security intelligence update version: **1.409.1.0**

defender-office-365/quarantine-admin-manage-messages-files.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
2020
ms.service: defender-office-365
21-
ms.date: 05/21/2024
21+
ms.date: 08/07/2024
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -88,6 +88,8 @@ Watch this short video to learn how to manage quarantined messages as an admin.
8888

8989
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
9090

91+
By default, only the first 100 entries are shown until you scroll down to the bottom of the list, which loads more results.
92+
9193
On the **Email** tab, you can decrease the vertical spacing in the list by clicking :::image type="icon" source="media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal** and then selecting :::image type="icon" source="media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
9294

9395
You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
@@ -206,7 +208,7 @@ In the details flyout that opens, the following information is available:
206208
- **Policy type**
207209
- **Policy name**
208210
- **Recipient count**
209-
- **Recipients**: If the message contains multiple recipients, you might need to use [Preview message](#preview-email-from-quarantine) or [View message header](#view-email-message-headers) to see the complete list of recipients.
211+
- **Recipients**: If the message contains many recipients, you can use [Preview message](#preview-email-from-quarantine) or [View message header](#view-email-message-headers) to see the complete list of recipients.
210212

211213
Recipient email addresses always resolve to the primary email address, even if the message was sent to a [proxy address](/exchange/recipients-in-exchange-online/manage-user-mailboxes/add-or-remove-email-addresses).
212214

@@ -489,14 +491,16 @@ In organizations with Microsoft Defender for Office 365 (add-on licenses or incl
489491

490492
#### Take action on multiple quarantined email messages
491493

492-
When you select multiple quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
494+
When you select up to 100 quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
493495

494496
- [Release quarantined email](#release-quarantined-email)
495497

496498
The only available options to select for bulk actions are **Send a copy of this message to other recipients in your organization** and **Send the message to Microsoft to improve detection (false positive)**.
497499

498500
- [Approve or deny release requests from users for quarantined email](#approve-or-deny-release-requests-from-users-for-quarantined-email)
501+
499502
- [Delete email from quarantine](#delete-email-from-quarantine)
503+
500504
- [Report email to Microsoft for review from quarantine](#report-email-to-microsoft-for-review-from-quarantine)
501505

502506
The only available options to select for bulk actions are **Allow emails with similar attributes** and the related **Remove allow entry after** and **Allow entry note** options.
@@ -520,7 +524,7 @@ Admins can search the audit log to find events for messages that were deleted fr
520524

521525
- **Date and time range (UTC)**
522526
- **Activities - friendly names**: Click in the box, start typing "quarantine" in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box that appears, and then select **Deleted Quarantine message** from the results.
523-
- **Users**: If know who deleted the message from quarantine, you can further filter the results by user.
527+
- **Users**: If you know who deleted the message from quarantine, you can further filter the results by user.
524528

525529
3. When you're finished entering the search criteria, select **Search** to generate the search.
526530

defender-office-365/quarantine-faq.yml

Lines changed: 31 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ms.author: chrisda
77
author: chrisda
88
manager: deniseb
9-
ms.date: 08/05/2024
9+
ms.date: 08/07/2024
1010
audience: ITPro
1111
ms.topic: faq
1212

@@ -81,7 +81,7 @@ sections:
8181
8282
If the quarantine policy requires users to request the release of messages or requires admins to release messages, an admin must [approve the release request](quarantine-admin-manage-messages-files.md#approve-or-deny-release-requests-from-users-for-quarantined-email) or [release the message](quarantine-admin-manage-messages-files.md#release-quarantined-email) before the message is available to users.
8383
84-
You can't customize quarantine policies in preset security policies.
84+
You can't customize quarantine policies in [preset security policies](preset-security-policies.md).
8585
8686
8787
- question: |
@@ -96,7 +96,9 @@ sections:
9696
- question: |
9797
How can I prevent users from accessing quarantined messages?
9898
answer: |
99-
The default quarantine policy named AdminOnlyAccessPolicy prevents any user interaction with their quarantined messages. By default, this quarantine policy is used for messages that were quarantined as malware or high confidence phishing. In custom policies or the default policy for [protection features that support quarantining messages](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), admins can specify the AdminOnlyAccessPolicy as the quarantine policy to use. You can prevent end users from accessing `security.microsoft.com/quarantine`.
99+
The default quarantine policy named AdminOnlyAccessPolicy prevents any user interaction with their quarantined messages. By default, this quarantine policy is used for messages that were quarantined as malware or high confidence phishing. In custom policies or the default policy for [protection features that support quarantining messages](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), admins can specify the AdminOnlyAccessPolicy as the quarantine policy to use.
100+
101+
You can't prevent end users from seeing or accessing the **Quarantine** page at <https://security.microsoft.com/quarantine>.
100102
101103
- question: |
102104
How do I find out why a message was quarantined?
@@ -114,7 +116,7 @@ sections:
114116
115117
When a message expires from quarantine, you can't recover it.
116118
117-
By default, messages from blocked senders are hidden from view in quarantine. Users need to select **Filter** and then deselect **Don't show blocked senders** to see all messages coming from blocked senders.
119+
By default, messages from blocked senders are hidden from view in quarantine (quarantine is filtered by **Don't show blocked senders**). To see messages from all senders, select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** and then select **Show all senders**.
118120
119121
- question: |
120122
A message was released from quarantine, but the original recipient can't find it. How can I determine what happened to the message?
@@ -126,9 +128,9 @@ sections:
126128
127129
Verify that you aren't using third party filtering before you open a support ticket about these issues.
128130
129-
If a third party filter isn't preventing the message from reaching the user's Inbox, then admins can use force release functionality to release message (if the first release didn't work).
131+
If a third party filter isn't preventing the message from reaching the user's Inbox and the first release attempt didn't work, admins can try using the [Release-QuarantineMessage](/powershell/module/exchange/release-quarantinemessage) cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) with the _Force_ switch to release the message.
130132
131-
Admin should try to release the message to an alternate mailbox if the forced release doesn't work after third party filtering vendor is turned off.
133+
If **Release-QuarantineMessage** with the _Force_ switch doesn't work, admins should try releasing the message to an alternate mailbox after filtering by the third party service is turned off.
132134
133135
- Inbox rules ([created by users in Outlook](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) or by admins using the **\*-InboxRule** cmdlets in Exchange Online PowerShell) can move or delete messages from the Inbox.
134136
@@ -141,7 +143,9 @@ sections:
141143
142144
Verify that you aren't using third party filtering before you open a support ticket about this issue.
143145
144-
Admins can also use the audit log to see who released a message from Quarantine.
146+
Quarantined messages that have been released have the **Status** value **Released** and the **Released by** property available on the **Quarantine** page.
147+
148+
Admins can also use the audit log to see who released a message from Quarantine. Use the value **Released Quarantine message** in **Activities - friendly names**. For related instructions, see [Find who deleted a quarantined message](quarantine-admin-manage-messages-files.md#find-who-deleted-a-quarantined-message).
145149
146150
- question: |
147151
Can I release or report more than one quarantined message at a time?
@@ -150,7 +154,7 @@ sections:
150154
151155
Admins can use the [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage) and [Release-QuarantineMessage](/powershell/module/exchange/release-quarantinemessage) cmdlets in Exchange Online PowerShell or standalone EOP PowerShell to find and release quarantined messages in bulk, and to report false positives in bulk.
152156
153-
Admins can also bulk delete messages.
157+
For bulk actions that are available on the **Quarantine** page, see [Take action on multiple quarantined email messages](quarantine-admin-manage-messages-files.md#take-action-on-multiple-quarantined-email-messages).
154158
155159
- question: |
156160
Are wildcards supported when searching for quarantined messages? Can I search for quarantined messages for a specific domain?
@@ -225,8 +229,6 @@ sections:
225229
answer: |
226230
See the permissions entry [here](quarantine-admin-manage-messages-files.md#what-do-you-need-to-know-before-you-begin).
227231
228-
Admins can release quarantined messages to external recipients that aren't in their organization.
229-
230232
> [!TIP]
231233
> The ability to manage quarantined messages using [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) ended in February 2023 per MC447339.
232234
>
@@ -243,35 +245,45 @@ sections:
243245
If a user deletes the message from the Teams client, the message is gone, so Preview isn't available in quarantine for the deleted message.
244246
245247
- question: |
246-
I can't see the **Block sender** button or the **Approve release** button. What's going on?
248+
I don't see the **Block sender** button in quarantine notifications or on the **Quarantine page**. I also don't see the **Approve release** button on the **Quarantine page**. What's going on?
247249
answer: |
248-
The **Block sender** action is disabled by default for quarantined messages. However, admins can create a custom quarantine policy to include the **Block sender** action for end users.
250+
**Block sender** is disabled by default for quarantined messages.
251+
252+
For end users, admins can create and assign a custom quarantine policy that includes the **Block sender** action. For more information, see [Quarantine policies](quarantine policies).
253+
254+
Admins see **Block sender** only if they filter the quarantine results by **Recipient** \> **Only me** instead of the default value **All users**.
249255
250-
The **Approve release** button has been retired and replaced by the **Release** button.
256+
**Approve release** has been retired and is now included in :::image type="icon" source="media/m365-cc-sc-check-mark-icon.png" border="false"::: **Release**.
251257
252258
- question: |
253259
**Filter** and **Search** aren't working. What's going on?
254260
answer: |
255-
The **Search** box applies to loaded quarantine messages only.
261+
The **Search** box applies to the visible results in quarantine. By default, only the first 100 entries are shown until you scroll down to the bottom of the list, which loads more results.
256262
257-
To filter by Internet Message ID, you need to ensure that angle brackets `<>` are always inluded (even in PowerShell).
263+
To filter quarantined messages by Internet Message ID, the value must include angle brackets (`<>`), even in PowerShell.
258264
259265
- question: |
260266
Released quarantine messages are still showing up in Quarantine. What's going on?
261267
answer: |
262-
Released messages remain visible in quarantine unless they're explicitly deleted from quarantine.
268+
Released messages remain visible in quarantine with the **Status** value **Released**, until:
269+
270+
- The [quarantine retention period](quarantine-about.md#quarantine-retention) expires and the message is automatically deleted.
271+
272+
or
273+
274+
- The message is manually deleted from quarantine.
263275
264276
- question: |
265277
Release request alerts aren't being generated. What's going on?
266278
answer: |
267-
Audit logging needs to be enabled (it's on by default).
279+
Audit logging needs to be turned on (it's on by default). For more information, see [Turn auditing on or off](/purview/audit-log-enable-disable).
268280
269281
- question: |
270282
Duplicate or multiple quarantine notifications are sent to the same user.
271283
answer: |
272-
Mutiple or duplicate quarantine notifications are sent if the SendFromAliasEnabled paraMETER value is True.
284+
Multiple or duplicate quarantine notifications are sent to the same user if the [SendFromAliasEnabled parameter](/powershell/module/exchange/set-organizationconfig#-sendfromaliasenabled) on the **Set-OrganizationConfig** cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell) is set to the value $true.
273285
274286
- question: |
275287
I can't see all recipients of a quarantined message. What's going on?
276288
answer: |
277-
For quarantine messages with a large number of recipients, we don't show all of the recipients. However, admins can use **View message header** or **Preview message** to see all recipients.
289+
Admins can use [Preview message](quarantine-admin-manage-messages-files.md#preview-email-from-quarantine) or [View message header](quarantine-admin-manage-messages-files.md#view-email-message-headers) to see the complete list of recipients.

0 commit comments

Comments
 (0)