Skip to content

Commit 717e259

Browse files
Merge pull request #5834 from MicrosoftDocs/main
[AutoPublish] main to live - 12/04 04:39 PST | 12/04 18:09 IST
2 parents e10893c + 38dd221 commit 717e259

File tree

9 files changed

+165
-25
lines changed

9 files changed

+165
-25
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
5959

6060
## Releases for Defender for Endpoint on macOS
6161

62+
6263
### Offline updates for security intelligence updates on macOS is now in public preview
6364

6465
This feature enables organizations to configure offline updates for security intelligence updates (also referred to as definition updates or signatures) on macOS using a local mirror server. For more information, see [Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS (preview)](./mac-support-offline-security-intelligence-update.md).
@@ -67,6 +68,19 @@ This feature enables organizations to configure offline updates for security int
6768

6869
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
6970

71+
### Nov-2025 (Build: 101.25102.0016 | Release version: 20.125102.16.0)
72+
73+
| Build: | **101.25102.0016** |
74+
|--------------------|-----------------------|
75+
| Release version: | **20.125102.16.0** |
76+
| Engine version: | **1.1.25090.2000** |
77+
| Signature version: | **1.435.600.0** |
78+
79+
##### What's new
80+
81+
- Bug and performance fixes
82+
83+
7084
### Oct-2025 (Build: 101.25082.0006 | Release version: 20.125082.6.0)
7185

7286
| Build: | **101.25082.0006** |

defender-for-cloud-apps/anomaly-detection-policy.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,6 @@ Based on the policy results, security alerts are triggered. Defender for Cloud A
3636
> - [Suspicious inbox forwarding](#suspicious-inbox-forwarding).
3737
> - [Unusual ISP for an OAuth App](#unusual-isp-for-an-oauth-app).
3838
> - [Suspicious file access activity (by user)](#unusual-activities-by-user).
39-
> - [Ransomware activity](#ransomware-activity).
4039
>
4140
> You will continue to receive the same standard of protection without disruption to your existing security coverage. No action is required from your side.
4241
@@ -92,10 +91,6 @@ This detection identifies that users were active from an IP address that has bee
9291

9392
### Ransomware activity
9493

95-
> [!NOTE]
96-
> As part of ongoing improvements to Defender for Cloud Apps alert threat protection capabilities, this policy has been disabled, migrated to the new dynamic model and renamed to **Ransomware payment instruction file uploaded to {Application}**.
97-
> If you previously configured governance actions or email notifications for this policy, you can re-enable it at any time in the Microsoft Defender portal > Cloud Apps > Policy management page.
98-
9994
Defender for Cloud Apps extended its ransomware detection capabilities with anomaly detection to ensure a more comprehensive coverage against sophisticated Ransomware attacks. Using our security research expertise to identify behavioral patterns that reflect ransomware activity, Defender for Cloud Apps ensures holistic and robust protection. If Defender for Cloud Apps identifies, for example, a high rate of file uploads or file deletion activities it may represent an adverse encryption process. This data is collected in the logs received from connected APIs and is then combined with learned behavioral patterns and threat intelligence, for example, known ransomware extensions. For more information about how Defender for Cloud Apps detects ransomware, see [Protecting your organization against ransomware](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware).
10095

10196
### Activity performed by terminated user

defender-xdr/TOC.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -240,6 +240,8 @@
240240
href: advanced-hunting-behaviorentities-table.md
241241
- name: BehaviorInfo
242242
href: advanced-hunting-behaviorinfo-table.md
243+
- name: CampaignIno
244+
href: advanced-hunting-campaigninfo-table.md
243245
- name: CloudAppEvents
244246
href: advanced-hunting-cloudappevents-table.md
245247
- name: CloudAuditEvents
@@ -320,6 +322,8 @@
320322
href: advanced-hunting-exposuregraphedges-table.md
321323
- name: ExposureGraphNodes
322324
href: advanced-hunting-exposuregraphnodes-table.md
325+
- name: FileMaliciousContentInfo
326+
href: advanced-hunting-filemaliciouscontentinfo-table.md
323327
- name: GraphApiAuditEvents
324328
href: advanced-hunting-graphapiauditevents-table.md
325329
- name: IdentityAccountInfo
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: CampaignInfo table in the advanced hunting schema
3+
description: Learn about the CampaignInfo table of the advanced hunting schema
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
23+
ms.topic: reference
24+
ms.date: 12/01/2025
25+
---
26+
27+
# CampaignInfo (Preview)
28+
29+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
30+
31+
> [!IMPORTANT]
32+
> Some information relates to prereleased product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
33+
34+
35+
The `CampaignInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about email campaigns identified by Microsoft Defender for Office 365. Use this reference to construct queries that return information from this table.
36+
37+
This advanced hunting table is populated by records from Defender for Office 365. If your organization didn't deploy the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy Defender for Office 365 in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
38+
39+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
40+
41+
42+
43+
| Column name | Data type | Description |
44+
|-------------|-----------|-------------|
45+
| `Timestamp` | `datetime` | Date and time when the event was recorded |
46+
| `CampaignName` | `string` | Name of the email campaign |
47+
| `CampaignId` | `string` | Unique identifier for the campaign, generated by Microsoft Defender for Office 365 |
48+
| `CampaignType` | `string` | Category of the campaign, like Phish, Malware, Spam, and others |
49+
| `CampaignSubtype` | `string` | Contains more details about the campaign, like the brand being phished or related malware campaigns, if available |
50+
| `NetworkMessageId` | `string` | Unique identifier for the email, generated by Microsoft Defender for Office 365 |
51+
| `RecipientEmailAddress` | `string` | Email address of the recipient, or email address of the recipient after distribution list expansion |
52+
| `ReportId` | `string` | Unique identifier for the event |
53+
54+
55+
## Read more
56+
57+
- [Advanced hunting overview](advanced-hunting-overview.md)
58+
- [Learn the query language](advanced-hunting-query-language.md)
59+
- [Use shared queries](advanced-hunting-shared-queries.md)
60+
- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)
61+
- [Understand the schema](advanced-hunting-schema-tables.md)
62+
- [Apply query best practices](advanced-hunting-best-practices.md)
63+
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
---
2+
title: FileMaliciousContentInfo table in the advanced hunting schema
3+
description: Learn about the FileMaliciousContentInfo table of the advanced hunting schema
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: pauloliveria
10+
author: poliveria
11+
ms.localizationpriority: medium
12+
manager: orspodek
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
23+
ms.topic: reference
24+
ms.date: 12/01/2025
25+
---
26+
27+
# FileMaliciousContentInfo (Preview)
28+
29+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
30+
31+
> [!IMPORTANT]
32+
> Some information relates to prereleased product which might be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
33+
34+
The `FileMaliciousContentInfo` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams. Use this reference to construct queries that return information from this table.
35+
36+
> [!TIP]
37+
> For detailed information about the events types (`ActionType` values) supported by a table, use the built-in schema reference available in Microsoft Defender XDR.
38+
39+
This advanced hunting table is populated by records from Defender for Office 365. If your organization didn't deploy the service in Microsoft Defender XDR, queries that use the table aren’t going to work or return any results. For more information about how to deploy Defender for Office 365 in Defender XDR, read [Deploy supported services](deploy-supported-services.md).
40+
41+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
42+
43+
44+
45+
| Column name | Data type | Description |
46+
|-------------|-----------|-------------|
47+
| `Timestamp` | `datetime` | Date and time when the event was generated |
48+
| `Workload`| `string` | Information about the workload from which the URL originated from |
49+
| `FileName`| `string` | Name of the file that the recorded action was applied to |
50+
| `FolderPath`| `string` | Path of the folder containing the file that the recorded action was applied to |
51+
| `FileSize`| `long` | Size of the file in bytes |
52+
| `SHA256`| `string` | SHA-256 of the file that the recorded action was applied to |
53+
| `FileOwnerDisplayName`| `string` | Account recorded as owner of the file |
54+
| `FileOwnerUpn`| `string` | Account recorded as owner of the file|
55+
| `DocumentId`| `string` | Unique identifier of the file |
56+
| `ThreatTypes`| `dynamic` | Verdict from the email filtering stack on whether the email contains malware, phishing, or other threats |
57+
| `ThreatNames`| `string` | Detection name for malware or other threats found|
58+
| `DetectionMethods`| `string` | Methods used to detect malware, phishing, or other threats found in the email |
59+
| `LastModifyingAccountUpn`| `string` | Account that last modified this file |
60+
| `LastModifiedTime`| `datetime` |Date and time the item or related metadata was last modified|
61+
| `FileCreationTime `| `datetime` | Timestamp of the file creation|
62+
| `ReportId`| `string` | Unique identifier for the event |
63+
64+
65+
66+
## Read more
67+
68+
- [Advanced hunting overview](advanced-hunting-overview.md)
69+
- [Learn the query language](advanced-hunting-query-language.md)
70+
- [Use shared queries](advanced-hunting-shared-queries.md)
71+
- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)
72+
- [Understand the schema](advanced-hunting-schema-tables.md)
73+
- [Apply query best practices](advanced-hunting-best-practices.md)

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,7 @@ The following reference lists all the tables in the schema. Each table name link
6161
| **[AlertInfo](advanced-hunting-alertinfo-table.md)** | Alerts from Microsoft Defender for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Cloud Apps, and Microsoft Defender for Identity, including severity information and threat categorization |
6262
| **[BehaviorEntities](advanced-hunting-behaviorentities-table.md)** (Preview) | Behavior data types in Microsoft Defender for Cloud Apps (not available for GCC) |
6363
| **[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)** (Preview) | Alerts from Microsoft Defender for Cloud Apps (not available for GCC) |
64+
| **[CampaignInfo](advanced-hunting-campaigninfo-table.md)** (Preview) | Email campaigns identified by Microsoft Defender for Office 365 |
6465
| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)** | Events involving accounts and objects in Office 365 and other cloud apps and services |
6566
| **[CloudAuditEvents](advanced-hunting-cloudauditevents-table.md)** (Preview)| Cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud |
6667
| **[CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md)** (Preview)| Cloud process events for various cloud platforms protected by the organization's Microsoft Defender for Containers |
@@ -101,6 +102,7 @@ The following reference lists all the tables in the schema. Each table name link
101102
| **[EntraIdSpnSignInEvents](advanced-hunting-entraidspnsigninevents-table.md)** (Preview)| Microsoft Entra service principal and managed identity sign-ins |
102103
| **[ExposureGraphEdges](advanced-hunting-exposuregraphedges-table.md)** | Microsoft Security Exposure Management exposure graph edge information provides visibility into relationships between entities and assets in the graph |
103104
| **[ExposureGraphNodes](advanced-hunting-exposuregraphnodes-table.md)** | Microsoft Security Exposure Management exposure graph node information, about organizational entities and their properties |
105+
| **[FileMaliciousContentInfo](advanced-hunting-emailurlinfo-table.md)** (Preview) | Files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams |
104106
| **[GraphApiAuditEvents](advanced-hunting-graphapiauditevents-table.md)** (Preview) | Microsoft Entra ID API requests made to Microsoft Graph API for resources in the tenant |
105107
| **[IdentityAccountInfo](advanced-hunting-identityaccountinfo-table.md)** (Preview) | Account information from various sources, including Microsoft Entra ID. This table also includes information and link to the identity that owns the account. |
106108
| **[IdentityDirectoryEvents](advanced-hunting-identitydirectoryevents-table.md)** | Events involving an on-premises domain controller running Active Directory (AD). This table covers a range of identity-related events and system events on the domain controller. |

defender-xdr/whats-new.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-xdr
66
ms.author: guywild
77
author: guywi-ms
88
ms.localizationpriority: medium
9-
ms.date: 11/18/2025
9+
ms.date: 12/01/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -33,8 +33,11 @@ For more information on what's new with other Microsoft Defender security produc
3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

3535
## December 2025
36+
- (Preview) The following advanced hunting schema tables are now available for preview:
37+
- The [`CampaignInfo`](advanced-hunting-campaigninfo-table.md) table contains contains information about email campaigns identified by Microsoft Defender for Office 365
38+
- The [`FileMaliciousContentInfo`](advanced-hunting-filemaliciouscontentinfo-table.md) table contains information about files that were identified as malicious by Microsoft Defender for Office 365 in SharePoint Online, OneDrive, and Microsoft Teams
3639
- (GA) The [hunting graph](advanced-hunting-graph.md) in advanced hunting is now generally available. It also now has two new predefined threat scenarios that you can use to render your hunts as interactive graphs.
37-
- Advanced hunting now supports custom functions that use tabular parameters. With tabular parameters, you can pass entire tables as inputs. This approach lets you build more modular, reusable, and expressive logic across your hunting queries. [Learn more](advanced-hunting-custom-functions.md#create-custom-functions-with-tabular-parameters)
40+
- (GA) Advanced hunting now supports custom functions that use tabular parameters. With tabular parameters, you can pass entire tables as inputs. This approach lets you build more modular, reusable, and expressive logic across your hunting queries. [Learn more](advanced-hunting-custom-functions.md#create-custom-functions-with-tabular-parameters)
3841

3942
## November 2025
4043
- Microsoft Sentinel customers using the Defender portal, or the Azure portal with the Microsoft Sentinel Defender XDR data connector, now also benefit from Microsoft Threat Intelligence alerts that highlight activity from nation-state actors, major ransomware campaigns, and fraudulent operations. To view these alert types, you must have the **Security Administrator** or **Global Administrator** role. The **Service Source**, **Detection Source**, and **Product Name** values for these alerts are listed as *Microsoft Threat Intelligence*. For more information, see [Incidents and alerts in the Microsoft Defender portal](incidents-overview.md).

exposure-management/exposure-insights-overview.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -103,8 +103,6 @@ Security Exposure Management ingests security recommendations from multiple sour
103103
- **New unified Recommendations page**: All recommendations from various sources (Secure Score, Defender for Cloud, Defender for Endpoint, etc.) are now consolidated into one catalog view in the Defender portal
104104
- **Organized by attack surface**: Recommendations are organized by tabs for different domains - Devices, Cloud, Identity, SaaS, and Data
105105
- **Categorized by issue type**: Recommendations are separated by type - misconfigurations vs vulnerabilities vs secrets. For example, on the Devices tab, you'll find separate views for Misconfigurations and Vulnerabilities, aligning with different remediation workflows
106-
- **Risk-based prioritization**: Combines vulnerability data from endpoints and cloud environments into a unified, actionable view, including contextual risk-based Secure Score.
107-
- **Unified remediation flow**: Side-by-side visibility into device and cloud weaknesses enabling security teams to efficiently track posture improvements, remediate vulnerabilities, and understand attack paths in real time through a streamlined interface.
108106

109107
### Recommendation management
110108

0 commit comments

Comments
 (0)