Skip to content

Commit 756deec

Browse files
Merge pull request #4503 from MicrosoftDocs/main
[AutoPublish] main to live - 07/16 01:36 PDT | 07/16 14:06 IST
2 parents bf79184 + 202dec6 commit 756deec

12 files changed

+55
-92
lines changed

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -119,27 +119,26 @@ When a session policy is enforced using Edge in-browser protection and the user
119119

120120
Example Scenario:
121121

122-
A user was originally assigned a CA policy for the Salesforce application, along with an Defender for Cloud apps session policy that blocked file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
122+
A user was originally assigned a CA policy for Salesforce along with a Defender for Cloud Apps session policy to block file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
123123

124124
Although the admin later removed the CA policy, the user still experiences the download block in Edge due to cached policy data.
125125

126126
Mitigation Options:
127127

128128
Option 1: Automatic cleanup
129-
1. Reassign the user/app to the CA policy.
130-
2. Remove the corresponding Defender for Cloud Apps session policy.
131-
3. Have the user access the application using Edge, this will trigger the policy removal automatically.
132-
4. Remove the CA policy again.
129+
1. Add the user/app back into the scope of the CA policy.
130+
2. Remove the corresponding Defender for Cloud Apps session policy.
131+
3. Wait for users to access the application using Edge. This will automatically trigger the policy removal.
132+
4. Remove the user/app from the scope of the CA policy.
133133

134-
Option 2: Manual cleanup
135-
1. Delete the cached policy file
136-
- Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
137-
- Delete the file: mda_store.txt
138-
139-
2. Remove the work profile in Edge
140-
- Open Microsoft Edge.
141-
- Navigate to Profile Settings.
142-
- Delete the work profile associated with the outdated session policy.
134+
Option 2: Delete the cached policy file (Manual cleanup)
135+
1. Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
136+
2. Delete the file: mda_store.txt
137+
138+
Option 3: Remove the work profile in Edge (Manual cleanup)
139+
1. Open Edge.
140+
2. Navigate to Profile Settings.
141+
3. Delete the work profile associated with the outdated session policy.
143142

144143
These steps will force a policy refresh and resolve enforcement issues related to outdated session policies.
145144

defender-endpoint/android-configure.md

Lines changed: 3 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -179,29 +179,6 @@ From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're
179179
- For Android Enterprise with a work profile, only apps installed on the work profile will be supported.
180180
- For other BYOD modes, by default, vulnerability assessment of apps will **not** be enabled. However, when the device is on administrator mode, admins can explicitly enable this feature through Microsoft Intune to get the list of apps installed on the device. For more information, see details below.
181181

182-
### Configure privacy for device administrator mode
183-
184-
Use the following steps to **enable vulnerability assessment of apps** from devices in **device administrator** mode for targeted users.
185-
186-
> [!NOTE]
187-
> By default, this is turned off for devices enrolled with device admin mode.
188-
189-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
190-
191-
- **Platform**: Select Android device administrator
192-
- **Profile**: Select "Custom" and select Create.
193-
194-
2. In the **Basics** section, specify a name and description of the profile.
195-
196-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
197-
198-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
199-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderTVMPrivacyMode**
200-
- Data type: Select Integer in the drop-down list.
201-
- Value: Enter 0 to disable privacy setting (By default, the value is 1)
202-
203-
4. Select **Next** and assign this profile to targeted devices/users.
204-
205182
### Configure privacy for Android Enterprise work profile
206183

207184
Defender for Endpoint supports vulnerability assessment of apps in the work profile. However, in case you want to turn off this feature for targeted users, you can use the following steps:
@@ -222,28 +199,6 @@ Turning the above privacy controls on or off won't affect the device compliance
222199

223200
Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
224201

225-
### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
226-
227-
Use the following steps to turn it on for targeted users:
228-
229-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
230-
231-
- **Platform**: Select Android device administrator.
232-
- **Profile**: Select "Custom" and select **Create**.
233-
234-
2. In the **Basics** section, specify a name and description of the profile.
235-
236-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
237-
238-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
239-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeURLInReport**
240-
- Data type: Select Integer in the drop-down list.
241-
- Value: Enter 1 to enable privacy setting. The default value is 0.
242-
243-
4. Select **Next** and assign this profile to targeted devices/users.
244-
245-
Using this privacy control won't affect the device compliance check or conditional access.
246-
247202
### Configure privacy for phishing alert report on Android Enterprise work profile
248203

249204
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -263,28 +218,6 @@ Turning the above privacy controls on or off won't affect the device compliance
263218

264219
Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
265220

266-
### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
267-
268-
Use the following steps to turn it on for targeted users:
269-
270-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
271-
272-
- **Platform**: Select Android device administrator.
273-
- **Profile**: Select "Custom" and select **Create**.
274-
275-
2. In the **Basics** section, specify a name and description of the profile.
276-
277-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
278-
279-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
280-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeAppInReport**
281-
- Data type: Select Integer in the drop-down list.
282-
- Value: Enter 1 to enable privacy setting. The default value is 0.
283-
284-
4. Select **Next** and assign this profile to targeted devices/users.
285-
286-
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
287-
288221
### Configure privacy for malware alert report on Android Enterprise work profile
289222

290223
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -308,9 +241,10 @@ Use the following steps to configure Disable out sign:
308241
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
309242
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
310243
3. Select **Microsoft Defender for Endpoint** as the target app.
311-
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
244+
1. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
312245

313-
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
246+
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles.
247+
314248
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
315249

316250
5. Select **Next** and assign this profile to targeted devices and users.

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,18 @@ ms.date: 05/15/2025
2828

2929
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030

31+
### Releases for Defender for Endpoint on Android
32+
33+
#### July 2025
34+
35+
|Build|1.0.7901.0101|
36+
| -------- | -------- |
37+
|Release Date|July 10, 2025|
38+
39+
**What's New**
40+
41+
UX Improvement for home page and tiles screens, for more details please visit this link - [Android UX Enhancement](/defender-endpoint/android-new-ux)
42+
3143
#### Alerts for activities related to open wireless connection and certificates are now detected as events
3244

3345
May 2025

defender-endpoint/ios-configure-features.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -384,6 +384,8 @@ Once the client versions are deployed to target iOS devices, processing starts.
384384

385385
> [!NOTE]
386386
> If you're using SSL inspection solution within your iOS device, add the domain names `securitycenter.windows.com` (in commercial environments) and `securitycenter.windows.us` (in GCC environments) for threat and vulnerability management features to work.
387+
>
388+
> The TVM Privacy permission approval screen will only appear for Unsupervised and Non-Zero touch enabled devices. Even For Non-Zero touch enabled devices approval is __not required only on supervised devices__ where the `issupervised` key is configured
387389
388390
## Disable sign out
389391

defender-endpoint/ios-whatsnew.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,18 @@ search.appverid: met150
2929

3030
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131

32+
## Releases for Defender for Endpoint on iOS
33+
34+
### July-2025
35+
36+
| Build| 1.1.67040101|
37+
| -------- | -------- |
38+
| Release Date| July 8, 2025|
39+
40+
**What's New**
41+
42+
- UX Improvement, please visit the attached link for more details - [iOS UX Experience](/defender-endpoint/ios-new-ux)
43+
3244
#### Alerts for activities related to open wireless connections are now detected as events
3345

3446
**May 2025**

defender-endpoint/linux-install-manually.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -488,7 +488,7 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
488488
The following external package dependencies exist for the `mdatp` package:
489489

490490
- The mdatp RPM package requires `glibc >= 2.17`
491-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`
491+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`
492492
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`
493493

494494
> [!NOTE]
@@ -503,6 +503,7 @@ The following external package dependencies exist for the `mdatp` package:
503503
> - The `mde-netfilter` package also has the following package dependencies:
504504
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
505505
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
506+
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
506507

507508
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
508509

defender-endpoint/linux-installer-script.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
193193
The following external package dependencies exist for the `mdatp` package:
194194

195195
- The `mdatp RPM` package requires - `glibc >= 2.17`
196-
- For DEBIAN the `mdatp` package requires `libc6 >= 2.23`,`uuid-runtime`
196+
- For DEBIAN the `mdatp` package requires `libc6 >= 2.23`
197197
- For Mariner the `mdatp` package requires `attr`,`diffutils`, `libacl`, `libattr`,`libselinux-utils`, `selinux-policy`, `policycoreutils`
198198

199199
> [!NOTE]
@@ -205,6 +205,7 @@ The following external package dependencies exist for the `mdatp` package:
205205
> - The `mde-netfilter` package also has the following package dependencies:
206206
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
207207
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
208+
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
208209

209210
## Troubleshoot installation issues
210211

defender-endpoint/linux-support-install.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,13 +78,14 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
7878
The following external package dependencies exist for the mdatp package:
7979

8080
- The mdatp RPM package requires `glibc >= 2.17`
81-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`
81+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`
8282
> For version older than `101.25032.0000`:
8383
> - RPM package needs: `mde-netfilter`, `pcre`
8484
> - DEBIAN package needs: `mde-netfilter`, `libpcre3`
8585
> - The `mde-netfilter` package also has the following package dependencies:
8686
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
8787
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
88+
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
8889
8990
## Installation failed
9091

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -176,7 +176,7 @@ For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Micro
176176
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies. The following external package dependencies exist for the mdatp package:
177177

178178
- The mdatp RPM package requires `glibc >= 2.17`.
179-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`.
179+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`.
180180

181181
> [!NOTE]
182182
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
@@ -188,7 +188,8 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
188188
> For versions older than `101.25032.0000`, the following requirements apply:
189189
> - RPM package needs: `mde-netfilter` and `pcre`
190190
> - DEBIAN package needs: `mde-netfilter` and `libpcre3`
191-
>
191+
>
192+
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
192193
> The `mde-netfilter` package also has the following package dependencies:
193194
> - For DEBIAN, the `mde-netfilter` package requires `libnetfilter-queue1` and `libglib2.0-0`
194195
> - For RPM, the `mde-netfilter` package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`

defender-endpoint/microsoft-defender-antivirus-using-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ This guide provides the [Microsoft Defender Antivirus cmdlets](/powershell/modul
4848

4949
To use these cmdlets, open PowerShell as an administrator, run a command, and then press **Enter**.
5050

51-
You can check the status of all settings before you begin, or during your evaluation, by using the [Get-MpPreference PowerShell cmdlet](/powershell/module/defender/get-mppreference).
51+
You can check the status of all settings before you begin, or during your evaluation, by using the [Get-MpPreference PowerShell cmdlet](/powershell/module/defender/get-mppreference), or by installing the [DefenderEval](https://www.powershellgallery.com/packages/DefenderEval/) module from the PowerShell Gallery and then using the `Get-DefenderEvaluationReport` command.
5252

5353
Microsoft Defender Antivirus indicates a detection through [standard Windows notifications](configure-notifications-microsoft-defender-antivirus.md). You can also [review detections in the Microsoft Defender Antivirus app](review-scan-results-microsoft-defender-antivirus.md).
5454

0 commit comments

Comments
 (0)