Skip to content

Commit 794d79d

Browse files
committed
Merge branch 'main' into Dispute-chrisda
2 parents 96fd27a + c55e6ef commit 794d79d

File tree

4 files changed

+29
-11
lines changed

4 files changed

+29
-11
lines changed

ATPDocs/dashboard.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Select links in the cards to just to more details, such as documentation, relate
4545
|**Identities overview (shield widget)** |Provides a quick overview of the number of users in hybrid, cloud, and on-premises environments (AD and Microsoft Entra ID). This feature includes direct links to the Advanced Hunting platform, offering detailed user information at your fingertips.|
4646
|**Top insights** /<br>**Users identified in a risky lateral movement path** | Indicates any sensitive accounts with risky lateral movement paths, which are windows of opportunity for attackers and can expose risks. <br><br>We recommend that you take action on any sensitive accounts found with risky lateral movement paths to minimize your risk. <br><br>For more information, see [Understand and investigate Lateral Movement Paths (LMPs) with Microsoft Defender for Identity](understand-lateral-movement-paths.md).|
4747
|**Top insights** /<br>**Dormant Active Directory users who should be removed from sensitive groups** | Lists accounts that have been left unused for at least 180 days. <br><br>An easy and quiet path deep into your organization is through inactive accounts that are a part of sensitive groups, therefore we recommend removing those users from sensitive groups. <br><br>For more information, see [Security assessment: Riskiest lateral movement paths (LMP)](security-assessment-riskiest-lmp.md).|
48-
|**ITDR deployment health** | Lists any sensor deployment progress, any health alerts, and license availability. |
48+
|**ITDR deployment health** | Lists any sensor deployment progress, any health alerts, and license availability derived from Defender for Identity data and Device Inventory, which relies on Defender for Endpoint coverage. |
4949
|**Identity posture (Secure score)** | The score shown represents your organization's security posture with a focus on the *identity* score, reflecting the collective security state of your identities. The score is automatically updated in real-time to reflect the data shown in graphs and recommended actions. <br><br>Microsoft Secure Score updates daily with system data with new points for each recommended action take.<br><br> For more information, see [Microsoft Secure Score](/microsoft-365/security/defender/microsoft-secure-score). |
5050
| **Highly privileged entities** | Lists a summary of the sensitive accounts in your organization, including Entra ID security administrators and Global admin users. |
5151
| **Identity related incidents** | Lists alerts from both Defender for Identity and [Microsoft Entra ID Protection](/azure/active-directory/identity-protection/overview-identity-protection), and any corresponding, relevant incidents from the last 30 days. |

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,17 +5,17 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: emmwalshh
9-
ms.author: ewalsh
8+
author: paulinbar
9+
ms.author: painbar
1010
ms.reviewer: sugamar, yongrhee
11-
manager: deniseb
11+
manager: bagol
1212
ms.custom: asr
1313
ms.topic: reference
1414
ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 06/10/2025
18+
ms.date: 08/28/2025
1919
search.appverid: met150
2020
---
2121

@@ -190,21 +190,21 @@ For rules with the "Rule State" specified:
190190
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes) | Block | Y | Y |
191191
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes) | | N | Y |
192192
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem) | | N | N |
193-
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | | Y | Y |
193+
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
194194
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion) | | N | Y |
195-
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | Audit or Block | Y (in block mode) <br/>N (in audit mode) | Y (in block mode) |
195+
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts) | | Y | Y (in block mode) |
196196
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content) | Block | Y | Y |
197197
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content) | | N | Y |
198198
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes) | | N | Y |
199199
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes) | | N | Y |
200-
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
200+
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription) | | Y | Y (in block mode) |
201201
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | | N | Y |
202202
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| | N | N |
203-
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
203+
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | | Y| Y (in block mode) |
204204
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| | N | N |
205205
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | | N | N |
206206
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | | N | Y |
207-
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Audit or Block | Y (in block mode) <br/> N (in audit mode) | Y (in block mode) |
207+
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | | Y | Y (in block mode) |
208208

209209
## ASR rule to GUID matrix
210210

defender-endpoint/mac-whatsnew.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,22 @@ This feature enables organizations to configure offline updates for security int
7474

7575
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
7676

77+
### Sep-2025 (Build: 101.25072.0011 | Release version: 20.125072.11.0)
78+
79+
| Build: | **101.25072.0011** |
80+
|--------------------|-----------------------|
81+
| Release version: | **20.125072.11.0** |
82+
| Engine version: | **1.1.25060.3000** |
83+
| Signature version: | **1.429.309.0** |
84+
85+
##### What's new
86+
87+
- Enhanced malware detection timing and archive scanning improvements
88+
- Improved diagnostic capabilities and error reporting
89+
- Performance and diagnostic improvements for endpoint Data Loss Prevention (DLP)
90+
91+
- Bug fixes
92+
7793
### Aug-2025 (Build: 101.25062.0006 | Release version: 20.125062.6.0)
7894

7995
| Build: | **101.25062.0006** |

defender-office-365/threat-explorer-real-time-detections-about.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: chrisda
77
manager: orspodek
88
audience: ITPro
99
ms.topic: concept-article
10-
ms.date: 06/19/2025
10+
ms.date: 08/28/2025
1111
ms.localizationpriority: medium
1212
ms.collection:
1313
- m365-security
@@ -82,6 +82,8 @@ To use Explorer or Real-time detections, you need to be assigned permissions. Yo
8282
> End-user spam notifications and system generated messages aren't available in Threat Explorer. These types of messages are available if there's a mail flow rule (also known as a transport rule) to override.
8383
>
8484
> Audit log entries are generated when admins preview or download email messages. You can search the admin audit log by user for **AdminMailAccess** activity. For instructions, see [Audit New Search](/purview/audit-new-search).
85+
>
86+
> Email delivered to moderated mailboxes or moderated distribution groups is visible in Threat Explorer. But moderator actions (for example, approve or reject messages) and messages released by a moderator to members of a distribution group aren't logged and aren't shown in Threat Explorer.
8587
8688
To use Threat Explorer or Real-time detections, you need to be assigned a license for Defender for Office 365 (included in your subscription or an add-on license).
8789

0 commit comments

Comments
 (0)