Skip to content

Commit 7b398be

Browse files
Merge pull request #3754 from MicrosoftDocs/main
[AutoPublish] main to live - 05/13 10:31 PDT | 05/13 23:01 IST
2 parents 054cadd + bdb9b7f commit 7b398be

12 files changed

+150
-69
lines changed

CloudAppSecurityDocs/activity-filters-queries.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,8 +170,21 @@ You can export all activities from the past six months by clicking the Export bu
170170

171171
![Click the export icon to export records.](media/activity-filters-queries/export-button-of-activity-logs.png)
172172

173-
When exporting data:
173+
> [!NOTE]
174+
> **Required Permissions for Exporting Capabilities:** To utilize the exporting features, users must be assigned one of the following roles:
175+
> - **Built-in admin roles in Defender for Cloud Apps-** These roles must be granted via [Microsoft Defender for Cloud Apps Permissions and roles settings](/defender-cloud-apps/manage-admins):
176+
> - Global Admin
177+
> - Cloud Discovery Global Admin
178+
> - Security Operator
179+
> - Compliance Admin
180+
> - Security Reader
181+
> - **Microsoft Entra ID Roles-** These roles must be assigned through [Microsoft Entra ID built-in roles](/entra/identity/role-based-access-control/permissions-reference):
182+
> - Global Administrator
183+
> - Security Administrator
184+
> - Cloud App Security Administrator
185+
> - Global Reader
174186
187+
When exporting data:
175188
- You can choose a date range of up to six months.
176189
- You can choose to exclude private activities.
177190
- The exported file is limited to 100,000 records and is delivered in CSV format.

CloudAppSecurityDocs/in-browser-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ To use in-browser protection, users must also have the following environmental r
2727
|**Operating systems**|Windows 10 or 11, macOS|
2828
|**Identity platform**|Microsoft Entra ID|
2929
|**Microsoft Edge for Business versions**|The last two stable versions. For example, if the newest Microsoft Edge is 126, in-browser protection works for v126 and v125. <br> For more information, see [Microsoft Edge releases](/deployedge/microsoft-edge-release-schedule#microsoft-edge-releases).|
30-
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\sensitive files)</li><li>Block\Monitor file upload (all files\sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.|
30+
|**Supported session policies**|<ul><li>Block\Monitor of file download (all files\\*sensitive files)</li><li>Block\Monitor file upload (all files\\*sensitive files)</li><li>Block\Monitor copy\cut\paste</li><li>Block\Monitor print</li><li>Block\Monitor malware upload</li><li>Block\Monitor malware download</li></ul> <br> Users that are served by multiple policies, including at least one policy that's *not* supported by Microsoft Edge for Business, their sessions are always served by the reverse proxy. <br><br> Policies defined in the Microsoft Entra ID portal are also always served by reverse proxy.<br> *Sensitive files identified by built-in DLP scanning are not supported for Edge in-browser protection|
3131

3232
All other scenarios are served automatically with the standard reverse proxy technology, including user sessions from browsers that don't support in-browser protection, or for policies not supported by in-browser protection.
3333

@@ -105,7 +105,7 @@ Administrators who understand the power of Microsoft Edge browser protection can
105105

106106
4. When you're finished on the **Edge for Business protection** page, select **Save**.
107107

108-
:::image type="content" source="media/in-browser-protection/edge-for-business-protection-settings.png" alt-text="Screenshot of Microsoft Edge for business protection settings." lightbox="media/in-browser-protection/edge-for-business-protection-settings.png":::
108+
:::image type="content" source="media/in-browser-protection/edge-for-business-protection-settings.png" alt-text="Screenshot of Microsoft Edge for business protection settings." lightbox="media/in-browser-protection/edge-for-business-protection-settings.png":::
109109

110110
## Related content
111111

defender-endpoint/enable-network-protection.md

Lines changed: 47 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -3,10 +3,10 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 01/22/2025
6+
ms.date: 05/13/2025
77
ms.topic: conceptual
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: tdoucett
1111
manager: deniseb
1212
ms.subservice: asr
@@ -64,42 +64,11 @@ You can use Registry Editor to check the status of network protection.
6464

6565
To enable network protection, you can use one of the following methods:
6666

67-
- [PowerShell](#powershell)
68-
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
6967
- [Microsoft Intune](#microsoft-intune)
68+
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
7069
- [Group Policy](#group-policy)
7170
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
72-
73-
### PowerShell
74-
75-
1. On your Windows device, select Start, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
76-
77-
2. Run the following cmdlet:
78-
79-
```PowerShell
80-
Set-MpPreference -EnableNetworkProtection Enabled
81-
```
82-
83-
3. For Windows Server, use the additional commands that listed in the following table:
84-
85-
| Windows Server version | Commands |
86-
|---|---|
87-
| Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88-
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
89-
90-
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
91-
92-
```PowerShell
93-
Set-MpPreference -EnableNetworkProtection AuditMode
94-
```
95-
96-
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
97-
98-
### Mobile device management (MDM)
99-
100-
1. Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
101-
102-
2. [Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
71+
- [PowerShell](#powershell)
10372

10473
### Microsoft Intune
10574

@@ -155,6 +124,12 @@ To enable network protection, you can use one of the following methods:
155124

156125
8. Review all the information, and then select **Create**.
157126

127+
### Mobile device management (MDM)
128+
129+
1. Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to turn network protection on or off, or to enable audit mode.
130+
131+
2. [Update Microsoft Defender anti-malware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you turn network protection on or off.
132+
158133
### Group Policy
159134

160135
Use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
@@ -163,19 +138,19 @@ Use the following procedure to enable network protection on domain-joined comput
163138

164139
*-Or-*
165140

166-
On a domain-joined Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
141+
On a domain-joined Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx). Right-click the Group Policy Object you want to configure and select **Edit**.
167142

168143
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
169144

170145
3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Microsoft Defender Exploit Guard** \> **Network protection**.
171146

172-
Note that on older versions of Windows, the Group Policy path might have *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
147+
On older versions of Windows, the Group Policy path might have *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
173148

174149
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
175150

176151
- **Block** - Users can't access malicious IP addresses and domains.
177152
- **Disable (Default)** - The Network protection feature won't work. Users aren't blocked from accessing malicious domains.
178-
- **Audit Mode** - If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log. However, the user won't be blocked from visiting the address.
153+
- **Audit Mode** - If a user visits a malicious IP address or domain, an event is recorded in the Windows event log. However, the user won't be blocked from visiting the address.
179154

180155
> [!IMPORTANT]
181156
> To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
@@ -203,11 +178,42 @@ Use the following procedure to enable network protection on domain-joined comput
203178

204179
7. From the ribbon, select **Deploy** to deploy the policy to a collection.
205180

181+
### PowerShell
182+
183+
1. On your Windows device, click **Start**, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
184+
185+
2. Run the following cmdlet:
186+
187+
```PowerShell
188+
Set-MpPreference -EnableNetworkProtection Enabled
189+
```
190+
191+
3. For Windows Server, use the additional commands listed in the following table:
192+
193+
| Windows Server version | Commands |
194+
|---|---|
195+
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
196+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
197+
198+
> [!IMPORTANT]
199+
> For Domain Controllers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
200+
201+
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
202+
203+
```PowerShell
204+
Set-MpPreference -EnableNetworkProtection AuditMode
205+
```
206+
207+
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
208+
206209
#### Important information about removing Exploit Guard settings from a device
207210

208-
Once an Exploit Guard policy is deployed using Configuration Manager, Exploit Guard settings aren't removed from the clients if you remove the deployment. Furthermore, if you remove the client's Exploit Guard deployment, `Delete not supported` is recorded in the client's `ExploitGuardHandler.log` in Configuration Manager. <!--CMADO8538577-->
211+
When you deploy an Exploit Guard policy using Configuration Manager, the settings remain on the client even if you later remove the deployment. If the deployment is removed, the client logs `Delete` not supported in the `ExploitGuardHandler.log` file.
212+
213+
<!--CMADO8538577-->
209214

210-
Use the following PowerShell script in the SYSTEM context to remove Exploit Guard settings correctly:<!--CMADO9907132-->
215+
Use the following PowerShell script in the `SYSTEM` context to remove Exploit Guard settings correctly:
216+
<!--CMADO9907132-->
211217

212218
```powershell
213219
$defenderObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_Defender02" -Filter "InstanceID='Defender' and ParentID='./Vendor/MSFT/Policy/Config'"

defender-endpoint/linux-whatsnew.md

Lines changed: 26 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 04/23/2025
9+
ms.date: 05/13/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -35,14 +35,32 @@ This article is updated frequently to let you know what's new in the latest rele
3535
>
3636
> 1. Continue to use Defender for Endpoint on Linux build `101.24072.0000` with Auditd. This build continues to be supported for several months, so you have time to plan and execute your migration to eBPF.
3737
>
38-
> 2. If you are on versions later than `101.24072.0000`, Defender for Endpoint on Linux relies on `netlink` as a backup supplementary event provider. In the event of a fallback, all process operations continue to flow seamlessly.
38+
> 2. If you are on versions later than `101.24072.0000`, Defender for Endpoint on Linux relies on `netlink` as a backup supplementary event provider. If a fallback occurs, all operations continue to flow seamlessly.
3939
>
4040
> Review your current Defender for Endpoint on Linux deployment, and begin planning your migration to the eBPF-supported build. For more information on eBPF and how it works, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-ebpf).
4141
>
4242
> If you have any concerns or need assistance during this transition, contact support.
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### May-2025 Build: 101.25032.0008 | Release version: 30.125032.0008.0
47+
48+
|Build: |**101.25032.0008** |
49+
|-------------------|----------------------|
50+
|Released: |**May 12, 2025** |
51+
|Published: |**May 13, 2025** |
52+
|Release version: |**30.125032.0008.0** |
53+
|Engine version: |**1.1.25020.4000** |
54+
|Signature version: |**1.427.370.0** |
55+
56+
What's new
57+
58+
- Removed external dependency of MDE Netfilter and libpcre from MDE package
59+
60+
- Fix for Python script executing unverified binaries with root-level privileges to identify Java processes using outdated versions of log4j (CVE-2025-26684) has been addressed.
61+
62+
- Updated Engine Version 1.1.25020.3000/Sigs Version 1.421.1866.0
63+
4664
### April-2025 Build: 101.25022.0002 | Release version: 30.125022.0001.0
4765

4866
|Build: |**101.25022.0002** |
@@ -99,9 +117,9 @@ Known Issues
99117
sudo chattr -i /etc/systemd/system/mdatp.service.d/[file name]
100118
```
101119

102-
Please note that the chattr command can only be used on supported file systems, such as ext4.
120+
Note that the chattr command can only be used on supported file systems, such as ext4.
103121

104-
If you need further assistance, you can reach out to our support team with your organization ID, and we can implement a temporary mitigation to prevent deletion. A permanent fix for this issue will be available in MDE version 101.25032.0000.
122+
If you need further assistance, you can reach out to our support team with your organization ID, and we can implement a temporary mitigation to prevent deletion. A permanent fix for this issue is available in MDE version 101.25032.0000.
105123

106124
### Feb-2025 Build: 101.24122.0008 | Release version: 30.124112.0008.0
107125

@@ -154,7 +172,7 @@ What's new
154172
- Enabled: When eBPF is enabled as working as expected.
155173
- Disabled: When eBPF is disabled due to one of the following reasons:
156174
- When MDE is using auditD as a supplementary sensor
157-
- When eBPF isn't present and we fallback to Net link as supplementary event provider
175+
- When eBPF isn't present and we fall back to Net link as supplementary event provider
158176
- There's no supplementary sensor present.
159177

160178
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast, and insiderSlow, are unaffected by this change.
@@ -207,7 +225,7 @@ What's new
207225

208226
#### What's new
209227

210-
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Net link as a fallback supplementary event provider. Net link provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
228+
- Starting with this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Net link as a fallback supplementary event provider. Net link provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
211229

212230
- Stability and performance improvements
213231

@@ -713,7 +731,7 @@ There are multiple fixes and new changes in this release
713731
- Files
714732
- Executables
715733

716-
- Network Protection: Connections that is blocked by Network Protection and have the block overridden by users is now correctly reported to Microsoft Defender XDR
734+
- Network Protection: Connections that are blocked by Network Protection and have the block overridden by users is now correctly reported to Microsoft Defender XDR
717735

718736
- Improved logging in Network Protection block and audit events for debugging
719737
|
@@ -1186,7 +1204,7 @@ sudo systemctl disable mdatp
11861204

11871205
#### What's new
11881206

1189-
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) isn't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
1207+
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) aren't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
11901208

11911209
#### Known issues
11921210

defender-endpoint/mac-device-control-faq.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ ms.date: 04/16/2025
2929
- [Microsoft Defender XDR](/defender-xdr)
3030
- [Microsoft Defender for Business](/defender-business)
3131

32-
3332
This article provides answers to frequently asked questions about Device Control capabilities in Microsoft Defender for Endpoint.
3433

3534
## Questions | Answers

0 commit comments

Comments
 (0)