You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+8-1Lines changed: 8 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,14 @@ For updates about versions and features released six months ago or earlier, see
25
25
26
26
## August 2025
27
27
28
-
**Suspected Brute Force attack (Kerberos, NTLM):** Improved detection logic now includes scenarios where accounts were locked during the attacks. As a result, the number of triggered alerts might increase.
28
+
### Sensor version 2.246
29
+
30
+
This version includes bug fixes and stability improvements for the Microsoft Defender for Identity sensor.
31
+
32
+
### Detection update: Suspected Brute Force attack (Kerberos, NTLM)
33
+
34
+
Improved detection logic to include scenarios where accounts were locked during attacks. As a result, the number of triggered alerts might increase.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/proxy-intro-aad.md
+4-3Lines changed: 4 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,8 @@ ms.topic: concept-article
6
6
---
7
7
# Conditional Access app control in Microsoft Defender for Cloud Apps
8
8
9
-
In today's workplace, it's not enough to know what happened in your cloud environment after the fact. You need to stop breaches and leaks in real time. You also need to prevent employees from intentionally or accidentally putting your data and organization at risk.
10
-
11
-
You want to support users in your organization while they use the best cloud apps available and bring their own devices to work. However, you also need tools to protect your organization from data leaks and theft in real time. Microsoft Defender for Cloud Apps integrates with any identity provider (IdP) to deliver this protection with [access](access-policy-aad.md) and [session](session-policy-aad.md) policies.
9
+
In today’s workplace, it’s not enough to understand what happened in your cloud environment after the fact, you need to stop breaches and data leaks as they happen. That includes preventing employees from intentionally or accidentally putting your data and organization at risk.
10
+
Microsoft Defender for Cloud Apps helps you strike the right balance: enabling productivity with the best cloud apps while protecting your data in real time. It delivers deep visibility and control over **browser-based sessions** through integration with any identity provider (IdP), using powerful [access](access-policy-aad.md) and [session](session-policy-aad.md) policies.
12
11
13
12
For example:
14
13
@@ -26,6 +25,8 @@ Microsoft Edge users benefit from [direct, in-browser protection](in-browser-pro
26
25
27
26
Users of other browsers are redirected via reverse proxy to Defender for Cloud Apps. Those browsers display an `*.mcas.ms` suffix in the link's URL. For example, if the app URL is `myapp.com`, the app URL is updated to `myapp.com.mcas.ms`.
28
27
28
+
To prevent bypassing this protection, admins should configure access policies to block native client access and allow only browser-based sessions.
29
+
29
30
This article describes Conditional Access app control in Defender for Cloud Apps through [Microsoft Entra Conditional Access](/entra/identity/conditional-access/overview) policies.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/user-groups.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,6 +51,7 @@ After the import is complete, select your group from the **User groups** page to
51
51
> - There may be a short delay until imported user groups are available in filters.
52
52
> - Only activities performed after importing a user group will be tagged as having been performed by a member of the user group.
53
53
> - After the initial sync, groups are usually updated every hour. However, due to various factors there could be times where this might take several hours.
54
+
> - Usernames must contain only standard alphanumeric characters (a–z, A–Z, 0–9). Usernames with special characters such as ~ or # aren't supported.
54
55
55
56
For more information on using the User group filters, see [Activities](activity-filters.md).
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -406,8 +406,8 @@ This rule blocks executable files, such as .exe, .dll, or .scr, from launching.
406
406
407
407
> [!IMPORTANT]
408
408
> You must [enable cloud-delivered protection](/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus) to use this rule.
409
-
> The rule **Block executable files from running unless they meet a prevalence, age, or trusted list criterion** with GUID `01443614-cd74-433a-b99e-2ecdc07bfc25` is owned by Microsoft and isn't specified by admins. This rule uses cloud-delivered protection to update its trusted list regularly.
410
-
> You can specify individual files or folders (using folder paths or fully qualified resource names) but you can't specify which rules or exclusions apply to.
409
+
> This rule uses cloud-delivered protection to update its trusted list regularly.
410
+
> You can specify individual files or folders by using folder paths or fully qualified resource names. It also supports the **ASROnlyPerRuleExclusions** setting.
411
411
412
412
Intune name: `Executables that don't meet a prevalence, age, or trusted list criteria`
413
413
@@ -583,6 +583,9 @@ Dependencies: Microsoft Defender Antivirus
583
583
584
584
### Block rebooting machine in Safe Mode
585
585
586
+
> [!NOTE]
587
+
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
588
+
586
589
This rule prevents the execution of commands to restart machines in Safe Mode. Safe Mode is a diagnostic mode that only loads the essential files and drivers needed for Windows to run. However, in Safe Mode, many security products are either disabled or operate in a limited capacity, which allows attackers to further launch tampering commands, or execute and encrypt all files on the machine. This rule blocks such attacks by preventing processes from restarting machines in Safe Mode.
587
590
588
591
Intune Name: ` Block rebooting machine in Safe Mode`
@@ -621,6 +624,9 @@ Dependencies: Microsoft Defender Antivirus
621
624
622
625
### Block use of copied or impersonated system tools
623
626
627
+
> [!NOTE]
628
+
> This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Windows and Windows Servers.
629
+
624
630
This rule blocks the use of executable files that are identified as copies of Windows system tools. These files are either duplicates or impostors of the original system tools. Some malicious programs might try to copy or impersonate Windows system tools to avoid detection or gain privileges. Allowing such executable files can lead to potential attacks. This rule prevents propagation and execution of such duplicates and impostors of the system tools on Windows machines.
625
631
626
632
Intune Name: `Block use of copied or impersonated system tools`
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management.
661
+
> When managing ASR rules using Microsoft Defender for Endpoint security settings management, the setting for **Block Webshell creation for Servers** must be configured as `Not Configured` in Group Policy or other local settings. If this rule is set to any other value (such as `Enabled` or `Disabled`), it could cause conflicts and prevent the policy from applying correctly through security settings management. This feature isn't supported in Threat and Vulnerability Management, so the Attack Surface Reduction rule report will show as "Not applicable" for Exchange servers.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-vdi.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,6 +103,10 @@ The following steps guide you through onboarding VDI devices and highlight steps
103
103
| Single entry for each device | 1. Select the **PowerShell Scripts** tab, then select **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). <br/>2. Navigate to onboarding PowerShell script `Onboard-NonPersistentMachine.ps1`. There's no need to specify the other file, as it's triggered automatically. |
104
104
| Multiple entries for each device | 1. Select the **Scripts** tab, then select **Add** (Windows Explorer opens directly in the path where you copied the onboarding script earlier). <br/>2. Navigate to the onboarding bash script `WindowsDefenderATPOnboardingScript.cmd`. |
105
105
106
+
> [!NOTE]
107
+
> When using the 'Single entry for each device' onboarding method for non-persistent VDI environments, ensure that the Onboard-NonPersistentMachine.ps1 script is executed only after the virtual machine has received its final hostname and completed its final reboot.<br>
108
+
> For example, if your VDI provisioning process includes multiple reboots or configuration stages after the VM is cloned from a master image, delay the script execution until the last reboot is complete and final machine name is assigned.<br> Running the script too early may result in duplicate device entries or inconsistent onboarding to Microsoft Defender for Endpoint.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+24-12Lines changed: 24 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,12 +70,24 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
70
70
71
71
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-core-service-overview.md
+21-7Lines changed: 21 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,37 +33,50 @@ To enhance your endpoint security experience, Microsoft is releasing the Microso
33
33
- Mid April 2024 to Enterprise customers running Windows clients.
34
34
- Beginning of July 2024 to U.S. Government customers running Windows clients.
35
35
36
-
- Mid January 2025 to Enterprise customers running Windows Server.
36
+
The Microsoft Defender Core service for Windows Server is releasing with [Microsoft Defender Antivirus platform version 4.18.25050.5.](/defender-endpoint/microsoft-defender-antivirus-updates)
37
37
38
-
3. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
38
+
- Mid July 2025 to Enterprise customers running Windows Server 2019 or later.
39
+
40
+
- Mid September 2025 to Enterprise customers running the [unified Microsoft Defender for Endpoint client](/defender-endpoint/update-agent-mma-windows) for Windows Server 2012 R2 or Windows Server 2016.
41
+
42
+
1. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
39
43
40
-
4. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:
44
+
1. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:
41
45
42
46
Enterprise customers should allow the following URLs:
Enterprise U.S. Government customers should allow the following URLs:
57
66
58
67
-`*.events.data.microsoft.com`
68
+
59
69
-`*.endpoint.security.microsoft.us (GCC-H & DoD)`
70
+
60
71
-`*.gccmod.ecs.office.com (GCC-M)`
72
+
61
73
-`*.config.ecs.gov.teams.microsoft.us (GCC-H)`
74
+
62
75
-`*.config.ecs.dod.teams.microsoft.us (DoD)`
63
76
64
-
5. If you're using [Application Control for Windows](/windows/security/application-security/application-control/windows-defender-application-control/wdac), or you're running non-Microsoft antivirus or endpoint detection and response software, make sure to add the processes mentioned earlier to your allowlist.
77
+
1. If you're using [Application Control for Windows](/windows/security/application-security/application-control/windows-defender-application-control/wdac), or you're running non-Microsoft antivirus or endpoint detection and response software, make sure to add the processes mentioned earlier to your allowlist.
65
78
66
-
6. Consumers don't need to take any actions to prepare.
79
+
1. Consumers don't need to take any actions to prepare.
67
80
68
81
## Microsoft Defender Antivirus processes and services
69
82
@@ -191,7 +204,8 @@ On the script page of the Run Script wizard, choose your script from the list (M
191
204
#### Use the Registry to update the policies for Microsoft Defender Core service.
192
205
193
206
1. Select **Start**, and then open Regedit.exe as an administrator.
194
-
2. Go to `HKLM\Software\Policies\Microsoft\Windows Defender\Features`
207
+
1. Go to `HKLM\Software\Policies\Microsoft\Windows Defender\Features`
0 commit comments