Skip to content

Commit 7f012a5

Browse files
committed
review
1 parent d6b8aac commit 7f012a5

File tree

2 files changed

+9
-10
lines changed

2 files changed

+9
-10
lines changed

defender-endpoint/linux-whatsnew.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 04/23/2025
9+
ms.date: 05/13/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -35,7 +35,7 @@ This article is updated frequently to let you know what's new in the latest rele
3535
>
3636
> 1. Continue to use Defender for Endpoint on Linux build `101.24072.0000` with Auditd. This build continues to be supported for several months, so you have time to plan and execute your migration to eBPF.
3737
>
38-
> 2. If you are on versions later than `101.24072.0000`, Defender for Endpoint on Linux relies on `netlink` as a backup supplementary event provider. In the event of a fallback, all process operations continue to flow seamlessly.
38+
> 2. If you are on versions later than `101.24072.0000`, Defender for Endpoint on Linux relies on `netlink` as a backup supplementary event provider. If a fallback occurs, all operations continue to flow seamlessly.
3939
>
4040
> Review your current Defender for Endpoint on Linux deployment, and begin planning your migration to the eBPF-supported build. For more information on eBPF and how it works, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-ebpf).
4141
>
@@ -55,7 +55,7 @@ This article is updated frequently to let you know what's new in the latest rele
5555

5656
What's new
5757

58-
- Removes external dependency of MDE Netfilter and libpcre from MDE package
58+
- Removed external dependency of MDE Netfilter and libpcre from MDE package
5959

6060
- Fix for Python script executing unverified binaries with root-level privileges to identify Java processes using outdated versions of log4j (CVE-2025-26684) has been addressed.
6161

@@ -117,9 +117,9 @@ Known Issues
117117
sudo chattr -i /etc/systemd/system/mdatp.service.d/[file name]
118118
```
119119

120-
Please note that the chattr command can only be used on supported file systems, such as ext4.
120+
Note that the chattr command can only be used on supported file systems, such as ext4.
121121

122-
If you need further assistance, you can reach out to our support team with your organization ID, and we can implement a temporary mitigation to prevent deletion. A permanent fix for this issue will be available in MDE version 101.25032.0000.
122+
If you need further assistance, you can reach out to our support team with your organization ID, and we can implement a temporary mitigation to prevent deletion. A permanent fix for this issue is available in MDE version 101.25032.0000.
123123

124124
### Feb-2025 Build: 101.24122.0008 | Release version: 30.124112.0008.0
125125

@@ -172,7 +172,7 @@ What's new
172172
- Enabled: When eBPF is enabled as working as expected.
173173
- Disabled: When eBPF is disabled due to one of the following reasons:
174174
- When MDE is using auditD as a supplementary sensor
175-
- When eBPF isn't present and we fallback to Net link as supplementary event provider
175+
- When eBPF isn't present and we fall back to Net link as supplementary event provider
176176
- There's no supplementary sensor present.
177177

178178
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast, and insiderSlow, are unaffected by this change.
@@ -225,7 +225,7 @@ What's new
225225

226226
#### What's new
227227

228-
- Starting this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Net link as a fallback supplementary event provider. Net link provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
228+
- Starting with this version, Defender for Endpoint on Linux no longer supports `AuditD` as a supplementary event provider. For improved stability and performance, we have transitioned to eBPF. If you disable eBPF, or in the event eBPF isn't supported on any specific kernel, Defender for Endpoint on Linux automatically switches back to Net link as a fallback supplementary event provider. Net link provides reduced functionality and tracks only process-related events. In this case, all process operations continue to flow seamlessly, but you could miss specific file and socket-related events that eBPF would otherwise capture. For more information, see [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](linux-support-ebpf.md). If you have any concerns or need assistance during this transition, contact support.
229229

230230
- Stability and performance improvements
231231

@@ -731,7 +731,7 @@ There are multiple fixes and new changes in this release
731731
- Files
732732
- Executables
733733

734-
- Network Protection: Connections that is blocked by Network Protection and have the block overridden by users is now correctly reported to Microsoft Defender XDR
734+
- Network Protection: Connections that are blocked by Network Protection and have the block overridden by users is now correctly reported to Microsoft Defender XDR
735735

736736
- Improved logging in Network Protection block and audit events for debugging
737737
|
@@ -1204,7 +1204,7 @@ sudo systemctl disable mdatp
12041204

12051205
#### What's new
12061206

1207-
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) isn't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
1207+
- Fixes a kernel hang observed on select customer workloads running mdatp version `101.75.43`. After RCA, this was attributed to a race condition while releasing the ownership of a sensor file descriptor. The race condition was exposed due to a recent product change in the shutdown path. Customers on newer Kernel versions (5.1+) aren't impacted by this issue. For more information, see [System hang due to blocked tasks in fanotify code](https://access.redhat.com/solutions/2838901).
12081208

12091209
#### Known issues
12101210

defender-endpoint/mac-device-control-faq.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,6 @@ ms.date: 04/16/2025
2929
- [Microsoft Defender XDR](/defender-xdr)
3030
- [Microsoft Defender for Business](/defender-business)
3131

32-
3332
This article provides answers to frequently asked questions about Device Control capabilities in Microsoft Defender for Endpoint.
3433

3534
## Questions | Answers

0 commit comments

Comments
 (0)