Skip to content

Commit 84c09ff

Browse files
authored
Merge branch 'public' into patch-1
2 parents e3e0af4 + ad66c7a commit 84c09ff

File tree

104 files changed

+1117
-405
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

104 files changed

+1117
-405
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ ms.topic: how-to
77

88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

10+
> [!IMPORTANT]
11+
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025.
12+
>
13+
1014
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1115

1216
> [!NOTE]

ATPDocs/troubleshooting-known-issues.md

Lines changed: 3 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Troubleshooting known issues
33
description: Describes how you can troubleshoot issues in Microsoft Defender for Identity.
4-
ms.date: 09/02/2024
4+
ms.date: 05/08/2025
55
ms.topic: troubleshooting
66
---
77

@@ -117,31 +117,16 @@ The issue can be caused when the trusted root certification authorities certific
117117

118118
Run the following PowerShell cmdlet to verify that the required certificates are installed.
119119

120-
In the following example, use the "DigiCert Baltimore Root" certificate for all customers. In addition, use the "DigiCert Global Root G2" certificate for commercial customers or use the "DigiCert Global Root CA" certificate for US Government GCC High customers, as indicated.
120+
In the following example the "DigiCert Global Root G2" certificate is for commercial customers and the "DigiCert Global Root CA" certificate for US Government GCC High customers, as indicated.
121121

122122
```powershell
123-
# Certificate for all customers
124-
Get-ChildItem -Path "Cert:\LocalMachine\Root" | where { $_.Thumbprint -eq "D4DE20D05E66FC53FE1A50882C78DB2852CAE474"} | fl
125-
126123
# Certificate for commercial customers
127124
Get-ChildItem -Path "Cert:\LocalMachine\Root" | where { $_.Thumbprint -eq "df3c24f9bfd666761b268073fe06d1cc8d4f82a4"} | fl
128125
129126
# Certificate for US Government GCC High customers
130127
Get-ChildItem -Path "Cert:\LocalMachine\Root" | where { $_.Thumbprint -eq "a8985d3a65e5e5c4b2d7d66d40c6dd2fb19c5436"} | fl
131128
```
132129

133-
Output for certificate for all customers:
134-
135-
```Output
136-
Subject : CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
137-
Issuer : CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
138-
Thumbprint : D4DE20D05E66FC53FE1A50882C78DB2852CAE474
139-
FriendlyName : DigiCert Baltimore Root
140-
NotBefore : 5/12/2000 11:46:00 AM
141-
NotAfter : 5/12/2025 4:59:00 PM
142-
Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.Oid, System.Security.Cryptography.Oid}
143-
```
144-
145130
Output for certificate for commercial customers certificate:
146131

147132
```Output
@@ -168,19 +153,14 @@ Extensions : {System.Security.Cryptography.Oid, System.Security.Cryptography.O
168153

169154
If you don't see the expected output, use the following steps:
170155

171-
1. Download the following certificates to the Server Core machine. For all customers, download the [Baltimore CyberTrust root](https://cacerts.digicert.com/BaltimoreCyberTrustRoot.crt) certificate.
172-
173-
In addition:
156+
1. Download the following certificates to the machine:
174157

175158
- For commercial customers, download the [DigiCert Global Root G2](https://cacerts.digicert.com/DigiCertGlobalRootG2.crt) certificate
176159
- For US Government GCC High customers, download the [DigiCert Global Root CA](https://cacerts.digicert.com/DigiCertGlobalRootCA.crt) certificate
177160

178161
1. Run the following PowerShell cmdlet to install the certificate.
179162

180163
```powershell
181-
# For all customers, install certificate
182-
Import-Certificate -FilePath "<PATH_TO_CERTIFICATE_FILE>\bc2025.crt" -CertStoreLocation Cert:\LocalMachine\Root
183-
184164
# For commercial customers, install certificate
185165
Import-Certificate -FilePath "<PATH_TO_CERTIFICATE_FILE>\DigiCertGlobalRootG2.crt" -CertStoreLocation Cert:\LocalMachine\Root
186166

ATPDocs/whats-new.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,15 @@ For more information, see also:
2222

2323
For updates about versions and features released six months ago or earlier, see the [What's new archive for Microsoft Defender for Identity](whats-new-archive.md).
2424

25+
## May 2025
26+
27+
### Local administrators collection (using SAM-R queries) feature will be disabled
28+
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored.
29+
30+
### New Health Issue
31+
32+
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
33+
2534
## April 2025
2635

2736
### Privileged Identity Tag Now Visible in Defender for Identity Inventory
@@ -47,7 +56,6 @@ For more information, see: [Integrations Defender for Identity and PAM services.
4756

4857
### New Service Account Discovery page
4958

50-
5159
Microsoft Defender for Identity now includes a Service Account Discovery capability, offering you centralized visibility into service accounts across your Active Directory environment.
5260

5361
This update provides:
@@ -60,11 +68,6 @@ This update provides:
6068

6169
For more information, see: [Investigate and protect Service Accounts | Microsoft Defender for Identity](service-account-discovery.md).
6270

63-
64-
### New Health Issue
65-
66-
New [health issue](health-alerts.md#network-configuration-mismatch-for-sensors-running-on-vmware) for cases where sensors running on VMware have network configuration mismatch.
67-
6871
### Enhanced Identity Inventory
6972

7073
The Identities page under *Assets* has been updated to provide better visibility and management of identities across your environment.

CloudAppSecurityDocs/anomaly-detection-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,14 +64,14 @@ Use this detection to control file uploads and downloads in real time with sessi
6464

6565
By enabling file sandboxing, files that according to their metadata and based on proprietary heuristics to be potentially risky, will also be sandbox scanned in a safe environment. The Sandbox scan may detect files that were not detected based on threat intelligence sources.
6666

67-
Defender for Cloud Apps supports malware detection for the following apps:
67+
Defender for Cloud Apps supports "File Sandboxing" malware detection for the following apps:
6868

6969
* Box
7070
* Dropbox
7171
* Google Workspace
7272

7373
> [!NOTE]
74-
>* Proactively sandboxing will be done in third party applications (*Box*, *Dropbox* etc.). In *OneDrive* and *SharePoint* files are being scanned and sandboxed as part of the service itself.
74+
>* Proactively sandboxing will be done in third party applications (*Box*, *Dropbox* etc.). **In *OneDrive* and *SharePoint* files are being scanned and sandboxed as part of the service itself**.
7575
> * In *Box*, *Dropbox*, and *Google Workspace*, Defender for Cloud Apps doesn't automatically block the file, but blocking may be performed according to the app's capabilities and the app's configuration set by the customer.
7676
> * If you're unsure about whether a detected file is truly malware or a false positive, go to the Microsoft Security Intelligence page at [https://www.microsoft.com/wdsi/filesubmission](https://www.microsoft.com/wdsi/filesubmission) and submit the file for further analysis.
7777

CloudAppSecurityDocs/cloud-discovery-policies.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ Discovery policies enable you to set alerts that notify you when new apps are de
4444

4545
> [!NOTE]
4646
>
47-
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it may trigger additional alerts for apps that have already been discovered and alerted on.
48-
> - Data from **snapshot reports** do not trigger alerts in app discovery policies.
47+
> - Newly created discovery policies (or policies with updated continuous reports) trigger an alert once in 90 days per app per continuous report, regardless of whether there are existing alerts for the same app. So, for example, if you create a policy for discovering new popular apps, it might trigger additional alerts for apps that have already been discovered and alerted on.
48+
> - Data from **snapshot reports** don't trigger alerts in app discovery policies.
4949
5050
For example, if you're interested in discovering risky hosting apps found in your cloud environment, set your policy as follows:
5151

@@ -73,6 +73,11 @@ Defender for Cloud Apps searches all the logs in your cloud discovery for anomal
7373

7474
1. Under **Apply to** choose whether this policy applies **All continuous reports** or **Specific continuous reports**. Select whether the policy applies to **Users**, **IP addresses**, or both.
7575

76+
:::image type="content" source="media/apply-to-continous-reports.png" alt-text="Screenshot showing how to apply file polcies to specific continous reports" lightbox="media/apply-to-continous-reports.png":::
77+
78+
> [!IMPORTANT]
79+
> When you configure an app discovery policy and select **Apply to > All continuous reports**, multiple alerts are generated for each discovery stream, including the global stream which aggregates data from all sources. To control alert volume, select **Apply to > Specific continuous reports** and choose only the relevant streams for your policy.
80+
> Learn more: [Defender for Cloud apps continuous risk assessment reports](set-up-cloud-discovery.md#snapshot-and-continuous-risk-assessment-reports)
7681
1. Select the dates during which the anomalous activity occurred to trigger the alert under **Raise alerts only for suspicious activities occurring after date.**
7782

7883
1. Set a **Daily alert limit** under **Alerts**. Select if the alert is sent as an email. Then provide email addresses as needed.
61.6 KB
Loading

CloudAppSecurityDocs/protect-salesforce.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud
118118
* **Manage Users**
119119
* **[Query All Files](https://go.microsoft.com/fwlink/?linkid=2106480)**
120120
* **Modify Metadata Through Metadata API Functions**
121+
* **View Setup And Configuration**
121122

122123
If these checkboxes aren't selected, you may need to contact Salesforce to add them to your account.
123124

defender-endpoint/TOC.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,6 @@
4747
href: ios-whatsnew.md
4848
- name: Previous Defender for Endpoint releases (archive)
4949
href: whats-new-mde-archive.md
50-
- name: Minimum requirements
51-
href: minimum-requirements.md
5250
- name: Trial user guide - Defender for Endpoint
5351
href: defender-endpoint-trial-user-guide.md
5452
- name: Pilot and deploy Defender for Endpoint
@@ -178,6 +176,8 @@
178176
items:
179177
- name: Deploy Defender for Endpoint on macOS
180178
items:
179+
- name: Microsoft Defender for Endpoint Prerequisites on macOS
180+
href: microsoft-defender-endpoint-mac-prerequisites.md
181181
- name: Deployment with Microsoft Intune
182182
href: mac-install-with-intune.md
183183
- name: JAMF Pro-based deployment
@@ -311,7 +311,7 @@
311311
href: linux-resources.md
312312
- name: Mobile Threat Defense
313313
items:
314-
- name: Mobile Threat Defense Overview
314+
- name: Mobile Threat Defense overview
315315
href: mtd.md
316316
- name: Deploy
317317
items:
@@ -326,6 +326,7 @@
326326
- name: User experiences in Defender for Endpoint on Android
327327
href: android-new-ux.md
328328
- name: User experiences in Defender for Endpoint on iOS
329+
href: ios-new-ux.md
329330
- name: Mobile device resources for Defender for Endpoint
330331
href: mobile-resources-defender-endpoint.md
331332
- name: Configure Defender for Endpoint on Android features

defender-endpoint/attack-surface-reduction.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: defender-endpoint
55
ms.subservice: asr
66
ms.localizationpriority: medium
77
audience: ITPro
8-
author: denisebmsft
9-
ms.author: deniseb
8+
author: emmwalshh
9+
ms.author: ewalsh
1010
ms.reviewer: sugamar
1111
manager: deniseb
1212
ms.custom: admindeeplinkDEFENDER
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 03/28/2025
19+
ms.date: 05/09/2025
2020
---
2121

2222
# Attack surface reduction rules overview
@@ -98,7 +98,7 @@ Also, make sure [Microsoft Defender Antivirus and anti-malware updates](/windows
9898
- Minimum platform release requirement: `4.18.2008.9`
9999
- Minimum engine release requirement: `1.1.17400.5`
100100

101-
For more information and to get your updates, see [Update for Microsoft Defender anti-malware platform](https://support.microsoft.com/help/4052623/update-for-microsoft-defender-antimalware-platform).
101+
For more information and to get your updates, see [Update for Microsoft Defender anti-malware platform](/defender-endpoint/microsoft-defender-antivirus-updates).
102102

103103
### Cases where warn mode isn't supported
104104

@@ -134,6 +134,8 @@ You can set attack surface reduction rules for devices that are running any of t
134134

135135
- Windows 10 Pro, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later
136136
- Windows 10 Enterprise, [version 1709](/windows/whats-new/whats-new-windows-10-version-1709) or later
137+
- Windows 11 Pro, version 21H2 or later
138+
- Windows 11 Enterprise, version 21H2 or later
137139
- Windows Server, [version 1803 (Semi-Annual Channel)](/windows-server/get-started/whats-new-in-windows-server-1803) or later
138140
- Windows Server 2025
139141
- [Windows Server 2022](/windows-server/get-started/whats-new-in-windows-server-2022)

defender-endpoint/behavioral-blocking-containment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
search.appverid: met150
18-
ms.date: 03/29/2025
18+
ms.date: 04/25/2025
1919
---
2020

2121
# Behavioral blocking and containment

0 commit comments

Comments
 (0)