Skip to content

Commit 854f40c

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-core-servic-1718920030
2 parents d6dfbd2 + fddc90a commit 854f40c

File tree

4 files changed

+46
-15
lines changed

4 files changed

+46
-15
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: YongRhee-MSFT
66
ms.author: yongrhee
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 06/17/2024
9+
ms.date: 06/21/2024
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -58,7 +58,7 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
5858
| Build: | **101.24042.0008** |
5959
|--------------------|-----------------------|
6060
| Release version: | **20.124042.8.0** |
61-
| Engine version: | **1.1.24050.7** |
61+
| Engine version: | **1.1.24040.1** |
6262
| Signature version: | **1.413.13.0** |
6363

6464
#### What's new

defender-endpoint/review-detected-threats.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
- mde-edr
1414
ms.topic: conceptual
15-
ms.date: 05/29/2024
15+
ms.date: 06/21/2024
1616
ms.subservice: edr
1717
search.appverid: met150
1818
---
@@ -39,15 +39,15 @@ In the Microsoft Defender portal, you can view and manage threat detections usin
3939

4040
1. Visit [Microsoft XDR portal](https://security.microsoft.com/) and sign-in.
4141

42-
On the landing page, you'll see the **Devices with active malware** card with the following information:
42+
On the landing page, you see the **Devices with active malware** card with the following information:
4343

4444
- Display text: Applies to Intune-managed devices. Devices with multiple malware detections may be counted more than once.
4545
- Last updated date and time.
4646
- A bar with the Active and Malware remediated portions as per your scan.
4747

4848
You can select **View Details** for more information.
4949

50-
2. Once remediated, you'll see the following text being displayed:
50+
2. Once remediated, you see the following text being displayed:
5151

5252
*Malware found on your devices have been remediated successfully*.
5353

@@ -59,7 +59,7 @@ You can manage threat detections for any devices that are [enrolled in Microsoft
5959

6060
2. In the navigation pane, select **Endpoint security**.
6161

62-
3. Under **Manage**, select **Antivirus**. You'll see tabs for **Summary**, **Unhealthy endpoints**, and **Active malware**.
62+
3. Under **Manage**, select **Antivirus**. You see tabs for **Summary**, **Unhealthy endpoints**, and **Active malware**.
6363

6464
4. Review the information on the available tabs, and then take action as necessary.
6565

@@ -72,20 +72,23 @@ You can manage threat detections for any devices that are [enrolled in Microsoft
7272

7373
## FAQs
7474

75-
### In the Microsoft XDR portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
75+
#### In the Microsoft XDR portal > Devices with active malware > Devices with malware detections report, why does the Last update seem to be occurring today?
7676

77-
To see when the malware was detected, you can do the following:
77+
To see when the malware was detected, you can take the following steps:
7878

7979
1. Since this is an integration with Intune, visit [**Intune portal**](https://intune.microsoft.com) and select **Antivirus** and then select **Active malware** tab.
80+
8081
2. Select **Export**.
81-
3. On your device, go to Downloads, and extract the Active malware_YYYY_MM_DD_THH_MM_SS.0123Z.csv.zip.
82+
83+
3. On your device, go to Downloads, and extract the `Active malware_YYYY_MM_DD_THH_MM_SS.0123Z.csv.zip` file.
84+
8285
4. Open the CSV and find the **LastStateChangeDateTime** column to see when malware was detected.
8386

84-
### In the devices with malware detections report, why can't I see any information about which malware was detected on the device.
87+
#### In the devices with malware detections report, why can't I see any information about which malware was detected on the device.
8588

86-
To see the malware name, visit the [Intune portal](https://intune.microsoft.com) as this is an integration with Intune, select **Antivirus**, and select **Active malware** tab and you'll see a column named **Malware name**.
89+
To see the malware name, visit the [Intune portal](https://intune.microsoft.com) as this is an integration with Intune, select **Antivirus**, and select **Active malware** tab and you see a column named **Malware name**.
8790

88-
### I see a different number for active malware in Devices with active malware report, when compared to numbers I see using Reports > Detected malware, and Intune > Antivirus > Active malware.
91+
#### I see a different number for active malware in Devices with active malware report, when compared to numbers I see using Reports > Detected malware, and Intune > Antivirus > Active malware.
8992

9093
The **Devices with active malware** report is based on the devices that were active within the last 1 day (24 hours) and had malware detections within the last 15 days.
9194

@@ -106,16 +109,21 @@ on DeviceName
106109
| distinct DeviceName, DeviceId, Title, AlertId, Timestamp
107110
```
108111

109-
### I searched the computer name in the top search bar and got two devices with the same name. I don't know which one of those two devices the report is referring to?
112+
#### I searched the computer name in the top search bar and got two devices with the same name. I don't know which one of those two devices the report is referring to?
110113

111114
Use the Advanced Hunting query that is mentioned [here](#i-see-a-different-number-for-active-malware-in-devices-with-active-malware-report-when-compared-to-numbers-i-see-using-reports--detected-malware-and-intune--antivirus--active-malware) for details such as unique DeviceID, Title, AlertID, and the remediation process. After identifying, work with your IT admin's to make sure that the devices are uniquely named. If a device is retired, use [tags to decommission it.](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/how-to-use-tagging-effectively-part-1/ba-p/1964058)
112115

113-
### I see malware detection in Intune and on the Devices with active malware report, but I don't see it in the MDE Alerts queue or in the Incidents queue.
116+
#### I see malware detection in Intune and on the Devices with active malware report, but I don't see it in the MDE Alerts queue or in the Incidents queue.
114117

115118
It might be that the URL's [Cloud Protection](configure-network-connections-microsoft-defender-antivirus.md) is currently not being allowed through your firewall or proxy.
116119

117120
You need to ensure that when you run `%ProgramFiles%\Windows Defender\MpCmdRun.exe -ValidateMapsConnection` on your device, the reporting is Ok.
118121

122+
#### I see a device that has been inactive for 180+ days but still showing up on the report for 'Devices with active malware'. The device doesn't show in the "Device inventory", can't be turned on and can't be offboarded from Microsoft Defender for Endpoint.
123+
124+
125+
The device has not been [retired](/mem/intune/remote-actions/devices-wipe) from Intune.
126+
119127
## Related articles
120128

121129
- [Alerts in Microsoft Defender for Endpoint](investigate-alerts.md)

defender-endpoint/run-analyzer-macos-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -297,7 +297,7 @@ Usage example: `sudo ./mde_support_tool.sh skipfaultyrules -e true`
297297

298298
- report.html
299299

300-
Description: The main HTML output file that contains the findings and guidance that the analyzer script run on the machine can produce.
300+
Description: The main HTML output file that contains the findings and guidance from running the client analyzer tool on the device. This file is only generated when running the Python-based version of the client analyzer tool.
301301

302302
- mde_diagnostic.zip
303303

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,36 @@ This article provides information on inaccuracies that have been reported. You c
3232
3333
The following tables present the relevant vulnerability information organized by month:
3434

35+
## June 2024
36+
37+
| Inaccuracy report ID | Description | Fix date |
38+
|---|---|---|
39+
| 55309 | Fixed inaccuracy in Google One | 01-June-24 |
40+
| - | Defender Vulnerability Management doesn't currently support CVE-2020-17381 | 02-June-24 |
41+
| - | Fixed inaccuracy in CVE-2024-21410 | 10-June-24 |
42+
43+
3544
## May 2024
3645

3746
| Inaccuracy report ID | Description | Fix date |
3847
|---|---|---|
48+
| - | Fixed inaccuracy in CVE-2023-46838 | 05-May-24 |
49+
| - | Fixed inaccuracy in CVE-2024-3094 | 05-May-24 |
3950
| - | Fixed inaccuracy in Microsoft Visual Studio Code | 06-May-24 |
51+
| - | Fixed inaccuracy in CVE-2024-1403 | 06-May-24 |
4052
| - | Added Microsoft Defender Vulnerability Management support to NextGen Mirth Connect | 08-May-24 |
4153
| 54538 | Fixed inaccuracy in Pippo product | 08-May-24 |
4254
| - | Fixed inaccuracy in FortiClient Endpoint Management | 08-May-24 |
55+
| - | Added accurate EOS details for D-Link products | 15-May-24 |
56+
| 54786 | Fixed inaccuracy in CVE-2024-31497 | 16-May-24 |
57+
| 56667 | Fixed inaccuracy in CURL vulnerabilities - CVE-2023-28319 & CVE-2023-28320 | 16-May-24 |
58+
| - | Defender Vulnerability Management doesn't currently support CVE-2024-20666 | 20-May-24 |
59+
| 56287 | Fixed inaccuracy in CVE-2021-32823 | 20-May-24 |
60+
| 57278 | Defender Vulnerability Management doesn't currently support Lenovo Thinkpad P16 Gen1 Firmware | 20-May-24 |
61+
| 50565 | Fixed inaccuracy in Adobe experience Manager Desktop | 21-May-24 |
62+
| 55190 | Fixed inaccuracy in Abbyy Finereader PDF and Engine | 21-May-24 |
63+
| 49836 | Fixed inaccuracy in Progress OpenEdge | 26-May-24 |
64+
| 57299 | Fixed inaccuracy in CVE-2021-33214 & CVE-2020-14498 | 29-May-24 |
4365

4466
## April 2024
4567

@@ -62,6 +84,7 @@ The following tables present the relevant vulnerability information organized by
6284
| 48996 | Fixed inaccuracy in Connectwise ScreenConnect Client | 16-Apr-24 |
6385
| - | Fixed inaccurate product considerations in Apple | 16-Apr-24 |
6486
| 49565 | Fixed inaccuracy in GitHub vulnerabilities - CVE-2012-2055 and CVE-2024-0727 | 16-Apr-24 |
87+
| 54684 | Defender Vulnerability Management doesn't currently support Lenovo Thinkpad T590 Firmware | 30-Apr-24 |
6588

6689
## March 2024
6790

0 commit comments

Comments
 (0)