Skip to content

Commit 8871042

Browse files
authored
Merge branch 'main' into poliveria-ah-identity-08082025
2 parents a34312c + 4ab60e2 commit 8871042

File tree

4 files changed

+34
-5
lines changed

4 files changed

+34
-5
lines changed

defender-endpoint/android-whatsnew.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,29 +15,40 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 11/06/2025
18+
ms.date: 11/17/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint
2121

2222
---
2323

2424
# What's new in Microsoft Defender for Endpoint on Android
2525

26-
2726
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
2827

2928
### Releases for Defender for Endpoint on Android
3029

3130
#### November 2025
3231

32+
| Build| 1.0.8315.0101|
33+
| -------- | -------- |
34+
| Release Date | November 17, 2025 |
35+
36+
**What's New**
37+
38+
- Performance improvement and accessibility bug fixes
39+
40+
#### November 2025
41+
3342
| Build| 1.0.8303.0101|
3443
| -------- | -------- |
3544
| Release Date |November 4, 2025|
3645

3746
**What's New**
3847

3948
- An improved user feedback experience: See [Key changes - November 2025](./android-new-ux.md#key-changes---november-2025) for details.
40-
49+
50+
- Added landscape mode UI support for the Defender app.
51+
4152
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
4253

4354
#### October 2025

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,12 @@ The following procedures for enabling attack surface reduction rules include ins
168168

169169
1. Select **Next** on the three configuration panes, then select **Create** if you're creating a new policy or **Save** if you're editing an existing policy.
170170

171+
> [!NOTE]
172+
> In the latest Intune interface, **Configuration profiles** is located under **Devices > Configuration profiles**.
173+
> Earlier versions of Intune showed this under **Device configuration > Profiles**.
174+
> If you don't see "Configuration Profile" as written in older instructions, look for **Configuration profiles** under the Devices menu.
175+
176+
171177
#### Device Configuration Profiles (Alternative 1)
172178

173179
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configure audit policies for Windows event logs | Microsoft Defender for Identity
33
description: This article describes how to configure audit policies for Windows event logs as part of deploying a Microsoft Defender for Identity sensor.
4-
ms.date: 06/04/2025
4+
ms.date: 11/05/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
@@ -23,9 +23,13 @@ Defender for Identity generates health issues for each of these scenarios if the
2323
Before you start creating new event and audit policies, we recommend that you run the following PowerShell command to generate a report of your current domain configurations:
2424

2525
```powershell
26-
New-MDIConfigurationReport [-Path] <String> [-Mode] <String> [-OpenHtmlReport]
26+
New-MDIConfigurationReport -Path "C:\Reports" -Mode Domain -Identity "DOMAIN\ServiceAccountName" -OpenHtmlReport
2727
```
2828

29+
> [!NOTE]
30+
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
31+
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
32+
2933
In the preceding command:
3034

3135
- `Path` specifies the path to save the reports to.

defender-for-identity/whats-new.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,14 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## November 2025
2727

28+
Defender for Identity now offers an opt-in automatic event-auditing configuration for unified sensors (V3.x). This feature streamlines deployment by automatically applying required Windows auditing settings to new sensors and fixing misconfigurations on existing ones. Admins can enable the option in the Defender for Identity Settings -> Advanced Features or via Graph API. The capability and its related health alerts will roll out globally beginning mid-November 2025.
29+
**Releated Health alerts:**
30+
- NTLM Auditing is not enabled
31+
- Directory Services Advanced Auditing is not enabled as required
32+
- Directory Services Object Auditing is not enabled as required
33+
- Auditing on the Configuration container is not enabled as required
34+
- Auditing on the ADFS container is not enabled as required
35+
2836
### New security posture assessment: Change password for on-prem account with potentially leaked credentials (Preview)
2937

3038
The new security posture assessment lists users whose valid credentials have been leaked. For more information, see: [Change password for on-prem account with potentially leaked credentials (Preview)](/defender-for-identity/security-posture-assessments/accounts#change-password-for-on-prem-account-with-potentially-leaked-credentials-preview)

0 commit comments

Comments
 (0)