Skip to content

Commit 89616cc

Browse files
Merge pull request #5120 from MicrosoftDocs/main
[AutoPublish] main to live - 09/25 01:34 PDT | 09/25 14:04 IST
2 parents 1abf4d1 + 8ee7e63 commit 89616cc

File tree

4 files changed

+26
-10
lines changed

4 files changed

+26
-10
lines changed

defender-endpoint/linux-whatsnew.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,24 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### September-2025 Build: 101.25082.0003 | Release version: 30.125082.0003.0
47+
48+
|Build: |**101.25082.0003** |
49+
|-------------------|----------------------|
50+
|Released: |**September 25, 2025**|
51+
|Published: |**September 25, 2025**|
52+
|Expiry: |**May 29, 2026**|
53+
|Release version: |**30.125082.0003.0**|
54+
|Engine version: |**1.1.25070.4000**|
55+
|Signature version: |**1.435.242.0**|
56+
57+
What's new
58+
- Vulnerability detection for Langflow, an open-source Python framework for building AI workflows and agents, has been enhanced with dynamic detection using advanced telemetry and Python package scanning. This includes the detection of CVE-2025-3248 with a CVSS score of 9.8, ensuring comprehensive vulnerability coverage.
59+
60+
- Client Analyzer is now bundled directly within the MDE package, eliminating the need for separate downloads. Both the binary and Python versions are included by default and can be found at /opt/microsoft/mdatp/tools/client_analyzer/. This ensures consistent availability across environments and streamlines troubleshooting for customers by making diagnostic tools readily accessible out-of-the-box.
61+
62+
- Other quality and stability fixes.
63+
4664
### September-2025 Build: 101.25072.0003 | Release version: 30.125072.0003.0
4765

4866
|Build: |**101.25072.0003** |
@@ -74,7 +92,6 @@ What's new
7492
- The `mdatp threat quarantine add` command now requires superuser (root) privileges.
7593
- Custom definition path can now be updated without stopping Defender for Endpoint. Previously, this required stopping the service, but with this release onwards, updates to the definition path can be made dynamically, improving operational efficiency and reducing downtime.
7694
- Running Defender for Endpoint on Linux alongside Fapolicyd is now supported on RHEL and Fedora-based distributions, enabling both antivirus (real-time protection) and EDR functionality to operate without conflict. For other fanotify-based tools, MDE can still be used safely by setting the antivirus enforcement level to passive, helping avoid system instability.
77-
- Both the binary and Python versions of Client Analyzer are now included in the local package. There is no longer a need to download it separately, as it comes bundled by default. You can find it at the location `/opt/microsoft/mdatp/conf/client_analyzer/`.
7895
- Other stability enhancements and bug fixes.
7996

8097
### July-2025 Build: 101.25052.0007 | Release version: 30.125052.0007.0

defender-endpoint/microsoft-defender-passive-mode.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@ Some of the key benefits of Defender Antivirus in passive mode are:
2626

2727
* **EDR Block mode** - Post-breach protection by detecting and remediating threats missed by the active antimalware solution
2828

29-
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.
30-
3129
* **Security intelligence updates** - Microsoft Defender Antivirus continues to receive updates to stay aware of the latest threats.
3230

3331
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.

defender-endpoint/respond-machine-alerts.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -103,19 +103,19 @@ Or, use this alternate procedure:
103103

104104
![Image of collect investigation package](media/collect-investigation-package.png)
105105

106-
2. Add comments and then select **Confirm**.
106+
1. Add comments and then select **Confirm**.
107107

108108
![Image of confirm comment](media/comments-confirm.png)
109109

110-
3. Select **Action center** from the response actions section of the device page.
110+
1. Select **Action center** from the response actions section of the device page.
111111

112112
![Image of action center](media/action-center-selected.png)
113113

114-
4. Select **Package collection package available** to download the collection package.
114+
1. Select **Package collection package available** to download the collection package.
115115

116116
![Image of download package](media/download-package.png)
117-
118-
> [!NOTE]
117+
118+
> [!NOTE]
119119
> The collection of the investigation package may fail if a device has a low battery level or is on a metered connection.
120120
121121
### Investigation package contents for Windows devices
@@ -216,7 +216,8 @@ Depending on the severity of the attack and the sensitivity of the device, you m
216216
- You can use the device isolation capability on all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](mde-linux-prerequisites.md). Ensure that the following prerequisites are enabled:
217217
- `iptables`
218218
- `ip6tables`
219-
- Linux kernel with `CONFIG_NETFILTER`, `CONFID_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER`
219+
- Linux kernel with `CONFIG_NETFILTER`, `CONFIG_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER` for kernel version lower than 5.x and `CONFIG_NETFILTER_XT_MATCH_OWNER` from 5.x kernel.
220+
220221
- Selective isolation is available for devices running on Windows 11, Windows 10 version 1703 or later, Windows Server 2012 R2 and later, Azure Stack HCI OS, version 23H2 and later, and macOS. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
221222
- When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
222223
- The feature supports VPN connection.

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ The following tables present the relevant vulnerability information organized by
3939
|---|---|---|
4040
| - | Added MDVM support for Zoom vulnerability- CVE-2025-49457 | 03-September-25 |
4141
| - | Added MDVM support for 8 Tableau Server vulnerabilities- CVE-2025-52446, CVE-2025-52447, CVE-2025-52448, CVE-2025-52449, CVE-2025-52452, CVE-2025-52453, CVE-2025-52454 and CVE-2025-52455 | 09-September-25 |
42+
| - | Defender Vulnerability Management has completely rolled back support for Microsoft Visual C++ | 18-September-25 |
4243

4344
## August 2025
4445

@@ -52,7 +53,6 @@ The following tables present the relevant vulnerability information organized by
5253
| 103856 | Fixed bad normalization in McAfee Network Security Manager | 05-August-25 |
5354
| 109441 | Fixed bad normalization in AlmaLinux Perl | 05-August-25 |
5455
| 97670 | Fixed inaccurate detections of VMware Tools by excluding invalid paths - "/vmware blast/", "/remote experience/" | 19-August-25 |
55-
| - | Added MDVM support for Microsoft Visual C++ vulnerabilities- CVE-2009-0901, CVE-2009-2493, CVE-2010-3190, CVE-2024-43590 | 20-August-25 |
5656
| 112007 | Fixed inaccuracy in Gimp vulnerability- CVE-2025-8672 | 21-August-25 |
5757
| 109858 | Fixed inaccuracy in Microsoft SQL Server Management Studio vulnerability- CVE-2025-29803 | 21-August-25 |
5858
| - | Updated CPE detection logic for Cisco Identity Services Engine | 26-August-25 |

0 commit comments

Comments
 (0)