Skip to content

Commit 8e96c6c

Browse files
committed
Merge branch 'main' into EOP-chrisda
2 parents 71f96c6 + b577f9c commit 8e96c6c

14 files changed

+80
-40
lines changed

CloudAppSecurityDocs/activity-filters.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ Microsoft Defender for Cloud Apps gives you visibility into all the activities f
1515
>
1616
> Microsoft Defender for Cloud Apps displays these activity names and types exactly as received and doesn't define or modify them. To understand the meaning of an activity, refer to the relevant third‑party API documentation.
1717
18+
The action types for events and activities are determined by the source service, whether it is a first-party or third-party service. Microsoft Defender for Cloud Apps (MDA) supports a wide range of action types and is not restricted to specific ones.
1819
For a full list of Microsoft 365 activities monitored by Defender for Cloud Apps, see [Search the audit log in the Microsoft Purview portal](/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance#audited-activities).
1920

2021

CloudAppSecurityDocs/get-started.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Get started | Microsoft Defender for Cloud Apps
33
description: This quickstart outlines the process for getting Defender for Cloud Apps up and running so you have cloud app use, insight, and control.
4-
ms.date: 11/28/2024
4+
ms.date: 07/24/2025
55
ms.topic: quickstart
66
---
77

@@ -29,6 +29,7 @@ Microsoft Defender for Cloud Apps depends on the following Microsoft Entra ID ap
2929
- Microsoft Defender for Cloud Apps - Customer Experience (ID: 9ba4f733-be8f-4112-9c4a-e3b417c44e7d)
3030
- Microsoft Defender for Cloud Apps - Information Protection (ID: ac6dbf5e-1087-4434-beb2-0ebf7bd1b883)
3131
- Microsoft Defender for Cloud Apps - MIP Server (ID: 0858ddce-8fca-4479-929b-4504feeed95e)
32+
- Microsoft Defender for Cloud Apps - Data Loss Prevention - SPO (ID: 71559765-2fa9-4207-b59f-a8bd85269d4a)
3233

3334
## Access Defender for Cloud Apps
3435

defender-endpoint/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1166,7 +1166,7 @@
11661166
- name: Microsoft Defender for Endpoint API license and terms
11671167
href: /legal/microsoft-365/api-terms-of-use
11681168
- name: Access the Microsoft Defender for Endpoint APIs
1169-
href: /defender-vulnerability-management/tvm-supported-os
1169+
href: /defender-endpoint/api/apis-intro
11701170
- name: Hello World
11711171
href: api/api-hello-world.md
11721172
- name: Get access with application context

defender-endpoint/linux-whatsnew.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,12 +43,26 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### July-2025 Build: 101.25052.0007 | Release version: 30.125052.0007.0
47+
48+
|Build: |**101.25052.0007** |
49+
|-------------------|----------------------|
50+
|Released: |**July 22, 2025** |
51+
|Published: |**July 22, 2025** |
52+
|Release version: |**30.125052.0007.0** |
53+
|Engine version: |**1.1.25020.4000** |
54+
|Signature version: |**1.427.370.0** |
55+
56+
What's new
57+
- Fixed issue to generate unique Machine identifiers to ensure each onboarded device is uniquely identified.
58+
- Other stability improvements and bug fixes.
59+
4660
### June-2025 Build: 101.25042.0003 | Release version: 30.125042.0003.0
4761

4862
|Build: |**101.25042.0003** |
4963
|-------------------|----------------------|
50-
|Released: |**June 30, 2025** |
51-
|Published: |**June 30, 2025** |
64+
|Released: |**June 30, 2025** |
65+
|Published: |**June 30, 2025** |
5266
|Release version: |**30.125042.0003.0** |
5367
|Engine version: |**1.1.25020.4000** |
5468
|Signature version: |**1.427.370.0** |

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 15 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 06/23/2025
6+
ms.date: 07/23/2025
77
audience: ITPro
88
ms.topic: reference
99
author: emmwalshh
@@ -99,6 +99,20 @@ Updates contain:
9999
- Serviceability improvements
100100
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
101101

102+
### June-2025 (Platform: 4.18.25060.7 | Engine: 1.1.25060.6)
103+
104+
- Security intelligence update version: **1.433.2.0**
105+
- Release date: **July 22, 2025 (Engine)** / **July 22, 2025 (Platform)**
106+
- Platform: **4.18.25060.7**
107+
- Engine: **1.1.25060.6**
108+
- Support phase: **Security and Critical Updates**
109+
110+
#### What's new
111+
112+
- Added filtering to improve scan stability and prevent engine crashes
113+
- Additional performance improvements to prevent concurrent scans. This change ensures that if a quick or full scan is already running, no additional quick or full scan scans are initiated from `MpCmdRun` or Powershell (`Start-Scan`).
114+
- Resolved the issue where subfolder exclusions were not being honored in Microsoft Defender Antivirus scans related to non-Microsoft SIEM solutions. This fix ensures that specified subfolders are now correctly excluded from scans, preventing unnecessary detections and improving overall system performance.
115+
102116
### May-2025 (Platform: 4.18.25050.5 | Engine: 1.1.25050.6)
103117

104118
- Security intelligence update version: **1.431.19.0**
@@ -141,25 +155,6 @@ Updates contain:
141155
- Improved performance for [Smart App Control](/windows/apps/develop/smart-app-control/overview) (SAC) trusted file handling.
142156
- Improved [device control](/defender-endpoint/device-control-overview) logic for offline printers.
143157

144-
### March-2025 (Platform: 4.18.25030.2 | Engine 1.1.25030.1)
145-
146-
- Security intelligence update version: **1.427.3.0**
147-
- Release date: **April 1, 2025** (Engine) / **April 9, 2025** (Platform)
148-
- Platform: **4.18.25030.2**
149-
- Engine: **1.1.25030.1**
150-
- Support phase: **Security and Critical Updates**
151-
152-
#### What's new
153-
154-
- Improved caching of [device control settings](device-control-policies.md) to improve reliability in occasionally connected environments.
155-
- Performance improvement in on-access scans of files in network locations.
156-
- Fixed the Defender service description to match the latest installed version.
157-
- Improved Defender engine update logic when the update is included in a custom image.
158-
- Fix in health reporting where signature update data might have been incorrect.
159-
- Fixed reporting issue with [controlled folder access](controlled-folders.md) (CFA) protected folders using the PowerShell cmdlet [Get-MpPreference](/powershell/module/defender/get-mppreference) when CFA is disabled.
160-
- Improved performance when scanning UPX-packed files (Ultimate Packer for eXecutables) and updated the validation process to verify the integrity of the packed file itself.
161-
- Added support for distinguishing regular cloud allow signatures from clean [Indicators of Compromise](indicators-overview.md) (IoC) in [attack surface reduction](attack-surface-reduction.md) (ASR).
162-
163158
### Previous version updates: Technical upgrade support only
164159

165160
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 06/23/2025
9+
ms.date: 07/23/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,26 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### March-2025 (Platform: 4.18.25030.2 | Engine 1.1.25030.1)
33+
34+
- Security intelligence update version: **1.427.3.0**
35+
- Release date: **April 1, 2025** (Engine) / **April 9, 2025** (Platform)
36+
- Platform: **4.18.25030.2**
37+
- Engine: **1.1.25030.1**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Improved caching of [device control settings](device-control-policies.md) to improve reliability in occasionally connected environments.
43+
- Performance improvement in on-access scans of files in network locations.
44+
- Fixed the Defender service description to match the latest installed version.
45+
- Improved Defender engine update logic when the update is included in a custom image.
46+
- Fix in health reporting where signature update data might have been incorrect.
47+
- Fixed reporting issue with [controlled folder access](controlled-folders.md) (CFA) protected folders using the PowerShell cmdlet [Get-MpPreference](/powershell/module/defender/get-mppreference) when CFA is disabled.
48+
- Improved performance when scanning UPX-packed files (Ultimate Packer for eXecutables) and updated the validation process to verify the integrity of the packed file itself.
49+
- Added support for distinguishing regular cloud allow signatures from clean [Indicators of Compromise](indicators-overview.md) (IoC) in [attack surface reduction](attack-surface-reduction.md) (ASR).
50+
51+
3252
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
3353

3454
- Security intelligence update version: **1.425.1.0**

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 7/1/2025
11+
ms.date: 7/25/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,6 +39,10 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42+
## July 2025
43+
44+
- Users can report external and intra-org [Microsoft Teams messages](submissions-teams.md) from chats, standard and private channels, meeting conversations to Microsoft, the specified reporting mailbox, or both via [user reported settings](submissions-user-reported-messages-custom-mailbox.md).
45+
4246
## June 2025
4347

4448
- Defender for Office 365 is now able to detect and classify mail bombing attacks. Mail bombing is a distributed denial of service (DDoS) attack that typically subscribes recipients to a large number of legitimate newsletters and services. The resulting volume of incoming email within minutes intends to overwhelm the recipient's mailbox and email security systems, and acts as a precursor to malware, ransomware, or data exfiltration.

defender-office-365/email-authentication-spf-configure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 04/15/2025
8+
ms.date: 07/24/2025
99
audience: ITPro
1010
ms.topic: how-to
1111

@@ -111,10 +111,10 @@ v=spf1 ip4:192.168.0.10 ip4:192.168.0.12 include:spf.protection.outlook.com -all
111111
112112
- `~all` (soft fail): Sources not specified in the SPF TXT record _probably_ aren't authorized to send mail for the domain, so the messages should be accepted but marked. What actually happens to the message depends on the destination email system. For example, the message might be quarantined as spam, delivered to the Junk Email folder, or delivered to the Inbox with an identifier added to the Subject or message body.
113113

114-
Because we also recommend DKIM and DMARC for Microsoft 365 domains, the differences between `-all` (hard fail) and `~all` (soft fail) are effectively eliminated (DMARC treats either result as an SPF failure). DMARC uses SPF to confirm the domains in the MAIL FROM and From addresses align _and_ the message came from a valid source for the From domain.
114+
> [!NOTE]
115+
> DMARC treats `-all` (hard fail) and `~all` (soft fail) as SPF failures. But the DMARC policy is effectively ignored for SPF `~all` failures if the messages don't also contain DKIM signatures. We recommend `-all` so DMARC can act on messages that fail SPF if the messages also lack DKIM signatures.
115116
116-
> [!TIP]
117-
> `?all` (neutral) is also available to suggest no specific action on messages from unidentified sources. This value is used for testing, and we don't recommend this value in production environments.
117+
- `?all` (neutral): Suggests no specific action on messages from unidentified sources. This value is used for testing, and we don't recommend this value in production environments.
118118

119119
Important points to remember:
120120

defender-office-365/mdo-support-teams-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: Admins can learn about Microsoft Teams features in Microsoft Defender for Office 365 Plan 2.
1818
ms.service: defender-office-365
19-
ms.date: 04/03/2025
19+
ms.date: 07/24/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
---
@@ -34,7 +34,7 @@ With the increased use of collaboration tools like Microsoft Teams, the possibil
3434

3535
In Microsoft 365 E5 and Defender for Office 365 Plan 2, we've extended Teams protection with a set of capabilities that are designed to disrupt the attack chain:
3636

37-
- **Report suspicious Teams messages**: Users can report malicious Teams messages. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md) and [MC 1037768](https://admin.cloud.microsoft/?ref=MessageCenter/:/messages/MC1037768).
37+
- **Report suspicious Teams messages**: Users can report malicious Teams messages. Depending on the reported message settings in the organization, the reported messages go to the specified reporting mailbox, to Microsoft, or both. For more information, see [User reported settings in Teams](submissions-teams.md).
3838

3939
- **Zero-hour auto protection (ZAP) for Teams**: ZAP is an existing email protection feature that detects and neutralizes spam, phishing, and malware messages after delivery by moving the messages to the Junk Email folder or quarantine.
4040

-87.5 KB
Loading

0 commit comments

Comments
 (0)