Skip to content

Commit 8f6f752

Browse files
authored
Merge branch 'public' into patch-1
2 parents 35f2b48 + 89cf75f commit 8f6f752

12 files changed

+109
-17
lines changed

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -235,15 +235,16 @@ To configure domain object auditing:
235235

236236
Now, all relevant changes to directory services appear as 4662 events when they're triggered.
237237

238-
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types:
238+
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types <sup>1</sup>
239239
- **Descendant Group Objects**
240240
- **Descendant Computer Objects**
241241
- **Descendant msDS-GroupManagedServiceAccount Objects**
242242
- **Descendant msDS-ManagedServiceAccount Objects**
243-
- **Descendant msDS-DelegatedManagedServiceAccount Objects**
243+
- **Descendant msDS-DelegatedManagedServiceAccount Objects** <sup>2</sup>
244244

245245
> [!NOTE]
246-
> Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
246+
> 1. Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
247+
> 2. The **msDS-DelegatedManagedServiceAccount** class is relevant only for domains running at least one Windows Server 2025 domain controller.
247248
248249
## Configure auditing on AD FS
249250

ATPDocs/identity-inventory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Sort option applies to Display name, Domain, and Created time columns.
110110

111111
- **Critical Active Directory service accounts** card helps you quickly identify all Active Directory accounts designated as critical, making it easier to focus on identities most at risk.
112112

113-
At the top of each device inventory tab, the following device counts are available:
113+
At the top of the page, the following identities counts are available:
114114

115115
- __Total__: The total number of identities.
116116

@@ -120,7 +120,7 @@ At the top of each device inventory tab, the following device counts are availab
120120

121121
- **Services:** The number of all service accounts both on-premises and cloud.
122122

123-
You can use this information to help you prioritize devices for security posture improvements.
123+
You can use this information to help you prioritize identities for security posture improvements.
124124

125125
### Navigate to the Identity inventory page
126126

ATPDocs/ops-guide/ops-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article summarizes the Microsoft Defender for Identity activities we recomm
1313

1414
|Cadence |Tasks |
1515
|---------|---------|
16-
|**Daily** | - [Triage incidents by priority](ops-guide-daily.md#triage-incidents-by-priority) <br> - [Investigate users with a high investigation score](ops-guide-daily.md#investigate-users-with-a-high-investigation-score) <br>- [Configure tuning rules for benign true positives / false positive alerts](ops-guide-daily.md#configure-tuning-rules-for-benign-true-positives--false-positive-alerts)<br> - [Review the ITDR dashboard](ops-guide-daily.md#review-the-itdr-dashboard) <br>- [Proactively hunt](ops-guide-daily.md#proactively-hunt) <br> - [Review Defender for Identity health issues](ops-guide-daily.md#review-defender-for-identity-health-issues) |
16+
|**Daily** | - [Triage incidents by priority](ops-guide-daily.md#triage-incidents-by-priority) <br>- [Configure tuning rules for benign true positives / false positive alerts](ops-guide-daily.md#configure-tuning-rules-for-benign-true-positives--false-positive-alerts)<br> - [Review the ITDR dashboard](ops-guide-daily.md#review-the-itdr-dashboard) <br>- [Proactively hunt](ops-guide-daily.md#proactively-hunt) <br> - [Review Defender for Identity health issues](ops-guide-daily.md#review-defender-for-identity-health-issues) |
1717
|**Weekly** |- [Review Secure score recommendations](ops-guide-weekly.md#review-secure-score-recommendations) <br> - [Review and respond to emerging threats](ops-guide-weekly.md#review-and-respond-to-emerging-threats) <br>- [Proactively hunt](ops-guide-weekly.md#proactively-hunt) |
1818
|**Monthly** | - [Review tuned alerts and adjust tuning if needed](ops-guide-monthly.md#review-tuned-alerts-and-adjust-tuning-if-needed) <br> - [Track new changes in Microsoft Defender XDR and Defender for Identity](ops-guide-monthly.md#track-new-changes-in-microsoft-defender-xdr-and-defender-for-identity) |
1919
| **Quarterly / Ad hoc** <br>Depending on your organization's needs and processes | - [Review Microsoft service health](ops-guide-quarterly.md#review-microsoft-service-health) <br> - [Review server setup process to include sensors](ops-guide-quarterly.md#review-server-setup-process-to-include-sensors) <br>- [Check domain configuration via PowerShell](ops-guide-quarterly.md#check-domain-configuration-via-powershell) |

CloudAppSecurityDocs/governance-actions.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,7 @@ The following governance actions can be taken for connected apps either on a spe
8383

8484
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint)
8585

86-
> [!NOTE]
87-
> These actions are restricted to users with specific administrative roles. If the options described are not visible or accessible, please confirm with your system administrator that your account has one of the following roles assigned:
86+
These actions are restricted to users with specific administrative roles. If the options described are not visible or accessible, please confirm with your system administrator that your account has one of the following roles assigned:
8887
- Security Operator
8988
- Security administrator
9089
- Global administrator

defender-endpoint/linux-whatsnew.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 06/06/2025
9+
ms.date: 06/30/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,19 +43,20 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46-
### June-2025 Build: 101.25042.0002 | Release version: 30.125042.0002.0
46+
### June-2025 Build: 101.25042.0003 | Release version: 30.125042.0003.0
4747

48-
|Build: |**101.25042.0002** |
48+
|Build: |**101.25042.0003** |
4949
|-------------------|----------------------|
50-
|Released: |**June 4, 2025** |
51-
|Published: |**June 4, 2025** |
52-
|Release version: |**30.125042.0002.0** |
50+
|Released: |**June 30, 2025** |
51+
|Published: |**June 30, 2025** |
52+
|Release version: |**30.125042.0003.0** |
5353
|Engine version: |**1.1.25020.4000** |
5454
|Signature version: |**1.427.370.0** |
5555

5656
What's new
57-
58-
- Removed external dependency of uuid-runtime from MDE package
57+
- The Defender for Endpoint package rollout into production happens gradually. From the time the release notes are published, it might take up to a week for the package to be pushed to all production machines.
58+
- Removed external dependency of uuid-runtime from the Defender for Endpoint package
59+
- Other stability improvements and bug fixes
5960

6061
### May-2025 Build: 101.25032.0010 | Release version: 30.125032.0010.0
6162

defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Each source has typical scenarios that depend on how your network is configured,
8181
|---|---|
8282
|Windows Server Update Service|You're using Windows Server Update Service to manage updates for your network.|
8383
|Microsoft Update|You want your endpoints to connect directly to Microsoft Update. This option is useful for endpoints that irregularly connect to your enterprise network, or if you don't use Windows Server Update Service to manage your updates.|
84-
|File share|You have devices that aren't connected to the Internet (such as virtual machines, or VMs). You can use your Internet-connected VM host to download the updates to a network share, from which the VMs can obtain the updates. See the [VDI deployment guide](deployment-vdi-microsoft-defender-antivirus.md) for how file shares are used in virtual desktop infrastructure (VDI) environments.|
84+
|UNC Share|You have devices that aren't connected to the Internet (such as virtual machines, or VMs). You can use your Internet-connected VM host to download the updates to a network share, from which the VMs can obtain the updates. See the [VDI deployment guide](deployment-vdi-microsoft-defender-antivirus.md) for how file shares are used in virtual desktop infrastructure (VDI) environments. Platform updates can also be deployed using this method. |
8585
|Microsoft Endpoint Configuration Manager|You're using Microsoft Endpoint Configuration Manager to update your endpoints.|
8686
|Security intelligence updates and platform updates for Microsoft Defender Antivirus and other Microsoft anti-malware (formerly referred to as MMPC)|[Make sure devices are updated to support SHA-2](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus). Microsoft Defender Antivirus Security intelligence and platform updates are delivered through Windows Update. As of October 21, 2019, security intelligence updates and platform updates are SHA-2 signed exclusively. <br/>Download the latest protection updates because of a recent infection or to help provision a strong, base image for [VDI deployment](deployment-vdi-microsoft-defender-antivirus.md). This option should be used only as a final fallback source, and not the primary source. It's only to be used if updates can't be downloaded from Windows Server Update Service or Microsoft Update for [a specified number of days](manage-outdated-endpoints-microsoft-defender-antivirus.md#set-the-number-of-days-before-protection-is-reported-as-out-of-date).|
8787

@@ -274,6 +274,32 @@ On a Windows File Server set up a network file share (UNC/mapped drive) to downl
274274
> [!NOTE]
275275
> Do not add the x64 (or x86) folder in the path. The `mpcmdrun.exe` process adds it automatically.
276276
277+
## Enable platform updates using UNC share
278+
279+
To enable platform updates using UNC share, download KB4052623 and copy it into the architecture folders as `updateplatform.exe`. These files are updated monthly and need to get manually updated by you.
280+
281+
KB4052623 is available for the following architectures:
282+
283+
* [x86](https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&arch=x86)
284+
285+
* [amd64](https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&arch=x64)
286+
287+
* [arm64](https://go.microsoft.com/fwlink/?LinkID=851034&clcid=0x409&arch=arm64)
288+
289+
**Example structure**
290+
291+
```dos
292+
[UNC Share]\
293+
x86\
294+
mpam-fe.exe
295+
mpam-d.exe
296+
updateplatform.exe
297+
x64\
298+
mpam-fe.exe
299+
mpam-d.exe
300+
updateplatform.exe
301+
```
302+
277303
## Related articles
278304

279305
- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ You can manage the distribution of updates through one of the following methods:
7171
- [Windows Server Update Service (WSUS)](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus)
7272
- [Microsoft Configuration Manager](/configmgr/sum/understand/software-updates-introduction)
7373
- The usual methods you use to deploy Microsoft and Windows updates to endpoints in your network.
74+
- UNC Share
7475

7576
For more information, see [Manage the sources for Microsoft Defender Antivirus protection updates](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus).
7677

unified-secops-platform/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,9 @@
104104
href: mto-advanced-hunting.md
105105
- name: Multitenant devices
106106
href: mto-tenant-devices.md
107+
- name: Multitenant identities
108+
href: multitenant-identities-inventory.md
109+
displayName: MTO
107110
- name: Vulnerability management
108111
href: mto-dashboard.md
109112
- name: Manage tenants
112 KB
Loading
22.5 KB
Loading

0 commit comments

Comments
 (0)