Skip to content

Commit 9906481

Browse files
committed
Merge branch 'main' into chrisda
2 parents 371e50e + 3f96e6b commit 9906481

File tree

155 files changed

+1394
-918
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

155 files changed

+1394
-918
lines changed

defender-business/mdb-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ This article lists new features in the latest releases of Microsoft Defender for
5252

5353
- **Streaming API (preview) is now available for Defender for Business**. For partners or customers looking to build their own security operations center, the Defender for Endpoint streaming API is now in preview for Defender for Business. The API supports streaming of device file, registry, network, sign-in events and more to Azure Event Hub, Azure Storage, and Microsoft Sentinel to support advanced hunting and attack detection. See [Use the streaming API (preview) with Microsoft Defender for Business](mdb-streaming-api.md).
5454

55-
- **Managed detection and response integration with Blackpoint Cyber**. This solution is ideal for customers who don't have the resources to invest in an in-house security operations center and for partners who want to augment their IT team with security experts to investigate, triage, and remediate the alerts generated by Defender for Business. [Learn more bout Blackpoint Cyber](https://aka.ms/BlackpointMSFT).
55+
- **Managed detection and response integration with Blackpoint Cyber**. This solution is ideal for customers who don't have the resources to invest in an in-house security operations center and for partners who want to augment their IT team with security experts to investigate, triage, and remediate the alerts generated by Defender for Business. [Learn more about Blackpoint Cyber](https://aka.ms/BlackpointMSFT).
5656

5757
- **Customizable security baselines and configuration drift reports in Microsoft 365 Lighthouse**. For Microsoft Managed Service Providers (MSPs), Microsoft 365 Lighthouse includes security baselines to deploy a standardized set of configurations to customers' tenants. Microsoft 365 Lighthouse now lets MSPs customize baselines based on expertise and tailor them to customers' unique needs. [Learn more about Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-overview).
5858

defender-endpoint/api/run-live-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Runs a sequence of live response commands on a device
6969

7070
- 25 concurrently running sessions (requests exceeding the throttling limit receives a "429 - Too many requests" response).
7171

72-
- If the machine isn't available, the session is queued for up to three days.
72+
- If the machine isn't available, the session is queued for up to 2 hours.
7373

7474
- RunScript command time-outs after 10 minutes.
7575

defender-endpoint/autoir-investigation-results.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,22 +20,18 @@ ms.custom:
2020
- autoir
2121
- admindeeplinkDEFENDER
2222
ms.reviewer: evaldm, isco
23-
ms.date: 04/04/2025
23+
ms.date: 11/30/2025
2424
appliesto:
2525
- Microsoft Defender for Endpoint Plan 2
2626

2727
---
2828
# View the details and results of an automated investigation
2929

30-
3130
With Microsoft Defender for Endpoint, when an [automated investigation](automated-investigations.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the necessary permissions, you can view those details in an investigation details view. The investigation details view provides you with up-to-date status and the ability to approve any pending actions.
3231

33-
## (NEW!) Unified investigation page
34-
35-
The investigation page is updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about).
32+
## Unified investigation page
3633

37-
> [!TIP]
38-
> To learn more about what's changing, see [(NEW!) Unified investigation page](/microsoft-365/security/mtp/mtp-autoir-results).
34+
The unified investigation page includes information across your devices, email, and collaboration content. It defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). For more information, see [Details and results of an automated investigation](/defender-xdr/m365d-autoir-results).
3935

4036
## Open the investigation details view
4137

@@ -69,9 +65,7 @@ Use an incident details page to view detailed information about an incident, inc
6965

7066
## Investigation details
7167

72-
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. The investigation details view resembles the following image:
73-
74-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
68+
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. In the investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
7569

7670
> [!NOTE]
7771
> - The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription doesn't include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.

defender-endpoint/configure-endpoints-gp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
3636

3737
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
3838

39-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
39+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
4040

4141
1. Select the operating system.
4242

@@ -179,7 +179,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
179179
180180
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
181181

182-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
182+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Offboarding**.
183183

184184
1. Select the operating system.
185185

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -345,6 +345,10 @@ Example:
345345
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
346346
> The rule ID shouldn't have any leading or trailing spaces.
347347
348+
> [!NOTE]
349+
> Microsoft rebranded Windows Defender Antivirus to Microsoft Defender Antivirus beginning with Windows 10 version 20H1.
350+
> Group Policy paths on earlier Windows versions may still reference Windows Defender Antivirus, while newer builds show Microsoft Defender Antivirus. Both names refer to the same policy location.
351+
348352
### PowerShell
349353

350354
> [!WARNING]

defender-endpoint/linux-install-with-defender-deployment-tool.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -95,21 +95,21 @@ The Defender deployment tool enforces the following set of prerequisites checks,
9595

9696
:::image type="content" source="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png" alt-text="Screenshot showing the help command output." lightbox="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png":::
9797

98-
The following table provides examples of commands for useful scenarios.
99-
100-
| **Scenario** | **Command** |
101-
|:-------------|:------------|
102-
| Check for unmet non-blocking prerequisites | `sudo ./defender_deployment_tool.sh --pre-req-non-blocking` |
103-
| Run the connectivity test | `sudo ./defender_deployment_tool.sh --connectivity-test` |
104-
| Deploy to a custom location | `sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/` |
105-
| Deploy from the insider-slow channel | `sudo ./defender_deployment_tool.sh --channel insiders-slow` |
106-
| Deploy using a proxy | `sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>` |
107-
| Deploy a specific agent version | `sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod` |
108-
| Upgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004` |
109-
| Downgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004` |
110-
| Uninstall Defender | `sudo ./defender_deployment_tool.sh --remove` |
111-
| Only onboard if Defender is already installed | `sudo ./defender_deployment_tool.sh --only-onboard` |
112-
| Offboard Defender | `sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)* |
98+
The following table provides examples of commands for useful scenarios.
99+
100+
| **Scenario** | **Command** |
101+
|:-------------|:------------|
102+
| Check for unmet non-blocking prerequisites | `sudo ./defender_deployment_tool.sh --pre-req-non-blocking` |
103+
| Run the connectivity test | `sudo ./defender_deployment_tool.sh --connectivity-test` |
104+
| Deploy to a custom location | `sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/` |
105+
| Deploy from the insider-slow channel | `sudo ./defender_deployment_tool.sh --channel insiders-slow` |
106+
| Deploy using a proxy | `sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>` |
107+
| Deploy a specific agent version | `sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod` |
108+
| Upgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004` |
109+
| Downgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004` |
110+
| Uninstall Defender | `sudo ./defender_deployment_tool.sh --remove` |
111+
| Only onboard if Defender is already installed | `sudo ./defender_deployment_tool.sh --only-onboard` |
112+
| Offboard Defender | `sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)* |
113113

114114
## Verify deployment status
115115

@@ -204,11 +204,11 @@ Defender for Endpoint on Linux can be deployed from one of the following channel
204204
- insiders-slow
205205
- prod (production)
206206

207-
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices in insiders-fast are the first to receive updates and new features, followed later by insiders-slow and lastly by prod.
207+
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices in insiders-fast are the first to receive updates and new features, followed later by insiders-slow and lastly by prod.
208208

209209
By default, the deployment tool configures your device to use the prod channel. You can use the configuration options described in this document to deploy from a different channel.
210210

211-
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either insiders-fast or insiders-slow. If you've already deployed Defender for Endpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustrated in the following example, where the channel is changed from insiders-fast to prod:
211+
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either insiders-fast or insiders-slow. If you've already deployed Defender for Endpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustrated in the following example, where the channel is changed from insiders-fast to prod:
212212

213213
1. Remove the insiders-fast channel version of Defender for Endpoint on Linux..
214214

@@ -225,7 +225,7 @@ To preview new features and provide early feedback, it's recommended that you co
225225
1. Install Microsoft Defender for Endpoint on Linux using the production channel.
226226

227227
```bash
228-
sudo ./defender_deployment_tool.sh --install --channel prod
228+
sudo ./defender_deployment_tool.sh --channel prod
229229
```
230230

231231
## Related content

defender-endpoint/mac-whatsnew.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
5959

6060
## Releases for Defender for Endpoint on macOS
6161

62+
6263
### Offline updates for security intelligence updates on macOS is now in public preview
6364

6465
This feature enables organizations to configure offline updates for security intelligence updates (also referred to as definition updates or signatures) on macOS using a local mirror server. For more information, see [Configure offline security intelligence updates for Microsoft Defender for Endpoint on macOS (preview)](./mac-support-offline-security-intelligence-update.md).
@@ -67,6 +68,19 @@ This feature enables organizations to configure offline updates for security int
6768

6869
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
6970

71+
### Nov-2025 (Build: 101.25102.0016 | Release version: 20.125102.16.0)
72+
73+
| Build: | **101.25102.0016** |
74+
|--------------------|-----------------------|
75+
| Release version: | **20.125102.16.0** |
76+
| Engine version: | **1.1.25090.2000** |
77+
| Signature version: | **1.435.600.0** |
78+
79+
##### What's new
80+
81+
- Bug and performance fixes
82+
83+
7084
### Oct-2025 (Build: 101.25082.0006 | Release version: 20.125082.6.0)
7185

7286
| Build: | **101.25082.0006** |
-4.86 KB
Binary file not shown.
-851 Bytes
Binary file not shown.

defender-endpoint/onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If you're onboarding devices in the Microsoft Defender portal, follow these step
3737

3838
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
3939

40-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
4141

4242
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
4343

0 commit comments

Comments
 (0)