Skip to content

Commit a108963

Browse files
authored
Merge branch 'main' into poliveria-entraid-10072025
2 parents 03113bd + 2e445a9 commit a108963

File tree

57 files changed

+575
-119
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

57 files changed

+575
-119
lines changed

defender-endpoint/android-configure.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -110,11 +110,12 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
110110
> [!IMPORTANT]
111111
> Starting May 19, 2025, alerts are no longer generated in the Microsoft Defender portal for mobile devices connecting or disconnecting to an open wireless network and for downloading/installing/deleting self-signed certificates. Instead, these activities are now generated as events and are viewable in the device timeline.
112112
> Here are key changes about this new experience:
113-
> - For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on Android available on mid-May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.
114-
> - When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.
115-
> - Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including trusted networks, are sent to the device timeline as events.
116-
> - Users allow-listed certificates: After the update, downloading/installing/deleting self-signed certificates events, including user-trusted certificates, are sent to the device timeline as events.
117-
> - The previous experience of generating alerts for these activities still continue to apply to GCC tenants.
113+
- For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on Android available on mid-May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.
114+
- When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.
115+
- Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including trusted networks, are sent to the device timeline as events.
116+
- Users allow-listed certificates: After the update, downloading/installing/deleting self-signed certificates events, including user-trusted certificates, are sent to the device timeline as events.
117+
- The previous experience of generating alerts for these activities still continue to apply to GCC tenants.
118+
118119

119120
## Privacy Controls
120121

@@ -127,6 +128,20 @@ Following privacy controls are available for configuring the data that is sent b
127128
|Vulnerability assessment of apps |By default only information about apps installed in the work profile is sent for vulnerability assessment. Admins can disable privacy to include personal apps|
128129
|Network Protection | Admins can enable or disable privacy in network protection. If enabled, then Defender won't send network details.|
129130

131+
## Root Detection (Preview)
132+
133+
Microsoft Defender for Endpoint has the capability of detecting unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, these events occur:
134+
135+
- A high-risk alert is reported to the Microsoft Defender portal. If device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
136+
137+
- User data on app is cleared. When user opens the app after rooted.
138+
139+
The feature is enabled by default; no action is required from admin or user. Any android device running Defender version **1.0.8125.0302** (or later) will have it activated.
140+
141+
**Prerequisite**
142+
143+
- Company portal must be installed, and version must be >=5.0.6621.0
144+
130145
### Configure privacy alert report
131146

132147
Admins can now enable privacy control for the phishing report, malware report, and network report sent by Microsoft Defender for Endpoint on Android. This configuration ensures that the domain name, app details, and network details, respectively, aren't sent as part of the alert whenever a corresponding threat is detected.

defender-endpoint/android-whatsnew.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,20 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
2929

3030
### Releases for Defender for Endpoint on Android
3131

32+
#### October 2025
33+
34+
| Build| 1.0.8201.0101|
35+
| -------- | -------- |
36+
| Release Date | October 2, 2025 |
37+
38+
**What's New**
39+
40+
- Improved UX experience for the onboarding screens, for more details please visit this link - [UX Enhancement](/defender-endpoint/android-new-ux)
41+
42+
- Global Secure Access Kerberos SSO support on Android (GA): Kerberos SSO experience for users on Android devices with Global Secure Access is now supported. User will need to install and configure a 3rd party SSO client.
43+
44+
- Performance Improvement and bug fixes.
45+
3246
#### September 2025
3347

3448
| Build|1.0.8102.0101|

defender-endpoint/ios-whatsnew.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,18 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
3030

3131
## Releases for Defender for Endpoint on iOS
3232

33+
#### October 2025
34+
35+
| Build | 1.1.69250104|
36+
| -------- | -------- |
37+
| Release Date | October 7, 2025 |
38+
39+
**What's New**
40+
41+
- Global Secure Access Kerberos SSO support on iOS (Preview): Kerberos SSO experience for users on iOS devices with Global Secure Access is now supported.  On iOS, to create and deploy profile, refer - [Single sign-on app extension](/intune/intune-service/configuration/ios-device-features-settings).
42+
43+
- Performance Improvement and Bug fixes.
44+
3345
#### September 2025
3446

3547
| Build| 1.1.68200103 |

defender-endpoint/linux-preferences.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
---
1+
---
22
title: Configure security settings in Microsoft Defender for Endpoint on Linux
33
ms.reviewer: gopkr, ardeshmukh
44
description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
@@ -581,10 +581,8 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
581581
582582
### Exclusion setting preferences
583583

584-
**Exclusion setting preferences are currently in preview**.
585-
586584
> [!NOTE]
587-
> Global exclusions are currently in public preview, and are available in Defender for Endpoint beginning with version `101.23092.0012` or later in the Insiders Slow and Production rings.
585+
> Global exclusions are available in Defender for Endpoint beginning with version `101.24092.0001` or above.
588586
589587
The `exclusionSettings` section of the configuration profile is used to configure various exclusions for Microsoft Defender for Endpoint for Linux.
590588

defender-for-cloud-apps/governance-discovery.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,24 @@
11
---
22
title: Govern discovered apps
33
description: This article describes the procedure for governing your discovered apps by blocking their usage in your organization.
4-
ms.date: 01/29/2023
4+
ms.date: 09/30/2025
55
ms.topic: how-to
66
ms.reviewer: Mravela
77
---
88

99
# Govern discovered apps
1010

1111

12-
1312
After you review the list of discovered apps in your environment, you can secure your environment by approving safe apps (**Sanctioned**) or prohibiting unwanted apps (**Unsanctioned**) in the following ways.
1413

14+
## Prerequisites
15+
16+
Before you can block discovered cloud apps, you must meet the following requirements:
17+
18+
- [Turn on **Cloud Protection** in Microsoft Defender for Endpoint](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus)
19+
- [Turn on **Network Protection** in Microsoft Defender for Endpoint.](/defender-endpoint/network-protection#required-browser-configuration)
20+
- Install the **Microsoft Defender Browser Protection** add-on across all non-Microsoft browsers in your organization.
21+
1522
## Sanctioning/unsanctioning an app
1623

1724
You can mark a specific risky app as unsanctioned by clicking the three dots at the end of the row. Then select **Unsanctioned**. Unsanctioning an app doesn't block use, but enables you to more easily monitor its use with the cloud discovery filters. You can then notify users of the unsanctioned app and suggest an alternative safe app for their use, or [generate a block script using the Defender for Cloud Apps APIs](api-discovery-script.md) to block all unsanctioned apps.

defender-for-cloud-apps/troubleshooting-proxy-end-users.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,14 @@ This message only appears for Chrome users, as Microsoft Edge users benefit from
217217
218218
If you receive a message like this, contact Microsoft’s support to address it with the relevant browser vendor.
219219
220+
## Users encounter Entra ID Login after clicking mcas.ms links
221+
Attackers can craft URLs that appear to lead to trusted domains but actually redirect users to malicious sites. For users protected by the session/suffix-based solution, an attacker might attempt to bypass controls by appending the mcas.ms suffix to a malicious URL, exploiting the assumption that such URLs are safe.
222+
223+
To mitigate this, Microsoft Defender for Cloud Apps redirects any mcas.ms URL lacking valid session context to Entra ID for authentication, effectively blocking such exploits.
224+
225+
However, legitimate mcas.ms URLs without context can exist, for example, if a user clicks on an old browser bookmark. In such cases, the user will first be redirected to Entra ID. If their identity provider (IdP) is not Entra ID, they will need to manually remove the mcas.ms suffix to proceed.
226+
227+
220228
## More considerations for troubleshooting apps
221229
222230
When troubleshooting apps, there are some more things to consider:

defender-for-identity/deploy/prerequisites-sensor-version-3.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,13 +70,13 @@ Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability o
7070
**Steps to apply the configuration:**
7171

7272
1. In the **Microsoft Defender portal**, navigate to: **System > Settings > Microsoft Defender XDR > Asset Rule Management**.
73-
1. Create a new rule.
73+
1. Select **Create a new rule**
7474

7575
![Screenshot that shows how to add a new rule.](media/prerequisites-sensor-version-3/new-rule.png)
7676

7777
3. In the side panel:
7878

79-
1. Select a **name** for the rule.
79+
1. Enter a **Rule name** and **Description**.
8080

8181
1. Set **rule conditions** using `Device name`, `Domain`, or `Device tag` to target the desired machines.
8282

@@ -88,9 +88,15 @@ Applying the **Unified Sensor RPC Audit** tag enables a new, tested capability o
8888

8989
![Screenshot that shows the config tag.](media/prerequisites-sensor-version-3/tag.png)
9090

91-
5. Click **Submit** to save the rule.
91+
5. Select **Next** to review and finish creating the rule and then select **Submit**.
9292

93-
Offboarding a device from this configuration can be done by **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
93+
### Updating rules
94+
Offboarding a device from this configuration can be done **only** from **deleting the asset rule** or **modifying the rule conditions** so the device no longer matches.
95+
96+
>[!NOTE]
97+
> It may take up to 1 hour for changes to be reflected in the portal.
98+
99+
Learn more about Asset Management Rule [here](/defender-xdr/configure-asset-rules)
94100

95101
## Configure Windows auditing
96102

defender-for-identity/remove-rbcd-microsoft-entra-seamless-single-sign-on-account.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,6 @@ ms.author: rlitinsky
66
ms.service: microsoft-defender-for-identity
77
ms.topic: article
88
ms.date: 08/22/2024
9-
ms.subservice: ''
109
ms.reviewer: LiorShapiraa
1110
---
1211

defender-office-365/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@
4040
href: trial-user-guide-defender-for-office-365.md
4141

4242
- name: Deploy
43-
items:
43+
items:
4444
- name: Pilot and deploy Defender for Office 365
4545
href: /defender-xdr/pilot-deploy-defender-office-365?toc=/defender-office-365/TOC.json&bc=/defender-office-365/breadcrumb/toc.json
4646
- name: Get started with Microsoft Defender for Office 365
@@ -120,6 +120,8 @@
120120
href: mdo-sec-ops-guide.md
121121
- name: SecOps guide for Teams protection in Defender for Office 365
122122
href: mdo-support-teams-sec-ops-guide.md
123+
- name: SecOps guide for email authentication in Microsoft 365
124+
href: email-auth-sec-ops-guide.md
123125
- name: Threat classification
124126
href: mdo-threat-classification.md
125127
- name: Security recommendations for priority accounts

defender-office-365/air-auto-remediation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ After you select the cluster types to automatically remediate, the selected reme
4848
4949
Use the following steps to select the cluster types to automatically remediate:
5050

51-
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **MDO automation settings**.
51+
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Settings** \> **Email & collaboration** \> **MDO automation settings**. Or, to go directly to the **Automation settings** page, use <https://security.microsoft.com/securitysettings/mdoAutomationSettings>.
5252

5353
The following settings are available on the **Automation settings** page:
5454

0 commit comments

Comments
 (0)