Skip to content

Commit a3230d2

Browse files
authored
Merge branch 'main' into main
2 parents 3d0de88 + 5115527 commit a3230d2

5 files changed

+78
-41
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 26 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 05/22/2025
6+
ms.date: 06/13/2025
77
audience: ITPro
88
ms.topic: reference
99
author: emmwalshh
@@ -98,6 +98,29 @@ Updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### May-2025 (Platform: 4.18.25050.5 | Engine: 1.1.25050.6)
102+
103+
- Security intelligence update version: **1.431.19.0**
104+
- Release date:  **June 13, 2025 (Engine)** / **June 13, 2025 (Platform)**
105+
- Platform: **4.18.25050.5**
106+
- Engine: **1.1.25050.6**
107+
- Support phase: **Security and Critical Updates**
108+
109+
#### What's new
110+
111+
- Windows multisession SKUs are now properly classified as client SKUs for signature versioning
112+
- `EnableDynamicSignatureDroppedEventReporting` configuration is now available in Intune (see [Event ID 2011](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-2011))
113+
- The display name and description is now displayed correctly for the [device control](/defender-endpoint/device-control-overview) filter driver in Windows services
114+
- Improved performance for kernel driver
115+
- Improvements to [network protection](/defender-endpoint/network-protection#overview-of-network-protection) performance related to packet loss during high network utilization
116+
- Reliability improvements to network protection during service shutdown
117+
- Enriched [Event ID 1000](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) to include `ScanOnlyIfIdle` and scan priority
118+
- Improved device control Windows Portal Device (WPD) device discovery in File explorer. (For more information about device control, see [Device control policy samples and scenarios](/defender-endpoint/device-control-overview#device-control-policy-samples-and-scenarios).)
119+
- Resolved discrepancy in [device health reports](/defender-endpoint/device-health-reports) between signature publish and signature install date and time
120+
- Performance improvements when scanning files/folders with extended attributes
121+
- Reliability improvement in the Defender kernel driver to avoid crashing when there's excessive disk input/output
122+
- Added exponential backoff support to Core Service 1DS manager telemetry module to address memory consumption and DNS flooding issues
123+
101124
### April-2025 (Platform: 4.18.25040.2 | Engine: 1.1.25040.1)
102125

103126
- Security intelligence update version: **1.429.3.0**
@@ -112,7 +135,7 @@ Updates contain:
112135
- Fixed Microsoft Defender platform update timestamp to reflect the actual update time.
113136
- The [1002 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1002) (An anti-malware scan was stopped before it finished) now includes details of the stop reason.
114137
- Added more details to the [1000 event](/defender-endpoint/troubleshoot-microsoft-defender-antivirus#event-id-1000) (Scan started), like scan trigger and scan on idle.
115-
- Improved ASR file processing to correctly handle ["allow" Indicators of Compromise](/defender-endpoint/indicators-overview) (IoCs).
138+
- Improved attack surface reduction file processing to correctly handle ["allow" Indicators of Compromise](/defender-endpoint/indicators-overview) (IoCs).
116139
- Improvement in health reporting for machines that are rebooted or hibernated.
117140
- Improved performance for [Smart App Control](/windows/apps/develop/smart-app-control/overview) (SAC) trusted file handling.
118141
- Improved [device control](/defender-endpoint/device-control-overview) logic for offline printers.
@@ -136,25 +159,6 @@ Updates contain:
136159
- Improved performance when scanning UPX-packed files (Ultimate Packer for eXecutables) and updated the validation process to verify the integrity of the packed file itself.
137160
- Added support for distinguishing regular cloud allow signatures from clean [Indicators of Compromise](indicators-overview.md) (IoC) in [attack surface reduction](attack-surface-reduction.md) (ASR).
138161

139-
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
140-
141-
- Security intelligence update version: **1.425.1.0**
142-
- Release date: **March 12, 2025** (Engine) / **March 31, 2025** (Platform)
143-
- Platform: **4.18.25020.1009**
144-
- Engine: **1.1.25020.1007**
145-
- Support phase: **Security and Critical Updates**
146-
147-
#### What's new
148-
149-
- Fixed deadlock issue on [VDI](deployment-vdi-microsoft-defender-antivirus.md) that occurred when loading corrupted update files from UNC share.
150-
- Systems controlled by `SharedSignatureRoot` can be updated by running signature update commands.
151-
- If you're currently using a shared signature path to update VDI environments, you can now use signature update commands through [MpCmdRun](/defender-endpoint/command-line-arguments-microsoft-defender-antivirus), PowerShell, and the user interface to update to latest drops in your signature update shares.
152-
- Shared root signature setting updates are now applied without requiring a system restart. (If this setting is turned off and on multiple times, a system reboot is necessary.)
153-
- Improved logic for handling [restore from quarantine](/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus).
154-
- Fixed fallback issue with [Update-MpSignature](/powershell/module/defender/update-mpsignature).
155-
- Increased [device control policy](device-control-policies.md) limits.
156-
- Improved security resilience for Defender update process.
157-
158162
### Previous version updates: Technical upgrade support only
159163

160164
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
@@ -296,7 +300,7 @@ After a new package version is released, support for the previous two versions i
296300
|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) | You can schedule when protection updates should be downloaded. |
297301
|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md) | If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |
298302
|[Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md) | You can set protection updates to be downloaded at startup or after certain cloud-delivered protection events. |
299-
|[Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)| You can specify settings, such as whether updates should occur on battery power that 's especially useful for mobile devices and virtual machines. |
303+
|[Manage updates for mobile devices and virtual machines (VMs)](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)| You can specify settings, such as whether updates should occur on battery power that's especially useful for mobile devices and virtual machines. |
300304
| [Microsoft Defender for Endpoint update for EDR Sensor](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac) | You can update the EDR sensor (MsSense.exe) that's included in the new Microsoft Defender for Endpoint unified solution package released in 2021. |
301305

302306
> [!TIP]

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 05/21/2025
9+
ms.date: 06/10/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,25 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### February-2025 (Platform 4.18.25020.1009 | Engine: 1.1.25020.1007)
33+
34+
- Security intelligence update version: **1.425.1.0**
35+
- Release date: **March 12, 2025** (Engine) / **March 31, 2025** (Platform)
36+
- Platform: **4.18.25020.1009**
37+
- Engine: **1.1.25020.1007**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Fixed deadlock issue on [VDI](deployment-vdi-microsoft-defender-antivirus.md) that occurred when loading corrupted update files from UNC share.
43+
- Systems controlled by `SharedSignatureRoot` can be updated by running signature update commands.
44+
- If you're currently using a shared signature path to update VDI environments, you can now use signature update commands through [MpCmdRun](/defender-endpoint/command-line-arguments-microsoft-defender-antivirus), PowerShell, and the user interface to update to latest drops in your signature update shares.
45+
- Shared root signature setting updates are now applied without requiring a system restart. (If this setting is turned off and on multiple times, a system reboot is necessary.)
46+
- Improved logic for handling [restore from quarantine](/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus).
47+
- Fixed fallback issue with [Update-MpSignature](/powershell/module/defender/update-mpsignature).
48+
- Increased [device control policy](device-control-policies.md) limits.
49+
- Improved security resilience for Defender update process.
50+
3251
### January-2025 (Platform: 4.18.25010.11 | Engine: 1.1.25010.7)
3352

3453
- Security intelligence update version: **1.423.21.0**

defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.reviewer: yongrhee
88
ms.service: defender-endpoint
99
ms.topic: troubleshooting
10-
ms.date: 02/04/2025
10+
ms.date: 06/10/2025
1111
ms.localizationpriority: medium
1212
ms.custom: nextgen
1313
manager: deniseb
@@ -1136,14 +1136,14 @@ sections:
11361136
11371137
Change to default behavior: Change to dynamic signature event reporting default behavior.
11381138
1139-
When a dynamic signature is received by MDE, a 2010 event is reported. However, when the dynamic signature expires or is manually deleted a 2011 event is reported. In some cases, when a new signature is delivered to MDE sometimes hundreds of dynamic signatures expire at the same time; therefore hundreds of 2011 events are reported. The generation of so many 2011 events can cause a Security information and event management (SIEM) server to become flooded.
1139+
When a dynamic signature is received by Defender for Endpoint, a 2010 event is reported. However, when the dynamic signature expires or is manually deleted, a 2011 event is reported. In some cases, when a new signature is delivered to Defender for Endpoint, sometimes hundreds of dynamic signatures expire at the same time, resulting in hundreds of 2011 events reported. The generation of so many 2011 events can cause a Security Information and Event Management (SIEM) server to become flooded.
11401140
1141-
To avoid the previously described situation - starting with platform version 4.18.2207.7 - by default, Defender for Endpoint doesn't report 2011 events:
1141+
To avoid this situtation, beginning with [platform version 4.18.2207.7](/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support#august-2022-platform-41822077--engine-11196003), by default, Defender for Endpoint doesn't report 2011 events. Keep the following points in mind:
11421142
1143-
- This new default behavior is controlled by registry entry: `HKLM\SOFTWARE\Microsoft\Windows Defender\Reporting\EnableDynamicSignatureDroppedEventReporting`.
1144-
- The default value for `EnableDynamicSignatureDroppedEventReporting` is **false**, which means 2011 *events aren't reported*. If it's set to true, 2011 *events are reported*.
1143+
- This new default behavior is controlled by the following registry entry: `HKLM\SOFTWARE\Microsoft\Windows Defender\Reporting\EnableDynamicSignatureDroppedEventReporting`
1144+
- The default value for `EnableDynamicSignatureDroppedEventReporting` is `false`, which means 2011 events aren't reported. If it's set to `true`, 2011 events are reported.
11451145
1146-
Because 2010 signature events are timely distributed sporadically - and won't cause a spike - 2010 signature event behavior is unchanged.
1146+
Because 2010 signature events are timely distributed sporadically, this configuration doesn't cause a spike, and the 2010 signature event behavior is unchanged.
11471147
11481148
Description: Microsoft Defender Antivirus used Dynamic Signature Service to discard obsolete signatures.
11491149

defender-office-365/submissions-result-definitions.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: Admins and end-users can learn about the results of submitting entities to Microsoft for analysis.
1818
ms.service: defender-office-365
19-
ms.date: 07/26/2024
19+
ms.date: 06/13/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -37,12 +37,28 @@ When admins or users submit items to Microsoft for analysis, we do the following
3737
[Learn more how submissions are processed behind-the-scenes to generate the result](https://techcommunity.microsoft.com/blog/microsoftdefenderforoffice365blog/how-your-submissions-to-defender-for-office-365-are-processed-behind-the-scenes/4231551).
3838

3939
> [!NOTE]
40-
> In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can submit items to Microsoft for analysis, but the items are analyzed for email authentication and policy hits only. Payload reputation, detonation, and grader analysis aren't done for compliance reasons (data isn't allowed to leave the organization boundary).
40+
>
41+
> - In U.S. Government organizations (Microsoft 365 GCC, GCC High, and DoD), admins can submit items to Microsoft for analysis, but the items are analyzed for email authentication and policy hits only. Payload reputation, detonation, and grader analysis aren't done for compliance reasons (data isn't allowed to leave the organization boundary).
42+
> - AI-powered Submissions Response capability introduces generative AI explanations for email submissions to Microsoft. These explanations aim to provide enterprise admins with clear, detailed, human-readable explanations for why messages were classified. Currently, this feature is scoped to email submissions only, and AI-generated explanations aren't used for the following types of submissions:
43+
> - Files
44+
> - URLs
45+
> - Microsoft Teams messages
46+
> - User submissions
47+
>
48+
> AI-generated explanations are available for the following verdicts:
49+
>
50+
> - Spam
51+
> - Bulk
52+
> - Threats found
53+
> - No threats found
54+
> - Unknown
55+
>
56+
> If the AI-generated explanation is unavailable, the system falls back to the existing explanation as described in the following table.
4157
4258
The following table describes the results of submissions to Microsoft:
4359

4460
- **Status** indicates whether the previously described checks have been completed.
45-
- **Result** indicates the details that were generated during the analysis using the previously described checks
61+
- **Result** indicates the details that were generated during the analysis using the previously described checks.
4662

4763
|Status|Result|Description|
4864
|---|---|---|

defender-office-365/user-tags-about.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 06/09/2025
8+
ms.date: 06/13/2025
99
audience: ITPro
1010
ms.topic: how-to
1111
ms.localizationpriority: medium
@@ -31,14 +31,12 @@ _User tags_ are identifiers for specific groups of users in [Microsoft Defender
3131
- **System tags**: Currently, [Priority account](/microsoft-365/admin/setup/priority-accounts) is the only type of system tag.
3232
- **Custom tags**: You create these types of tags.
3333

34-
If your organization has Defender for Office 365 (included in your subscription or as an add-on), you can create custom user tags in addition to using the Priority account tag.
34+
If your organization has Defender for Office 365 (included in your subscription or as an add-on), you can create custom user tags in addition to using the Priority account tag:
3535

36-
> [!NOTE]
37-
> Currently, you can only apply user tags to mailbox users.
38-
>
39-
> Your organization can tag a maximum of 250 users using the Priority account system tag.
40-
>
41-
> Each custom tag has a maximum of 999 users per tag and your organization can create up to 500 custom tags.
36+
- You can assign the Priority account tag to a maximum of 250 users.
37+
- You can create a maximum of 500 custom user tags.
38+
- You can assign a custom tag to a maximum of 10000 individual users.
39+
- If you assign a custom user tag to a group, the tag is applied to the first 999 group members (users).
4240

4341
This article explains how to configure user tags in the Microsoft Defender portal. You can also apply or remove the Priority account tag using the _VIP_ parameter on the [Set-User](/powershell/module/exchange/set-user) cmdlet in [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). No PowerShell cmdlets are available to manage custom user tags.
4442

@@ -83,7 +81,7 @@ To see how user tags are part of the strategy to help protect high-impact user a
8381

8482
- Select :::image type="icon" source="media/m365-cc-sc-create-icon.png" border="false"::: **Add members**. In the **Add members** flyout that opens, do any of the following steps to add individual users or groups in the **Search users and groups to add** box:
8583
- Click in the box and scroll through the list to select a user or group.
86-
- Click in the box, start typing a name to filter the list, and then select the value below the box. select a user or group.
84+
- Or, start typing a name to filter the list, and then select the value below the box.
8785

8886
To add more members, click in an empty area in the box and repeat the previous step.
8987

0 commit comments

Comments
 (0)