Skip to content

Commit a42738c

Browse files
Merge pull request #2654 from MicrosoftDocs/main
Publish main to live, 02/04/25, 3:30 PM PT
2 parents 04a71ba + d0eaf10 commit a42738c

File tree

3 files changed

+21
-69
lines changed

3 files changed

+21
-69
lines changed

defender-endpoint/troubleshoot-microsoft-defender-antivirus.yml

Lines changed: 1 addition & 66 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ metadata:
77
ms.reviewer: yongrhee
88
ms.service: defender-endpoint
99
ms.topic: troubleshooting
10-
ms.date: 02/16/2024
10+
ms.date: 02/04/2025
1111
ms.localizationpriority: medium
1212
ms.custom: nextgen
1313
manager: deniseb
@@ -103,71 +103,6 @@ sections:
103103
104104
- Scan Time: The duration of a scan.
105105
106-
- question: Event ID 1003
107-
answer: |
108-
109-
Symbolic name: `MALWAREPROTECTION_SCAN_PAUSED`
110-
111-
Message: An antimalware scan was paused.
112-
113-
Description:
114-
115-
- Scan ID: ID number of the relevant scan.
116-
117-
- Scan Type: Scan type. Examples: Antivirus, Antispyware, or Antimalware
118-
119-
- Scan Parameters: Scan parameters. Examples: Full scan, Quick scan, or Customer scan
120-
121-
- User: Domain\User
122-
123-
- question: Event ID 1004
124-
answer: |
125-
126-
Symbolic name: `MALWAREPROTECTION_SCAN_RESUMED`
127-
128-
Message: An antimalware scan was resumed.
129-
130-
Description:
131-
132-
- Scan ID: ID number of the relevant scan.
133-
134-
- Scan Type: Scan type. Examples: Antivirus, Antispyware, or Antimalware
135-
136-
- Scan Parameters: Scan parameters. Examples: Full scan, Quick scan, or Customer scan
137-
138-
- User: Domain\User
139-
140-
- question: Event ID 1005
141-
answer: |
142-
143-
Symbolic name: `MALWAREPROTECTION_SCAN_FAILED`
144-
145-
Message: An antimalware scan failed.
146-
147-
Description:
148-
149-
- Scan ID: ID number of the relevant scan.
150-
151-
- Scan Type: Scan type. Examples: Antivirus, Antispyware, or Antimalware
152-
153-
- Scan Parameters: Scan parameters. Examples: Full scan, Quick scan, or Custom scan
154-
155-
- User: Domain\User
156-
157-
- Error Code: Error code. Result code associated with threat status. Standard HRESULT values.
158-
159-
- Error Description: Error description. Description of the error.
160-
161-
User action:
162-
163-
The antivirus client encountered an error, and the current scan stopped. The scan might fail due to a client-side issue. This event record includes the scan ID, type of scan (Microsoft Defender Antivirus, antispyware, antimalware), scan parameters, the user that started the scan, the error code, and a description of the error. To troubleshoot this event:
164-
165-
- Run the scan again.
166-
167-
- If it fails in the same way, go to the [Microsoft Support site](https://support.microsoft.com/), enter the error number in the Search box to look for the error code.
168-
169-
- Contact [Microsoft Technical Support](/microsoft-365/admin/get-help-support).
170-
171106
- question: Event ID 1006
172107
answer: |
173108

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.custom:
1919
- seo-marvel-apr2020
2020
description: Admins can learn how to use Attack simulation training to run simulated phishing and password attacks in their Microsoft 365 E5 or Microsoft Defender for Office 365 Plan 2 organizations.
2121
ms.service: defender-office-365
22-
ms.date: 12/04/2024
22+
ms.date: 02/04/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2525
---
@@ -54,12 +54,27 @@ Watch this short video to learn more about Attack simulation training.
5454
- **Global Administrator**¹
5555
- **Security Administrator**
5656
- **Attack Simulation Administrators**²: Create and manage all aspects of attack simulation campaigns.
57-
- **Attack Payload Author**²: Create attack payloads that an admin can initiate later.
57+
- **Attack Payload Author**²: Create attack payloads that an admin can initiate later.
58+
- **Security Operator and Security Reader**³: View all aspects of attack simulation campaigns.
5859

5960
> [!IMPORTANT]
6061
> ¹ Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
6162
>
6263
> ² Adding users to this role group in [Email & collaboration permissions in the Microsoft Defender portal](mdo-portal-permissions.md) is currently unsupported.
64+
>
65+
> Members of Attack Payload Author have the following limitations in attack simulation training:
66+
>
67+
> - They can't create or edit simulations, training campaigns, simulation automations, or payload automations.
68+
> - They can't change global settings.
69+
> - They can't change content (for example, notifications), but they can change payloads.
70+
> - They can't view tenant simulation reports, aggregate reports, simulation automation records, or payload automation records.
71+
>
72+
> ³ Members of Security Operator and Security Reader have the following limitations in attack simulation training:
73+
>
74+
> - They can't create or edit simulations, training campaigns, simulation automations, or payload automations.
75+
> - They can't change global settings.
76+
> - They can't change content (for example, tenant payloads or notifications).
77+
> - They can access data through read APIs with user scope, but they can't use write APIs.
6378
6479
Currently, [Microsoft Defender XDR Unified role based access control (RBAC)](/defender-xdr/manage-rbac) isn't supported.
6580

defender-office-365/submissions-outlook-report-messages.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
description: Learn how to report phishing and suspicious emails in supported versions of Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
1515
ms.service: defender-office-365
1616
search.appverid: met150
17-
ms.date: 01/30/2025
17+
ms.date: 02/04/2025
1818
appliesto:
1919
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -44,6 +44,8 @@ Admins configure user reported messages to go to a specified reporting mailbox,
4444
- Outlook for Microsoft 365:
4545
- **Current channel**: Version 16.0.17827.15010 or later.
4646
- **Monthly Enterprise Channel**: Version 16.0.18025.20000 or later.
47+
- **Semi-Annual Channel (Preview)**: Release 2502, build 16.0.18526.20024 or later.
48+
- **Semi-Annual Channel**: Release 2502, build 16.0.18526.20024 or later.
4749
- Outlook for Mac version 16.89 (24090815) or later.
4850
- Outlook for iOS and Android version 4.2446 or later.
4951
- The new Outlook for Windows.

0 commit comments

Comments
 (0)