Skip to content

Commit a932fc3

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into automatic-windows-auditing
2 parents a005597 + 17f758e commit a932fc3

File tree

114 files changed

+914
-635
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

114 files changed

+914
-635
lines changed

defender-business/mdb-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ This article lists new features in the latest releases of Microsoft Defender for
5252

5353
- **Streaming API (preview) is now available for Defender for Business**. For partners or customers looking to build their own security operations center, the Defender for Endpoint streaming API is now in preview for Defender for Business. The API supports streaming of device file, registry, network, sign-in events and more to Azure Event Hub, Azure Storage, and Microsoft Sentinel to support advanced hunting and attack detection. See [Use the streaming API (preview) with Microsoft Defender for Business](mdb-streaming-api.md).
5454

55-
- **Managed detection and response integration with Blackpoint Cyber**. This solution is ideal for customers who don't have the resources to invest in an in-house security operations center and for partners who want to augment their IT team with security experts to investigate, triage, and remediate the alerts generated by Defender for Business. [Learn more bout Blackpoint Cyber](https://aka.ms/BlackpointMSFT).
55+
- **Managed detection and response integration with Blackpoint Cyber**. This solution is ideal for customers who don't have the resources to invest in an in-house security operations center and for partners who want to augment their IT team with security experts to investigate, triage, and remediate the alerts generated by Defender for Business. [Learn more about Blackpoint Cyber](https://aka.ms/BlackpointMSFT).
5656

5757
- **Customizable security baselines and configuration drift reports in Microsoft 365 Lighthouse**. For Microsoft Managed Service Providers (MSPs), Microsoft 365 Lighthouse includes security baselines to deploy a standardized set of configurations to customers' tenants. Microsoft 365 Lighthouse now lets MSPs customize baselines based on expertise and tailor them to customers' unique needs. [Learn more about Microsoft 365 Lighthouse](/microsoft-365/lighthouse/m365-lighthouse-overview).
5858

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -345,6 +345,10 @@ Example:
345345
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
346346
> The rule ID shouldn't have any leading or trailing spaces.
347347
348+
> [!NOTE]
349+
> Microsoft rebranded Windows Defender Antivirus to Microsoft Defender Antivirus beginning with Windows 10 version 20H1.
350+
> Group Policy paths on earlier Windows versions may still reference Windows Defender Antivirus, while newer builds show Microsoft Defender Antivirus. Both names refer to the same policy location.
351+
348352
### PowerShell
349353

350354
> [!WARNING]
-4.86 KB
Binary file not shown.
-851 Bytes
Binary file not shown.

defender-endpoint/time-settings.md

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Microsoft Defender XDR time zone settings
3-
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings and view license information.
3+
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: article
1414
ms.subservice: reference
1515
search.appverid: met150
16-
ms.date: 05/05/2025
16+
ms.date: 11/30/2025
1717
appliesto:
1818
- Microsoft Defender for Endpoint Plan 1
1919
- Microsoft Defender for Endpoint Plan 2
@@ -22,9 +22,7 @@ appliesto:
2222
# Microsoft Defender XDR time zone settings
2323

2424

25-
This article describes time zone settings and options. You can use **Time zone** menu to configure the time zone and view license information.
26-
27-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-1" lightbox="media/atp-time-zone.png":::
25+
This article describes how to configure time zone settings and options.
2826

2927
> [!NOTE]
3028
> Changing the time zone setting in the [Microsoft Defender portal](https://security.microsoft.com) only affects how times are displayed. It doesn't affect the actual scheduling of operations, such as antivirus scans, which continue to follow the local system time or UTC settings, depending on how they're configured.
@@ -33,10 +31,6 @@ This article describes time zone settings and options. You can use **Time zone**
3331

3432
The aspect of time is important in the assessment and analysis of perceived and actual cyberattacks. Cyberforensic investigations often rely on time stamps to piece together the sequence of events. It's important that your system reflects the correct time zone settings. Defender for Endpoint can display either Coordinated Universal Time (UTC) or local time.
3533

36-
Your current time zone setting is shown in the **Timezone** menu in the Microsoft Defender portal.
37-
38-
:::image type="content" source="media/atp-time-zone-menu.png" alt-text="The Time zone settings-2" lightbox="media/atp-time-zone-menu.png":::
39-
4034
### UTC time zone
4135

4236
Defender for Endpoint uses UTC time by default. Keeping this time zone displays all system timestamps (alerts, events, and others) in UTC for all users. This configuration can help security analysts working in different locations across the globe to use the same time stamps while investigating events.
@@ -55,13 +49,9 @@ The Defender for Endpoint time zone is set by default to UTC. Setting the time z
5549

5650
To set the time zone:
5751

58-
1. Select the **Time zone** menu.
59-
60-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-3" lightbox="media/atp-time-zone.png":::
61-
62-
2. Select the **Timezone UTC** indicator.
52+
1. In the Microsoft Defender portal, go to **System** > **Settings** > **Microsoft Defender portal** > **Time zone**.
6353

64-
3. Select **Timezone UTC** or your local time zone, for example `-7:00`.
54+
1. In the **Time zone** drop down menu, select either UTC or your local time zone.
6555

6656
### Regional settings
6757

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,17 @@ Learn more:
2929
- [What's new in Microsoft Defender for Endpoint on other operating systems and services](#whats-new-in-defender-for-endpoint-on-other-operating-systems-and-services)
3030
- [Preview features](/defender-xdr/preview)
3131

32+
## December 2025
33+
34+
|Feature |Preview/GA |Description |
35+
|---------|------------|-------------|
36+
|[Triage collection](/azure/sentinel/datalake/sentinel-mcp-triage-tool) |Preview |Use triage collection to prioritize incidents and hunt threats with the Sentinel Model Context Protocol (MCP) server.|
37+
3238
## November 2025
3339

3440
|Feature |Preview/GA |Description |
3541
|---------|------------|-------------|
36-
|New predictive shielding response actions. |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
42+
|New predictive shielding response actions |Preview |Defender for Endpoint now includes the [GPO hardening](respond-machine-alerts.md#gpo-hardening) and [Safeboot hardening](respond-machine-alerts.md#safeboot-hardening) response actions. These actions are part of the [predictive shielding](/defender-xdr/shield-predict-threats) feature, which anticipates and mitigates potential threats before they materialize.|
3743
|[Custom data collection](custom-data-collection.md) |Preview |Custom data collection enables organizations to expand and customize telemetry collection beyond default configurations to support specialized threat hunting and security monitoring needs. |
3844
| Defender deployment tool<br/>- [for Windows devices](./defender-deployment-tool-windows.md)<br/>- [for Linux devices](./linux-install-with-defender-deployment-tool.md) | Preview | The new Defender deployment tool is a lightweight, self-updating application that streamlines onboarding devices to the Defender endpoint security solution. The tool takes care of prerequisites, automates migrations from older solutions, and removes the need for complex onboarding scripts, separate downloads, and manual installations. It currently supports Windows and Linux devices. |
3945
| [Defender endpoint security solution for Windows 7 SP1 and Windows Server 2008 R2 SP1](./onboard-downlevel.md#use-the-defender-deployment-tool-to-deploy-defender-endpoint-security) | Preview | A Defender for endpoint security solution is now available for legacy Windows 7 SP1 and Windows Server 2008 R2 SP1 devices. The solution provides advanced protection capabilities and improved functionality for these devices compared to other solutions. The new solution is available using the new [Defender deployment tool](./defender-deployment-tool-windows.md). |

defender-for-cloud-apps/protect-salesforce.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,13 @@ Connecting Salesforce to Defender for Cloud Apps gives you improved insights int
2626
- Ransomware
2727
- Unmanaged bring your own device (BYOD)
2828

29+
30+
### Prerequisites
31+
32+
- Install and authorize the Salesforce Connected App in the target Salesforce org before you start the connection process. Salesforce enforces usage restrictions on Connected Apps. For more information, see:[Prepare for Connected App Usage Restrictions Change](https://help.salesforce.com/s/articleView?id=005132365&type=1)
33+
34+
- Assign the **Approve Uninstalled Connected Apps** permission to the Salesforce service account used to connect Microsoft Defender for Cloud Apps. Salesforce requires this permission to connect third-party apps via OAuth.
35+
2936
## How Defender for Cloud Apps helps to protect your environment
3037

3138
- [Detect cloud threats, compromised accounts, and malicious insiders](best-practices.md#detect-cloud-threats-compromised-accounts-malicious-insiders-and-ransomware)

defender-office-365/outbound-spam-policies-configure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,8 @@ You can configure outbound spam policies in the Microsoft Defender portal or in
8787

8888
You can use a condition only once, but the condition can contain multiple values:
8989

90-
- Multiple **values** of the **same condition** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
91-
- Different **types of conditions** use AND logic. The recipient must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
90+
- Multiple **values** of the **same condition** use OR logic (for example, _\<sender1\>_ or _\<sender2\>_). If the recipient matches **any** of the specified values, the policy is applied to them.
91+
- Different **types of conditions** use AND logic. The sender must match **all** of the specified conditions for the policy to apply to them. For example, you configure a condition with the following values:
9292
- Users: `[email protected]`
9393
- Groups: Executives
9494

@@ -98,8 +98,8 @@ You can configure outbound spam policies in the Microsoft Defender portal or in
9898

9999
You can use an exception only once, but the exception can contain multiple values:
100100

101-
- Multiple **values** of the **same exception** use OR logic (for example, _\<recipient1\>_ or _\<recipient2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
102-
- Different **types of exceptions** use OR logic (for example, _\<recipient1\>_ or _\<member of group1\>_ or _\<member of domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
101+
- Multiple **values** of the **same exception** use OR logic (for example, _\<sender1\>_ or _\<sender2\>_). If the recipient matches **any** of the specified values, the policy isn't applied to them.
102+
- Different **types of exceptions** use OR logic (for example, _\<sender1\>_ or _\<member of group1\>_ or _\<sender domain1\>_). If the recipient matches **any** of the specified exception values, the policy isn't applied to them.
103103

104104
When you're finished on the **Users, groups, and domains**, select **Next**.
105105

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 38 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Compare Microsoft Defender Vulnerability Management plans and capabilities
33
description: Compare Defender Vulnerability Management Offerings. Learn about the differences between the plans and select the plan that suits your organization's needs.
44
search.appverid: MET150
5-
author: denisebmsft
6-
ms.author: deniseb
7-
manager: deniseb
5+
author: limwainstein
6+
ms.author: lwainstein
7+
manager: bagol
88
audience: ITPro
99
ms.topic: overview
1010
ms.service: defender-vuln-mgmt
@@ -14,6 +14,11 @@ ms.collection:
1414
- m365-security
1515
- Tier1
1616
ms.date: 02/28/2025
17+
appliesto:
18+
- Microsoft Defender Vulnerability Management
19+
- Microsoft Defender for Endpoint Plan 2
20+
- Microsoft Defender XDR
21+
- Microsoft Defender for Servers Plan 1 & 2
1722
---
1823

1924
# Compare Microsoft Defender Vulnerability Management plans and capabilities
@@ -50,22 +55,22 @@ The following table summarizes the availability of Defender Vulnerability Manage
5055

5156
|Capability| Defender for Endpoint Plan 2 includes the following core Defender Vulnerability Management capabilities| Defender Vulnerability Management Add-on provides the following premium Vulnerability Management capabilities for Defender for Endpoint Plan 2 | Defender Vulnerability Management Standalone provides full Defender Vulnerability Management capabilities for any EDR solution |
5257
|:----|:----:|:----:|:----:|
53-
|[Device discovery](/defender-endpoint/device-discovery)|✔|-|✔|
54-
|[Device inventory](/defender-endpoint/machines-view-overview)|✔|-|✔|
55-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|-|✔|
56-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|-|✔|
57-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|-|✔|
58-
|[Remediation tracking](tvm-remediation.md)|✔|-|✔|
59-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|-|✔|
60-
|[Software inventory](tvm-software-inventory.md)|✔|-|✔|
61-
|[Software usages insights](tvm-usage-insights.md)|✔|-|✔|
62-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|✔|
63-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|✔ **see note**|
64-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|✔|
65-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|✔|
66-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|✔|
67-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|✔|
68-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔|✔|
58+
|[Device discovery](/defender-endpoint/device-discovery)|Supported|-|Supported|
59+
|[Device inventory](/defender-endpoint/machines-view-overview)|Supported|-|Supported|
60+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|-|Supported|
61+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|-|Supported|
62+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|-|Supported|
63+
|[Remediation tracking](tvm-remediation.md)|Supported|-|Supported|
64+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|-|Supported|
65+
|[Software inventory](tvm-software-inventory.md)|Supported|-|Supported|
66+
|[Software usages insights](tvm-usage-insights.md)|Supported|-|Supported|
67+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|Supported|
68+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|Supported **see note**|
69+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|Supported|
70+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|Supported|
71+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|Supported|
72+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|Supported|
73+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported|Supported|
6974

7075
> [!NOTE]
7176
> If you're using the standalone version of Defender Vulnerability Management, to use the "block vulnerable applications" feature, Microsoft Defender Antivirus must be configured in active mode. For more information, see [Microsoft Defender Antivirus Windows](/defender-endpoint/microsoft-defender-antivirus-windows#comparing-active-mode-passive-mode-and-disabled-mode).
@@ -87,20 +92,20 @@ The following table lists the availability of Defender Vulnerability Management
8792

8893
|Capability|Defender For Servers Plan 1|Defender For Servers Plan 2|
8994
|:----|:----:|:----:|
90-
|[Vulnerability assessment](tvm-weaknesses.md)|✔|✔|
91-
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|✔|✔|
92-
|[Risk based prioritization](tvm-security-recommendation.md)|✔|✔|
93-
|[Remediation tracking](tvm-remediation.md)|✔|✔|
94-
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|✔|✔|
95-
|[Software inventory](tvm-software-inventory.md)|✔|✔|
96-
|[Software usages insights](tvm-usage-insights.md)|✔|✔|
97-
|[Security baselines assessment](tvm-security-baselines.md)|-|✔|
98-
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|✔|
99-
|[Browser extensions assessment](tvm-browser-extensions.md)|-|✔|
100-
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|✔|
101-
|[Network share analysis](tvm-network-share-assessment.md)|-|✔|
102-
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|✔|
103-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|✔**see note**|
95+
|[Vulnerability assessment](tvm-weaknesses.md)|Supported|Supported|
96+
|[Configuration assessment](tvm-microsoft-secure-score-devices.md)|Supported|Supported|
97+
|[Risk based prioritization](tvm-security-recommendation.md)|Supported|Supported|
98+
|[Remediation tracking](tvm-remediation.md)|Supported|Supported|
99+
|[Continuous monitoring](/defender-endpoint/configure-vulnerability-email-notifications)|Supported|Supported|
100+
|[Software inventory](tvm-software-inventory.md)|Supported|Supported|
101+
|[Software usages insights](tvm-usage-insights.md)|Supported|Supported|
102+
|[Security baselines assessment](tvm-security-baselines.md)|-|Supported|
103+
|[Block vulnerable applications](tvm-block-vuln-apps.md)|-|Supported|
104+
|[Browser extensions assessment](tvm-browser-extensions.md)|-|Supported|
105+
|[Digital certificate assessment](tvm-certificate-inventory.md)|-|Supported|
106+
|[Network share analysis](tvm-network-share-assessment.md)|-|Supported|
107+
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-|Supported|
108+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|Supported**see note**|
104109

105110
> [!NOTE]
106111
> The Windows authenticated scan feature will be deprecated by the end of November 2025 and won't be supported beyond that date. For more information about this change, see the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,17 +4,22 @@ description: Find answers to frequently asked questions (FAQs) about Microsoft D
44
ms.service: defender-vuln-mgmt
55
f1.keywords:
66
- NOCSH
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: lwainstein
8+
author: limwainstein
99
ms.localizationpriority: medium
10-
manager: deniseb
10+
manager: bagol
1111
audience: ITPro
1212
ms.collection:
1313
- m365-security
1414
- Tier1
1515
ms.topic: faq
1616
search.appverid: met150
1717
ms.date: 05/02/2025
18+
appliesto:
19+
- Microsoft Defender Vulnerability Management
20+
- Microsoft Defender for Endpoint Plan 2
21+
- Microsoft Defender XDR
22+
- Microsoft Defender for Servers Plan 1 & 2
1823
---
1924

2025
# Microsoft Defender Vulnerability Management frequently asked questions

0 commit comments

Comments
 (0)