Skip to content

Commit ae33b6b

Browse files
committed
Merge branch 'main' into chrisda
2 parents c79b45a + 23c5361 commit ae33b6b

25 files changed

+541
-141
lines changed

defender-endpoint/android-whatsnew.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,29 +15,40 @@ ms.collection:
1515
ms.topic: reference
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 11/06/2025
18+
ms.date: 11/17/2025
1919
appliesto:
2020
- Microsoft Defender for Endpoint
2121

2222
---
2323

2424
# What's new in Microsoft Defender for Endpoint on Android
2525

26-
2726
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
2827

2928
### Releases for Defender for Endpoint on Android
3029

3130
#### November 2025
3231

32+
| Build| 1.0.8315.0101|
33+
| -------- | -------- |
34+
| Release Date | November 17, 2025 |
35+
36+
**What's New**
37+
38+
- Performance improvement and accessibility bug fixes
39+
40+
#### November 2025
41+
3342
| Build| 1.0.8303.0101|
3443
| -------- | -------- |
3544
| Release Date |November 4, 2025|
3645

3746
**What's New**
3847

3948
- An improved user feedback experience: See [Key changes - November 2025](./android-new-ux.md#key-changes---november-2025) for details.
40-
49+
50+
- Added landscape mode UI support for the Defender app.
51+
4152
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
4253

4354
#### October 2025

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,12 @@ The following procedures for enabling attack surface reduction rules include ins
168168

169169
1. Select **Next** on the three configuration panes, then select **Create** if you're creating a new policy or **Save** if you're editing an existing policy.
170170

171+
> [!NOTE]
172+
> In the latest Intune interface, **Configuration profiles** is located under **Devices > Configuration profiles**.
173+
> Earlier versions of Intune showed this under **Device configuration > Profiles**.
174+
> If you don't see "Configuration Profile" as written in older instructions, look for **Configuration profiles** under the Devices menu.
175+
176+
171177
#### Device Configuration Profiles (Alternative 1)
172178

173179
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.

defender-for-cloud-apps/ai-agent-inventory.md

Lines changed: 8 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -43,34 +43,19 @@ When Copilot Studio AI Agents are connected, a green indicator appears in the **
4343

4444
## Identify misconfigured or risky AI agents using advanced hunting
4545

46-
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
46+
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
47+
48+
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
49+
4750
We recommend that you reach out to the owners of the risky agents for more information, and that you consider quarantining or deleting risky agents.
4851

4952
1. Sign in to the Defender portal, and go **Investigation & response** -> **Hunting** -> **Advanced hunting**.
5053
1. In the **Apps & identities** section, the [AIAgentsInfo table](/defender-xdr/advanced-hunting-aiagentsinfo-table) contains data for all your custom AI agents created using Copilot Studio. You can use this data to create custom queries.
54+
1. You can use the collection of community queries to identify misconfigured or risky agents.
55+
1. **Sign in to the [Microsoft Defender portal](https://security.microsoft.com)**.
56+
1. Go to **Investigation & response** -> **Hunting** -> **Advanced hunting**.
57+
1. In the **Queries** tab, select **Community queries**. The **AI Agents** folder contains queries related to AI agents. For more information, see [Sample queries](/defender-xdr/advanced-hunting-aiagentsinfo-table).
5158

52-
### Sample queries
53-
54-
Run this query to get a list of all the agents in your tenant:
55-
56-
```kusto
57-
AIAgentsInfo
58-
| summarize arg_max(Timestamp, *) by AIAgentId
59-
```
60-
61-
Run this query to identify all published agents that are configured with an incorrect authentication mechanism:
62-
63-
```kusto
64-
AIAgentsInfo
65-
| summarize arg_max(Timestamp, *) by AIAgentId
66-
| where AgentStatus != "Deleted"
67-
| where AgentStatus == "Published"
68-
| where UserAuthenticationType == "None" or AuthenticationTrigger == "As Needed"
69-
| project-reorder AgentCreationTime ,AIAgentId, AIAgentName, AgentStatus, CreatorAccountUpn, OwnerAccountUpns
70-
```
71-
72-
73-
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
7459

7560
## Related articles
7661

defender-for-cloud-apps/policy-template-reference.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
---
22
title: Microsoft Defender for Cloud Apps policy templates
33
description: This article provides information on policy templates included in Microsoft Defender for Cloud Apps.
4-
ms.date: 01/29/2023
4+
ms.date: 11/16/2025
55
ms.topic: how-to
6-
ms.reviewer: Ronen-Refaeli
6+
ms.reviewer: MayaAbelson
7+
78
---
89

910
# Defender for Cloud Apps policy templates
@@ -13,7 +14,6 @@ We recommend that you simplify policy creation by starting with existing templat
1314
For the full list of templates, check the Microsoft Defender Portal.
1415

1516

16-
1717
## Policy template highlights
1818

1919
|Risk category|Template name|Description|
@@ -33,10 +33,6 @@ For the full list of templates, check the Microsoft Defender Portal.
3333
|Cloud discovery|New risky app|Alert when new apps are discovered with risk score lower than 6 and that are used by more than 50 users with a total daily use of more than 50 MB.|
3434
|Cloud discovery|New sales app|Alert when new sales apps are discovered that are used by more than 50 users with a total daily use of more than 50 MB.|
3535
|Cloud discovery|New vendor management system apps|Alert when new vendor management system apps are discovered that are used by more than 50 users with a total daily use of more than 50 MB.|
36-
|DLP|Externally shared source code|Alert when a file containing source code is shared outside your organization.|
37-
|DLP|File containing PCI detected in the cloud (built-in DLP engine)|Alert when a file with payment card information (PCI) is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
38-
|DLP|File containing PHI detected in the cloud (built-in DLP engine)|Alert when a file with protected health information (PHI) is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
39-
|DLP|File containing private information detected in the cloud (built-in DLP engine)|Alert when a file with personal data is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
4036
|Threat detection|Administrative activity from a non-corporate IP address|Alert when an admin user performs an administrative activity from an IP address that isn't included in the corporate IP address range category. First configure your corporate IP addresses by going to the Settings page, and setting **IP address ranges**.|
4137
|Threat detection|Log on from a risky IP address|Alert when a user signs into your sanctioned apps from a risky IP address. By default, the Risky IP address category contains addresses that have IP address tags of Anonymous proxy, TOR, or Botnet. You can add more IP addresses to this category in the IP address ranges settings page.|
4238
|Threat detection|Mass download by a single user|Alert when a single user performs more than 50 downloads within 1 minute.|

defender-for-cloud-apps/real-time-agent-protection-during-runtime.md

Lines changed: 10 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -22,26 +22,21 @@ If Microsoft Defender determines that a prompt is suspicious:
2222
## Enable real-time protection for Microsoft Copilot Studio agents during runtime
2323

2424
> [!NOTE]
25-
> - The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
26-
> - If the Microsoft 365 connector isn’t properly connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
25+
> The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
2726
2827
1. Sign in to the **[Microsoft Defender portal](https://security.microsoft.com)**:
2928
1. Navigate to **System > Settings > Cloud Apps > Copilot Studio AI Agents**.
30-
1. Check the Microsoft 365 App Connector status:
31-
- **If the connector is already connected:** Continue to step 5.
32-
- **If the connector isn’t connected:**
33-
- Under **Microsoft 365 connector**, select **Connect** or **Edit**.
34-
- Select **Microsoft Entra ID Management events** and **Microsoft 365 activities**.
35-
- Select **Connect Microsoft 365**.
36-
1. Work together with a Power Platform administrator to and Enter the App ID provided by your Power Platform administrator and select **Save**.
37-
38-
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
39-
29+
1. Check the Microsoft 365 App Connector status. If the Microsoft 365 connector is not connected, [Enable the Microsoft 365 app connector](protect-office-365.md#connect-microsoft-365-to-microsoft-defender-for-cloud-apps).
30+
> [!NOTE]
31+
> If the Microsoft 365 connector isn’t connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
4032
1. Work together with a Power Platform administrator to complete these onboarding steps: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider#step-2-configure-the-threat-detection-system).
41-
- The Power Platform administrator must use the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
42-
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete the onboarding steps.
33+
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete their onboarding steps.
34+
- Make sure that the Power Platform administrator uses the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
35+
- Get the AppID from the Power Platform administrator, and enter it in the **App ID** field in the Defender portal, then select **Save**.
36+
37+
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
4338

44-
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section.
39+
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section in the Defender portal.
4540

4641
## Related articles
4742

defender-for-cloud-apps/troubleshooting-cloud-discovery.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ This article provides a list of cloud discovery errors and resolution recommenda
1212

1313
Even after Discovery is set up, customers might continue hardening the Operating System in order to meet compliance standards. However, this action might cause interference with the containerization service itself.
1414

15-
## Microsoft Defender for Endpoint integration
15+
## Microsoft Defender for Endpoint integration errors
1616

1717
If you integrated Microsoft Defender for Endpoint with Defender for Cloud Apps, and you don't see the results of the integration.
1818

@@ -37,6 +37,8 @@ You can track the processing of cloud discovery logs using the governance log. T
3737

3838
## Log collector errors
3939

40+
The [Log collector Diagnostic script](https://github.com/microsoft/Microsoft-Defender-for-Cloud-Apps/tree/main/Sample%20scripts/Log-Collector-Diag-Script) automates the collection and compression of logs and diagnostic data for troubleshooting Log Collector containers on Linux (Docker/Podman) to improve workflow efficiency. If you need to contact support, run the script and share the generated log bundle for faster case resolution.
41+
4042
|Issue|Resolution|
4143
|----|----|
4244
|Couldn't connect to the log collector over FTP| 1. Verify that you're using FTP credentials and not SSH credentials. <br />2. Verify that the FTP client you're using isn't set to SFTP (Secure File Transfer Protocol). |

defender-for-identity/deploy/configure-windows-event-collection.md

Lines changed: 31 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,50 @@
11
---
22
title: Configure audit policies for Windows event logs | Microsoft Defender for Identity
33
description: This article describes how to configure audit policies for Windows event logs as part of deploying a Microsoft Defender for Identity sensor.
4-
ms.date: 06/04/2025
4+
ms.date: 11/05/2025
55
ms.topic: how-to
66
ms.reviewer: rlitinsky
77
---
88

99
# Configure audit policies for Windows event logs
1010

11-
To enhance detections and gather more information on user actions like NTLM logons and security group changes, Microsoft Defender for Identity relies on specific entries in Windows event logs. Proper configuration of Advanced Audit Policy settings on your domain controllers is crucial to avoid gaps in the event logs and incomplete Defender for Identity coverage.
11+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
12+
This article describes how to optimally configure the Advanced Audit Policy settings on your domain controllers to avoid gaps in the event logs and incomplete Defender for Identity coverage.
1213

13-
This article describes how to configure your Advanced Audit Policy settings as needed for a Defender for Identity sensor. It also describes other configurations for specific event types.
14+
## Configure Windows event auditing with the Defender for Identity sensor v3.x
1415

16+
Defender for Identity sensor v3.x can automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones.
17+
18+
To turn on automatic windows auditing:
19+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings**, and then **Identities**.
20+
1. In the **General** section, select **Advanced features**.
21+
1. Turn on **Automatic Windows auditing configuration**.​
22+
23+
If you do not select automatic Windows event auditing, you must manually configure Windows event collection on your domain controller.
24+
25+
## Configure Windows event auditing with the Defender for Identity sensor v2.x
26+
27+
Configure Windows event auditing on your domain controllers to support Defender for Identity detections.
1528
Defender for Identity generates health issues for each of these scenarios if they're detected. For more information, see [Microsoft Defender for Identity health issues](../health-alerts.md).
1629

1730
## Prerequisites
1831

19-
- Before you run Defender for Identity PowerShell commands, make sure that you downloaded the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
32+
- Before you run Defender for Identity PowerShell commands, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
33+
> [!NOTE]
34+
> The Active Directory PowerShell module is required when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
2035
2136
## Generate a report of current configurations via PowerShell
2237

2338
Before you start creating new event and audit policies, we recommend that you run the following PowerShell command to generate a report of your current domain configurations:
2439

2540
```powershell
26-
New-MDIConfigurationReport [-Path] <String> [-Mode] <String> [-OpenHtmlReport]
41+
New-MDIConfigurationReport -Path "C:\Reports" -Mode Domain -Identity "DOMAIN\ServiceAccountName" -OpenHtmlReport
2742
```
2843

44+
> [!NOTE]
45+
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
46+
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
47+
2948
In the preceding command:
3049

3150
- `Path` specifies the path to save the reports to.
@@ -43,7 +62,7 @@ For more information, see the [DefenderforIdentity PowerShell reference](/powers
4362
> [!TIP]
4463
> The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
4564
46-
## Configure auditing for domain controllers
65+
## Configure Windows event auditing for domain controllers
4766

4867
Update your Advanced Audit Policy settings and extra configurations for specific events and event types, such as users, groups, computers, and more. Audit configurations for domain controllers include:
4968

@@ -116,6 +135,12 @@ The following actions describe how to modify your domain controller's Advanced A
116135
117136
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
118137
138+
The following command defines all settings for the domain, creates group policy objects, and links them.
139+
140+
```powershell
141+
Set-MDIConfiguration -Mode Domain -Configuration All
142+
```
143+
119144
To configure your settings, run:
120145

121146
```powershell

defender-for-identity/deploy/prerequisites-sensor-version-2.md

Lines changed: 3 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -106,24 +106,11 @@ The following table describes memory requirements on the server used for the Def
106106
> [!IMPORTANT]
107107
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
108108
109-
## Configure Windows auditing
109+
## Configure Windows event auditing
110110

111-
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
111+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
112112

113-
Configure Windows event collection on your domain controller to support Defender for Identity detections. For more information, see [Event collection with Microsoft Defender for Identity](event-collection-overview.md) and [Configure audit policies for Windows event logs](configure-windows-event-collection.md).
114-
115-
You might want to use the Defender for Identity PowerShell module to configure the required settings. For example, the following command defines all settings for the domain, creates group policy objects, and links them.
116-
117-
```powershell
118-
Set-MDIConfiguration -Mode Domain -Configuration All
119-
```
120-
> [!NOTE]
121-
> The Active Directory PowerShell module is required only when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
122-
123-
For more information, see:
124-
- [DefenderForIdentity Module](/powershell/module/defenderforidentity/)
125-
- [Defender for Identity in the PowerShell Gallery](https://www.powershellgallery.com/packages/DefenderForIdentity/)
126-
113+
[Configure Windows event auditing](configure-windows-event-collection.md) on your domain controller to support Defender for Identity detections in the Defender portal or using PowerShell.
127114

128115
## Test your prerequisites
129116

0 commit comments

Comments
 (0)