You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+14-3Lines changed: 14 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,29 +15,40 @@ ms.collection:
15
15
ms.topic: reference
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 11/06/2025
18
+
ms.date: 11/17/2025
19
19
appliesto:
20
20
- Microsoft Defender for Endpoint
21
21
22
22
---
23
23
24
24
# What's new in Microsoft Defender for Endpoint on Android
25
25
26
-
27
26
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
28
27
29
28
### Releases for Defender for Endpoint on Android
30
29
31
30
#### November 2025
32
31
32
+
| Build| 1.0.8315.0101|
33
+
| -------- | -------- |
34
+
| Release Date | November 17, 2025 |
35
+
36
+
**What's New**
37
+
38
+
- Performance improvement and accessibility bug fixes
39
+
40
+
#### November 2025
41
+
33
42
| Build| 1.0.8303.0101|
34
43
| -------- | -------- |
35
44
| Release Date |November 4, 2025|
36
45
37
46
**What's New**
38
47
39
48
- An improved user feedback experience: See [Key changes - November 2025](./android-new-ux.md#key-changes---november-2025) for details.
40
-
49
+
50
+
- Added landscape mode UI support for the Defender app.
51
+
41
52
- Additional telemetry features to improve app performance monitoring and detect specific scenarios, such as entering landscape mode or invalid authentication attempts.
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -168,6 +168,12 @@ The following procedures for enabling attack surface reduction rules include ins
168
168
169
169
1. Select **Next** on the three configuration panes, then select **Create** if you're creating a new policy or **Save** if you're editing an existing policy.
170
170
171
+
> [!NOTE]
172
+
> In the latest Intune interface, **Configuration profiles** is located under **Devices > Configuration profiles**.
173
+
> Earlier versions of Intune showed this under **Device configuration > Profiles**.
174
+
> If you don't see "Configuration Profile" as written in older instructions, look for **Configuration profiles** under the Devices menu.
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/ai-agent-inventory.md
+8-23Lines changed: 8 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,34 +43,19 @@ When Copilot Studio AI Agents are connected, a green indicator appears in the **
43
43
44
44
## Identify misconfigured or risky AI agents using advanced hunting
45
45
46
-
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
46
+
After you give Microsoft Defender access to your custom agents, you can use advanced hunting to help identify misconfigured or risky agents and minimize organizational exposure to potential threats.
47
+
48
+
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
49
+
47
50
We recommend that you reach out to the owners of the risky agents for more information, and that you consider quarantining or deleting risky agents.
48
51
49
52
1. Sign in to the Defender portal, and go **Investigation & response** -> **Hunting** -> **Advanced hunting**.
50
53
1. In the **Apps & identities** section, the [AIAgentsInfo table](/defender-xdr/advanced-hunting-aiagentsinfo-table) contains data for all your custom AI agents created using Copilot Studio. You can use this data to create custom queries.
54
+
1. You can use the collection of community queries to identify misconfigured or risky agents.
55
+
1.**Sign in to the [Microsoft Defender portal](https://security.microsoft.com)**.
56
+
1. Go to **Investigation & response** -> **Hunting** -> **Advanced hunting**.
57
+
1. In the **Queries** tab, select **Community queries**. The **AI Agents** folder contains queries related to AI agents. For more information, see [Sample queries](/defender-xdr/advanced-hunting-aiagentsinfo-table).
51
58
52
-
### Sample queries
53
-
54
-
Run this query to get a list of all the agents in your tenant:
55
-
56
-
```kusto
57
-
AIAgentsInfo
58
-
| summarize arg_max(Timestamp, *) by AIAgentId
59
-
```
60
-
61
-
Run this query to identify all published agents that are configured with an incorrect authentication mechanism:
62
-
63
-
```kusto
64
-
AIAgentsInfo
65
-
| summarize arg_max(Timestamp, *) by AIAgentId
66
-
| where AgentStatus != "Deleted"
67
-
| where AgentStatus == "Published"
68
-
| where UserAuthenticationType == "None" or AuthenticationTrigger == "As Needed"
See [Proactively hunt for threats with advanced hunting in Microsoft Defender](/defender-xdr/advanced-hunting-overview) to learn how to use queries to proactively hunt for threats.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/policy-template-reference.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,10 @@
1
1
---
2
2
title: Microsoft Defender for Cloud Apps policy templates
3
3
description: This article provides information on policy templates included in Microsoft Defender for Cloud Apps.
4
-
ms.date: 01/29/2023
4
+
ms.date: 11/16/2025
5
5
ms.topic: how-to
6
-
ms.reviewer: Ronen-Refaeli
6
+
ms.reviewer: MayaAbelson
7
+
7
8
---
8
9
9
10
# Defender for Cloud Apps policy templates
@@ -13,7 +14,6 @@ We recommend that you simplify policy creation by starting with existing templat
13
14
For the full list of templates, check the Microsoft Defender Portal.
14
15
15
16
16
-
17
17
## Policy template highlights
18
18
19
19
|Risk category|Template name|Description|
@@ -33,10 +33,6 @@ For the full list of templates, check the Microsoft Defender Portal.
33
33
|Cloud discovery|New risky app|Alert when new apps are discovered with risk score lower than 6 and that are used by more than 50 users with a total daily use of more than 50 MB.|
34
34
|Cloud discovery|New sales app|Alert when new sales apps are discovered that are used by more than 50 users with a total daily use of more than 50 MB.|
35
35
|Cloud discovery|New vendor management system apps|Alert when new vendor management system apps are discovered that are used by more than 50 users with a total daily use of more than 50 MB.|
36
-
|DLP|Externally shared source code|Alert when a file containing source code is shared outside your organization.|
37
-
|DLP|File containing PCI detected in the cloud (built-in DLP engine)|Alert when a file with payment card information (PCI) is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
38
-
|DLP|File containing PHI detected in the cloud (built-in DLP engine)|Alert when a file with protected health information (PHI) is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
39
-
|DLP|File containing private information detected in the cloud (built-in DLP engine)|Alert when a file with personal data is detected by the Microsoft Defender for Cloud Apps built-in data loss prevention (DLP) engine in a sanctioned cloud app.|
40
36
|Threat detection|Administrative activity from a non-corporate IP address|Alert when an admin user performs an administrative activity from an IP address that isn't included in the corporate IP address range category. First configure your corporate IP addresses by going to the Settings page, and setting **IP address ranges**.|
41
37
|Threat detection|Log on from a risky IP address|Alert when a user signs into your sanctioned apps from a risky IP address. By default, the Risky IP address category contains addresses that have IP address tags of Anonymous proxy, TOR, or Botnet. You can add more IP addresses to this category in the IP address ranges settings page.|
42
38
|Threat detection|Mass download by a single user|Alert when a single user performs more than 50 downloads within 1 minute.|
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/real-time-agent-protection-during-runtime.md
+10-15Lines changed: 10 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,26 +22,21 @@ If Microsoft Defender determines that a prompt is suspicious:
22
22
## Enable real-time protection for Microsoft Copilot Studio agents during runtime
23
23
24
24
> [!NOTE]
25
-
> - The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
26
-
> - If the Microsoft 365 connector isn’t properly connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
25
+
> The onboarding process for real-time protection during agent runtime requires configuration in Power Platform and collaboration with other administrators.
27
26
28
27
1. Sign in to the **[Microsoft Defender portal](https://security.microsoft.com)**:
29
28
1. Navigate to **System > Settings > Cloud Apps > Copilot Studio AI Agents**.
30
-
1. Check the Microsoft 365 App Connector status:
31
-
-**If the connector is already connected:** Continue to step 5.
32
-
-**If the connector isn’t connected:**
33
-
- Under **Microsoft 365 connector**, select **Connect** or **Edit**.
34
-
- Select **Microsoft Entra ID Management events** and **Microsoft 365 activities**.
35
-
- Select **Connect Microsoft 365**.
36
-
1. Work together with a Power Platform administrator to and Enter the App ID provided by your Power Platform administrator and select **Save**.
37
-
38
-
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
39
-
29
+
1. Check the Microsoft 365 App Connector status. If the Microsoft 365 connector is not connected, [Enable the Microsoft 365 app connector](protect-office-365.md#connect-microsoft-365-to-microsoft-defender-for-cloud-apps).
30
+
> [!NOTE]
31
+
> If the Microsoft 365 connector isn’t connected, real-time agent protection during runtime continues to block suspicious activity on the AI agent, but alerts and incidents related to these actions won't appear in the Microsoft Defender portal.
40
32
1. Work together with a Power Platform administrator to complete these onboarding steps: [Enable external threat detection and protection for Copilot Studio custom agents](/microsoft-copilot-studio/external-security-provider#step-2-configure-the-threat-detection-system).
41
-
- The Power Platform administrator must use the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
42
-
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete the onboarding steps.
33
+
- Share the URL provided in the Defender portal with the Power Platform administrator to help them complete their onboarding steps.
34
+
- Make sure that the Power Platform administrator uses the same App ID as the App ID used in [Microsoft Entra ID application](/microsoft-copilot-studio/external-security-provider#step-1-configure-microsoft-entra-application).
35
+
- Get the AppID from the Power Platform administrator, and enter it in the **App ID** field in the Defender portal, then select **Save**.
36
+
37
+
:::image type="content" source="media/protect-ai-agents/turn-on-real-time-agent-protection.png" alt-text="Screenshot that shows how to turn on Real time agent protection during runtime in the Defender portal." lightbox="media/protect-ai-agents/turn-on-real-time-agent-protection.png":::
43
38
44
-
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section.
39
+
Once the Power Platform administrator completes the onboarding steps, a green **Connected** status appears in the **Microsoft 365 connector** section in the Defender portal.
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/troubleshooting-cloud-discovery.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ This article provides a list of cloud discovery errors and resolution recommenda
12
12
13
13
Even after Discovery is set up, customers might continue hardening the Operating System in order to meet compliance standards. However, this action might cause interference with the containerization service itself.
14
14
15
-
## Microsoft Defender for Endpoint integration
15
+
## Microsoft Defender for Endpoint integration errors
16
16
17
17
If you integrated Microsoft Defender for Endpoint with Defender for Cloud Apps, and you don't see the results of the integration.
18
18
@@ -37,6 +37,8 @@ You can track the processing of cloud discovery logs using the governance log. T
37
37
38
38
## Log collector errors
39
39
40
+
The [Log collector Diagnostic script](https://github.com/microsoft/Microsoft-Defender-for-Cloud-Apps/tree/main/Sample%20scripts/Log-Collector-Diag-Script) automates the collection and compression of logs and diagnostic data for troubleshooting Log Collector containers on Linux (Docker/Podman) to improve workflow efficiency. If you need to contact support, run the script and share the generated log bundle for faster case resolution.
41
+
40
42
|Issue|Resolution|
41
43
|----|----|
42
44
|Couldn't connect to the log collector over FTP| 1. Verify that you're using FTP credentials and not SSH credentials. <br />2. Verify that the FTP client you're using isn't set to SFTP (Secure File Transfer Protocol). |
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/configure-windows-event-collection.md
+31-6Lines changed: 31 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,31 +1,50 @@
1
1
---
2
2
title: Configure audit policies for Windows event logs | Microsoft Defender for Identity
3
3
description: This article describes how to configure audit policies for Windows event logs as part of deploying a Microsoft Defender for Identity sensor.
4
-
ms.date: 06/04/2025
4
+
ms.date: 11/05/2025
5
5
ms.topic: how-to
6
6
ms.reviewer: rlitinsky
7
7
---
8
8
9
9
# Configure audit policies for Windows event logs
10
10
11
-
To enhance detections and gather more information on user actions like NTLM logons and security group changes, Microsoft Defender for Identity relies on specific entries in Windows event logs. Proper configuration of Advanced Audit Policy settings on your domain controllers is crucial to avoid gaps in the event logs and incomplete Defender for Identity coverage.
11
+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
12
+
This article describes how to optimally configure the Advanced Audit Policy settings on your domain controllers to avoid gaps in the event logs and incomplete Defender for Identity coverage.
12
13
13
-
This article describes how to configure your Advanced Audit Policy settings as needed for a Defender for Identity sensor. It also describes other configurations for specific event types.
14
+
## Configure Windows event auditing with the Defender for Identity sensor v3.x
14
15
16
+
Defender for Identity sensor v3.x can automatically configure Windows event auditing on your domain controllers, applying the required Windows event auditing settings to new sensors, and fixing misconfigurations on existing ones.
17
+
18
+
To turn on automatic windows auditing:
19
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings**, and then **Identities**.
20
+
1. In the **General** section, select **Advanced features**.
21
+
1. Turn on **Automatic Windows auditing configuration**.
22
+
23
+
If you do not select automatic Windows event auditing, you must manually configure Windows event collection on your domain controller.
24
+
25
+
## Configure Windows event auditing with the Defender for Identity sensor v2.x
26
+
27
+
Configure Windows event auditing on your domain controllers to support Defender for Identity detections.
15
28
Defender for Identity generates health issues for each of these scenarios if they're detected. For more information, see [Microsoft Defender for Identity health issues](../health-alerts.md).
16
29
17
30
## Prerequisites
18
31
19
-
- Before you run Defender for Identity PowerShell commands, make sure that you downloaded the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
32
+
- Before you run Defender for Identity PowerShell commands, make sure that you download the [Defender for Identity PowerShell module](https://www.powershellgallery.com/packages/DefenderForIdentity/).
33
+
> [!NOTE]
34
+
> The Active Directory PowerShell module is required when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
20
35
21
36
## Generate a report of current configurations via PowerShell
22
37
23
38
Before you start creating new event and audit policies, we recommend that you run the following PowerShell command to generate a report of your current domain configurations:
> When using `-Mode Domain`, include the `-Identity` parameter to avoid an interactive prompt.
46
+
> For more information, see: [New-MDIConfigurationReport](/powershell/module/defenderforidentity/new-mdiconfigurationreport?view=defenderforidentity-latest&preserve-view=true).
47
+
29
48
In the preceding command:
30
49
31
50
-`Path` specifies the path to save the reports to.
@@ -43,7 +62,7 @@ For more information, see the [DefenderforIdentity PowerShell reference](/powers
43
62
> [!TIP]
44
63
> The `Domain` mode report includes only configurations set as group policies on the domain. If you have settings defined locally on your domain controllers, we recommend that you also run the [Test-MdiReadiness.ps1](https://github.com/microsoft/Microsoft-Defender-for-Identity/tree/main/Test-MdiReadiness) script.
45
64
46
-
## Configure auditing for domain controllers
65
+
## Configure Windows event auditing for domain controllers
47
66
48
67
Update your Advanced Audit Policy settings and extra configurations for specific events and event types, such as users, groups, computers, and more. Audit configurations for domain controllers include:
49
68
@@ -116,6 +135,12 @@ The following actions describe how to modify your domain controller's Advanced A
116
135
117
136
**Related health issue:** [Directory Services Advanced Auditing isn't enabled as required](../health-alerts.md)
118
137
138
+
The following command defines all settings for the domain, creates group policy objects, and links them.
139
+
140
+
```powershell
141
+
Set-MDIConfiguration -Mode Domain -Configuration All
Copy file name to clipboardExpand all lines: defender-for-identity/deploy/prerequisites-sensor-version-2.md
+3-16Lines changed: 3 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,24 +106,11 @@ The following table describes memory requirements on the server used for the Def
106
106
> [!IMPORTANT]
107
107
> When running as a virtual machine, all memory must be allocated to the virtual machine at all times.
108
108
109
-
## Configure Windows auditing
109
+
## Configure Windows event auditing
110
110
111
-
Defender for Identity detections rely on specific Windows Event Log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
111
+
Defender for Identity detections rely on specific Windows event log entries to enhance detections and provide extra information about the users performing specific actions, such as NTLM sign-ins and security group modifications.
112
112
113
-
Configure Windows event collection on your domain controller to support Defender for Identity detections. For more information, see [Event collection with Microsoft Defender for Identity](event-collection-overview.md) and [Configure audit policies for Windows event logs](configure-windows-event-collection.md).
114
-
115
-
You might want to use the Defender for Identity PowerShell module to configure the required settings. For example, the following command defines all settings for the domain, creates group policy objects, and links them.
116
-
117
-
```powershell
118
-
Set-MDIConfiguration -Mode Domain -Configuration All
119
-
```
120
-
> [!NOTE]
121
-
> The Active Directory PowerShell module is required only when configuring Defender for Identity on domain controllers. It isn’t required on ADCS servers running the Certification Authority Role Service.
-[Defender for Identity in the PowerShell Gallery](https://www.powershellgallery.com/packages/DefenderForIdentity/)
126
-
113
+
[Configure Windows event auditing](configure-windows-event-collection.md) on your domain controller to support Defender for Identity detections in the Defender portal or using PowerShell.
0 commit comments