Skip to content

Commit b1437ae

Browse files
authored
Merge pull request #646 from MicrosoftDocs/main
Publish main to live, Friday 10:30AM PDT, 06/07
2 parents fd9e0a2 + 187a2a9 commit b1437ae

File tree

4 files changed

+44
-10
lines changed

4 files changed

+44
-10
lines changed

defender-endpoint/configure-environment.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier1
1515
ms.topic: how-to
1616
ms.subservice: onboard
17-
ms.date: 05/13/2024
17+
ms.date: 06/06/2024
1818
---
1919

2020
# STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service
@@ -30,9 +30,9 @@ ms.date: 05/13/2024
3030
Before you onboard devices to Defender for Endpoint, make sure your network is configured to connect to the service. The first step of this process involves adding URLs to the allowed domains list if your proxy server or firewall rules prevent access to Defender for Endpoint. This article also includes information about proxy and firewall requirements for older versions of Windows client and Windows Server.
3131

3232
> [!NOTE]
33-
> - Tenants created on or before May 8, 2024 have the option to select streamlined connectivity ([consolidated set of URLs](https://aka.ms/MDE-streamlined-urls)) as the default onboarding method, or remain on standard connectivity through settings. When you've verified prerequisites have been met and are ready to set the default onboarding package to streamlined, you can turn on the advanced feature setting in the Microsoft Defender portal (**Settings > Endpoints > Advanced Features**). For onboarding through Intune or Microsoft Defender for Cloud, you need to activate the relevant option. Devices already onboarded aren't reonboarded automatically. In such cases, create a new policy in Intune, where it is recommended to first assign the policy to a set of test devices to verify connectivity is successful, and then expand the audience. Devices in Defender for Cloud can be reonboarded using the relevant onboarding script.
34-
> - If your tenant already had streamlined connectivity enabled as part of the public preview, it remains enabled.
35-
> - New tenants created after May 8, 2024 default to streamlined connectivity. Read more at [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md)
33+
> - After May 8, 2024, you have the option to keep streamlined connectivity ([consolidated set of URLs](https://aka.ms/MDE-streamlined-urls)) as the default onboarding method, or downgrade to standard connectivity through (**Settings > Endpoints > Advanced Features**). For onboarding through Intune or Microsoft Defender for Cloud, you need to activate the relevant option. Devices already onboarded aren't reonboarded automatically. In such cases, create a new policy in Intune, where it is recommended to first assign the policy to a set of test devices to verify connectivity is successful, and then expand the audience. Devices in Defender for Cloud can be reonboarded using the relevant onboarding script, while newly onboarded devices will automatically receive streamlined onboarding.
34+
> - The new *.endpoint.security.microsoft.com consolidated domain needs to be reachable for all devices, for current and future functionality, regardless whether you continue to use Standard connectivity.
35+
> - New regions will default to streamlined connectivity and will not have the option to downgrade to Standard. Read more at [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md).
3636
3737
## Enable access to Microsoft Defender for Endpoint service URLs in the proxy server
3838

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 05/20/2024
6+
ms.date: 06/07/2024
77
audience: ITPro
88
ms.topic: reference
99
author: siosulli
@@ -234,6 +234,21 @@ Updates are released for x86, x64, and ARM64 Windows architecture.
234234

235235
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
236236

237+
### 1.411.111.0
238+
239+
- Defender package version: **1.411.111.0**
240+
- Security intelligence version: **1.411.111.0**
241+
- Engine version: **1.24050.2**
242+
- Platform version: **4.18.24050.7**
243+
244+
#### Fixes
245+
246+
- None
247+
248+
#### Additional information
249+
250+
- None
251+
237252
### 1.411.9.0
238253

239254
- Defender package version: **1.411.9.0**

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/30/2024
18+
ms.date: 06/07/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -101,13 +101,12 @@ In general you need to take the following steps:
101101
- Rocky 8.7 and higher
102102
- Alma 8.4 and higher
103103
- Mariner 2
104-
104+
105105
> [!NOTE]
106106
> Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
107107
> With RHEL 6 support for 'extended end of life' coming to an end by June 30, 2024; MDE Linux support for RHEL 6 will also be deprecated by June 30, 2024
108108
> MDE Linux version 101.23082.0011 is the last MDE Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
109-
>
110-
> Microsoft Defender Vulnerablity Management is not supported on Alma currently.
109+
> Microsoft Defender Vulnerablity Management is not supported on Rocky and Alma currently.
111110
112111
- List of supported kernel versions
113112

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
66
author: siosulli
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 05/20/2024
9+
ms.date: 06/07/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -27,6 +27,26 @@ search.appverid: met150
2727

2828
Microsoft regularly releases [security intelligence updates and product updates for Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md). It's important to keep Microsoft Defender Antivirus up to date. When a new package version is released, support for the previous two versions is reduced to technical support only. Versions that are older than the previous two versions are listed in this article and are provided for technical upgrade support only.
2929

30+
## February-2024 (Engine: 1.1.24020.9 | Platform: 4.18.24020.7)
31+
32+
- Security intelligence update version: **1.407.46.0**
33+
- Release date: **March 6, 2024** (Engine) / **March 12, 2024** (Platform)
34+
- Engine: **1.1.24020.9**
35+
- Platform: **4.18.24020.7**
36+
- Support phase: **Technical upgrade support (only)**
37+
38+
### What's new
39+
40+
- Improved support for virtualizing while compressing or decompressing zip files
41+
- Improved reporting in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) for block-only remediations
42+
- Reduced the number of false positives for [attack surface reduction rules](attack-surface-reduction.md) for known trusted processes
43+
- Improved [Get-MpPreference](/powershell/module/defender/get-mppreference) logic for proxy bypass settings
44+
- Extended the toast notification support for [Indicators of Compromise](manage-indicators.md#indicator-of-compromise-ioc-overview) (IoC) detections
45+
46+
### Known issues
47+
48+
- For [device control](device-control-overview.md) customers using removable media policies with disk/device-level access only (masks that include the values 1, 2, 3, 4, and 7), enforcement might not work as expected. In such situations, we recommend customers roll back to the previous version of the Defender platform.
49+
3050
## January-2024 (Platform: 4.18.24010.12 | Engine: 1.1.24010.10)
3151

3252
- Security intelligence update version: **1.405.702.0**

0 commit comments

Comments
 (0)