Skip to content

Commit b4408e7

Browse files
authored
Merge branch 'main' into mdav-release
2 parents 1c98b3d + 8896e58 commit b4408e7

21 files changed

+487
-324
lines changed

CloudAppSecurityDocs/network-requirements.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ dev.virtualearth.net
4646
flow.microsoft.com
4747
static2.sharepointonline.com
4848
*.blob.core.windows.net
49+
discoveryresources-cdn-prod.cloudappsecurity.com
50+
discoveryresources-cdn-gov.cloudappsecurity.com
51+
4952
```
5053

5154
Additionally, the following items should be allowed, depending on which data center you use:
@@ -127,15 +130,15 @@ For **US Government GCC High** customers:
127130
||IP addresses|DNS name|
128131
|----|----|----|
129132
|**Session controls**|US Gov Arizona: 52.244.144.65, 52.244.43.90, 52.244.43.225, 52.244.215.117, 52.235.134.195, 52.126.54.167, 52.126.55.65 <br /><br />US Gov Virginia: 13.72.27.223, 13.72.27.219, 13.72.27.220, 13.72.27.222, 20.141.230.137, 52.235.179.167, 52.235.184.112|\*.mcas-gov.us<br/>\*.admin-mcas-gov.us|
130-
|**Access controls**|US Gov Arizona: 52.244.215.83, 52.244.212.197, 52.127.2.97, 52.126.54.254, 52.126.55.65 <br /><br />US Gov Virginia: 13.72.27.216, 13.72.27.215, 52.127.50.130, 52.235.179.123, 52.245.252.18, 52.245.252.131, 52.245.252.191, 52.245.253.12, 52.245.253.58, 52.245.253.229, 52.245.254.39, 52.245.254.51, 52.245.254.212, 52.245.254.245, 52.235.184.112, 52.235.184.112|\*.access.mcas-gov.us<br/>\*.access.cloudappsecurity.us|
133+
|**Access controls**|US Gov Arizona: 52.244.215.83, 52.244.212.197, 52.127.2.97, 52.126.54.254, 52.126.55.65, 52.235.156.231, 52.235.156.197, 52.235.157.183, 52.235.156.9, 52.235.156.225, 52.235.157.175, 52.235.157.131, 52.235.157.11, 52.126.39.112, 52.235.156.151 <br /><br />US Gov Virginia: 13.72.27.216, 13.72.27.215, 52.127.50.130, 52.235.179.123, 52.245.252.18, 52.245.252.131, 52.245.252.191, 52.245.253.12, 52.245.253.58, 52.245.253.229, 52.245.254.39, 52.245.254.51, 52.245.254.212, 52.245.254.245, 52.235.184.112, 52.235.184.112|\*.access.mcas-gov.us<br/>\*.access.cloudappsecurity.us|
131134
|**SAML proxy**|US Gov Arizona: 20.140.49.129, 52.126.55.65<br /><br />US Gov Virginia: 52.227.216.80, 52.235.184.112|\*.saml.cloudappsecurity.us|
132135

133136
For **US Government GCC** customers:
134137

135138
||IP addresses|DNS name|
136139
|----|----|----|
137140
|**Session controls**|US Gov Arizona: 52.235.147.86, 52.126.49.55, 52.126.48.233 <br /><br /> US Gov Virginia: 52.245.225.0, 52.245.224.229, 52.245.224.234, 52.245.224.228, 20.141.230.215, 52.227.10.254, 52.126.48.233, 52.227.3.207 | \*.mcas-gov.ms<br/>\*.admin-mcas-gov.ms|
138-
|**Access controls** |US Gov Arizona: 52.127.2.97, 52.235.143.220, 52.126.48.233 <br /><br />US Gov Virginia: 52.245.224.235, 52.245.224.227, 52.127.50.130, 52.245.222.168, 52.245.222.172, 52.245.222.180, 52.245.222.209, 52.245.223.38, 52.245.223.72, 52.245.223.177, 52.245.223.181, 52.245.223.182, 52.245.223.190, 23.97.12.140, 52.227.3.207 | \*.access.mcas-gov.ms|
141+
|**Access controls** |US Gov Arizona: 52.127.2.97, 52.235.143.220, 52.126.48.233, 52.126.33.153, 52.126.39.65, 52.235.138.253, 52.235.139.4, 52.235.139.36, 52.235.139.75, 52.235.139.92, 52.235.139.103, 52.235.139.134, 52.235.139.141 <br /><br />US Gov Virginia: 52.245.224.235, 52.245.224.227, 52.127.50.130, 52.245.222.168, 52.245.222.172, 52.245.222.180, 52.245.222.209, 52.245.223.38, 52.245.223.72, 52.245.223.177, 52.245.223.181, 52.245.223.182, 52.245.223.190, 23.97.12.140, 52.227.3.207 | \*.access.mcas-gov.ms|
139142
|**SAML proxy** |US Gov Arizona: 52.126.48.233 <br /> US Gov Virginia: 52.227.216.80, 52.126.48.233, 52.227.3.207 | \*.saml.cloudappsecuritygov.com|
140143

141144
## SIEM agent connection

defender-endpoint/TOC.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -259,16 +259,18 @@
259259
items:
260260
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
261261
href: mde-linux-arm.md
262-
- name: Puppet based deployment
263-
href: linux-install-with-puppet.md
262+
- name: Installer script
263+
href: linux-installer-script.md
264264
- name: Ansible based deployment
265265
href: linux-install-with-ansible.md
266266
- name: Chef based deployment
267267
href: linux-deploy-defender-for-endpoint-with-chef.md
268-
- name: Manual deployment
269-
href: linux-install-manually.md
268+
- name: Puppet based deployment
269+
href: linux-install-with-puppet.md
270270
- name: Saltstack-based deployment
271271
href: linux-install-with-saltack.md
272+
- name: Manual deployment
273+
href: linux-install-manually.md
272274
- name: Advanced deployment for Defender for Endpoint on Linux
273275
href: comprehensive-guidance-on-linux-deployment.md
274276
- name: Deployment guidance for Defender for Endpoint on Linux for SAP

defender-endpoint/android-configure.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22
title: Configure Microsoft Defender for Endpoint on Android features
33
description: Describes how to configure Microsoft Defender for Endpoint on Android
44
ms.service: defender-endpoint
5-
ms.author: priyankagill
6-
author: priyankagill
7-
ms.reviewer: priyankagill
5+
ms.author: ewalsh
6+
author: emmwalshh
7+
ms.reviewer: denishdonga
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 11/22/2024
18+
ms.date: 02/11/2025
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -38,6 +38,7 @@ For more information about how to set up Defender for Endpoint on Android and Co
3838
> [!NOTE]
3939
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
4040
>
41+
> IP `245.245.0.1` is an internal Defender IP and should not be included in custom indicators by customers to avoid any functionality issues.
4142
> Also, alerts for custom indicators are currently not supported for Defender for Endpoint on Android.
4243
4344
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
@@ -332,4 +333,5 @@ Use the following steps to configure the Device tags:
332333
- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)
333334

334335
- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
336+
335337
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/get-assessment-software-vulnerabilities.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 01/31/2025
18+
ms.date: 02/11/2025
1919
---
2020

2121
# Export software vulnerabilities assessment per device
@@ -395,7 +395,7 @@ Each returned record contains all the data from the full export software vulnera
395395
|ExploitabilityLevel|String|The exploitability level of this vulnerability (NoExploit, ExploitIsPublic, ExploitIsVerified, ExploitIsInKit)|ExploitIsInKit|
396396
|FirstSeenTimestamp|String|First time the CVE of this product was seen on the device.|2020-11-03 10:13:34.8476880|
397397
|ID|String|Unique identifier for the record.|123ABG55_573AG&mnp!|
398-
|LastSeenTimestamp|String|Last time the CVE was seen on the device.|2020-11-03 10:13:34.8476880|
398+
|LastSeenTimestamp|String|Last time the software was reported on the device.|2020-11-03 10:13:34.8476880|
399399
|OSPlatform|String|Platform of the operating system running on the device; specific operating systems with variations within the same family, such as Windows 10 and Windows 11. See Microsoft Defender Vulnerability Management supported operating systems and platforms for details.|Windows10 and Windows 11|
400400
|RbacGroupName|String|The role-based access control (RBAC) group. If this device isn't assigned to any RBAC group, the value is "Unassigned." If the organization doesn't contain any RBAC groups, the value is "None."|Servers|
401401
|RecommendationReference|string|A reference to the recommendation ID related to this software.|va--microsoft--silverlight|

defender-endpoint/configure-updates.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 01/12/2024
18+
ms.date: 02/10/2025
1919
---
2020

2121
# Create a custom gradual rollout process for Microsoft Defender updates
@@ -49,19 +49,17 @@ The following table lists the available group policy settings for configuring up
4949
## Group Policy
5050

5151
> [!NOTE]
52-
> An updated Defender ADMX template are published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
52+
> An updated Defender ADMX template is published together with the 21H2 release of Windows 10. A non-localized version is available for download at [defender-updatecontrols](https://github.com/microsoft/defender-updatecontrols) on GitHub.
5353
54-
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints.
55-
56-
In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
54+
You can use [Group Policy](/windows/win32/srvnodes/group-policy?redirectedfrom=MSDN) to configure and manage Microsoft Defender Antivirus on your endpoints. In general, you can use the following procedure to configure or change Microsoft Defender Antivirus group policy settings:
5755

5856
1. On your Group Policy management machine, open the **Group Policy Management Console**, right-click the **Group Policy Object** (GPO) you want to configure and select **Edit**.
5957

6058
2. Using the Group Policy Management Editor go to **Computer configuration**.
6159

6260
3. Select **Administrative templates**.
6361

64-
4. Expand the tree to **Windows components > Microsoft Defender Antivirus**.
62+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus**.
6563

6664
5. Expand the section (referred to as **Location** in the table in this article) that contains the setting you want to configure, double-click the setting to open it, and make configuration changes.
6765

@@ -88,15 +86,22 @@ Set-MpPreference
8886
-DisableGradualRelease 1|0
8987
-DefinitionUpdatesChannel Staged|Broad|NotConfigured
9088
```
91-
9289
Example:
9390

9491
Use `Set-MpPreference -PlatformUpdatesChannel Beta` to configure platform updates to arrive from the Beta Channel.
9592

9693
For more information on the parameters and how to configure them, see [Set-MpPreference](/powershell/module/defender/set-mppreference) (Microsoft Defender Antivirus).
9794

95+
## Registry
96+
97+
These settings can be confirmed in the registry under `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`:
98+
99+
- `EngineRing`
100+
- `PlatformRing`
101+
- `SignaturesRing`
102+
98103
> [!NOTE]
99-
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts) for guidance on this topic.
104+
> You can also use a management tool such as Microsoft Configuration Manager to run PowerShell scripts. See [Create and run PowerShell scripts from the Configuration Manager console](/mem/configmgr/apps/deploy-use/create-deploy-scripts).
100105
101106
> [!TIP]
102107
> If you're looking for Antivirus related information for other platforms, see:

defender-endpoint/device-health-microsoft-defender-antivirus-health.md

Lines changed: 16 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: ewalsh
77
author: emmwalshh
88
ms.localizationpriority: medium
9-
ms.date: 02/18/2024
9+
ms.date: 02/11/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -41,6 +41,8 @@ The Device Health report provides information about the devices in your organiza
4141
>
4242
> For Windows&nbsp;Server&nbsp;2012&nbsp;R2 and Windows&nbsp;Server&nbsp;2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
4343
44+
## View device health cards
45+
4446
In the Microsoft Defender portal, in the navigation pane, select **Reports**, and then open **Device health and compliance**. The [**Microsoft Defender Antivirus health** tab](#microsoft-defender-antivirus-health-tab) has eight cards that report on the following aspects of Microsoft Defender Antivirus:
4547

4648
- [Antivirus mode card](#antivirus-mode-card)
@@ -57,14 +59,13 @@ In the Microsoft Defender portal, in the navigation pane, select **Reports**, an
5759
To access the Device health and antivirus compliance report in the Microsoft Defender portal, the following permissions are required:
5860

5961
| Permission name | Permission type |
60-
|:---|:---|
62+
|---|---|
6163
| View Data | Threat and vulnerability management (TVM) |
6264

6365
> [!IMPORTANT]
6466
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
6567
66-
67-
To Assign these permissions:
68+
To assign permissions, follow these steps:
6869

6970
1. Sign in to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> using account with Security administrator or Global administrator role assigned.
7071

@@ -90,12 +91,12 @@ Two cards, [Antivirus mode card](#antivirus-mode-card) and [Recent antivirus sca
9091

9192
The remaining six cards report about the Microsoft Defender Antivirus status for devices in your organization:
9293

93-
| `version` cards: | `update` cards{<a id="fn1">1</a>} |
94+
| `version` cards: | `update` cards |
9495
|:---|:---|
9596
| [Antivirus engine version card](#antivirus-engine-version-card) <br> [Antivirus security intelligence version card](#antivirus-security-intelligence-version-card) <br> [Antivirus platform version card](#antivirus-platform-version-card) | [Antivirus engine updates card](#antivirus-engine-updates-card) <br> [Security intelligence updates card](#security-intelligence-updates-card) <br> [Antivirus platform updates card](#antivirus-platform-updates-card) |
9697
| The three version cards provide flyout reports that provide additional information, and enable further exploration. | The three up-to-date reporting cards provide links to resources to learn more. |
9798

98-
<sup>{[1](#fn1)}</sup> For the three `updates` cards (also known as up-to-date reporting cards), "**No data available**" (or "Unknown" value) indicates devices that aren't reporting update status. Devices that aren't reporting update status can be due to various reasons, such as:
99+
For the three `updates` cards (also known as up-to-date reporting cards), "**No data available**" (or "Unknown" value) indicates devices that aren't reporting update status. Devices that aren't reporting update status can be due to various reasons, such as:
99100

100101
- Computer is disconnected from the network.
101102
- Computer is powered down or in a hibernation state.
@@ -139,7 +140,7 @@ To add or remove specific types of information on the **Microsoft Defender Antiv
139140
The following table contains a list of terms that are new to Microsoft Defender Antivirus reporting.
140141

141142
| Column name | Description |
142-
|:---|:---|
143+
|---|---|
143144
| Security intelligence publish time | Indicates Microsoft's release date of the security intelligence update version on the device. Devices with a security intelligence publish time greater than seven days are considered out of date in the reports. |
144145
| Last seen | Indicates date when device last had connection. |
145146
| Data refresh timestamp | Indicates when client events were last received for reporting on: AV mode, AV engine version, AV platform version, AV security intelligence version, and scan information. |
@@ -215,9 +216,16 @@ Reports on how many devices in your organization – on the date indicated on th
215216
Following are descriptions for each mode:
216217

217218
- **Active** mode - In active mode, Microsoft Defender Antivirus is used as the primary antivirus app on the device. Files are scanned, threats are remediated, and detected threats are listed in your organization's security reports and in your Windows Security app.
218-
- **Passive** mode - In passive mode, Microsoft Defender Antivirus isn't used as the primary antivirus app on the device. Files are scanned, and detected threats are reported, but threats aren't remediated by Microsoft Defender Antivirus. IMPORTANT: Microsoft Defender Antivirus can run in passive mode only on endpoints that are onboarded to Microsoft Defender for Endpoint. See [Requirements for Microsoft Defender Antivirus to run in passive mode](microsoft-defender-antivirus-compatibility.md#requirements-for-microsoft-defender-antivirus-to-run-in-passive-mode).
219+
220+
- **Passive** mode - In passive mode, Microsoft Defender Antivirus isn't used as the primary antivirus app on the device.
221+
222+
> [!IMPORTANT]
223+
> Microsoft Defender Antivirus can run in passive mode only on endpoints that are onboarded to Microsoft Defender for Endpoint. See [Requirements for Microsoft Defender Antivirus to run in passive mode](microsoft-defender-antivirus-compatibility.md#requirements-for-microsoft-defender-antivirus-to-run-in-passive-mode).
224+
219225
- **Disabled** mode - synonymous with: uninstalled, disabled, sideBySidePassive, and Low Periodic Scan. When disabled, Microsoft Defender Antivirus isn't used. Files aren't scanned, and threats aren't remediated. In general, Microsoft doesn't recommend disabling or uninstalling Microsoft Defender Antivirus.
226+
220227
- **Others** mode - Not running, Unknown
228+
221229
- **EDR in Block** mode - In endpoint detection and response (EDR) blocked mode. See [Endpoint detection and response in block mode](edr-in-block-mode.md)
222230

223231
Devices that are in either passive, LPS, or Off present a potential security risk and should be investigated.

defender-endpoint/edr-in-block-mode.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom:
1414
- next-gen
1515
- mde-edr
1616
- admindeeplinkDEFENDER
17-
ms.date: 06/25/2024
17+
ms.date: 02/10/2025
1818
ms.collection:
1919
- m365-security
2020
- tier2
@@ -80,16 +80,32 @@ When EDR in block mode is turned on, and a malicious artifact is detected, Defen
8080

8181
1. Go to the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)) and sign in.
8282

83-
2. Choose **Settings** \> **Endpoints** \> **General** \> **Advanced features**.
83+
1. Choose **Settings** > **Endpoints** > **General** > **Advanced features**.
8484

85-
3. Scroll down, and then turn on **Enable EDR in block mode**.
85+
1. Scroll down, and then turn on **Enable EDR in block mode**.
8686

8787
### Intune
8888

8989
To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP through Intune, and a comparison to on-premises](/troubleshoot/mem/intune/deploy-oma-uris-to-target-csp-via-intune).
9090

9191
For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp).
9292

93+
### Group Policy
94+
95+
You can use Group Policy to enable EDR in block mode.
96+
97+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
98+
99+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
100+
101+
2. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
102+
103+
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Features**.
104+
105+
4. Double-click **Enable EDR in block mode** and set the option to **Enabled**.
106+
107+
5. Select **OK**.
108+
93109
## Requirements for EDR in block mode
94110

95111
The following table lists requirements for EDR in block mode:

defender-endpoint/enable-exploit-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365-security
1515
- tier3
1616
- mde-asr
17-
ms.date: 11/15/2024
17+
ms.date: 02/10/2025
1818
search.appverid: met150
1919
---
2020

@@ -48,7 +48,7 @@ This section includes recommendations for you to be successful with deploying ex
4848
- Use safe deployment practices.
4949

5050
> [!WARNING]
51-
> If you do not test and do not go thru safe deployment practices, you could contribute to end-user productivity outages.
51+
> If you do not test and do not go through safe deployment practices, you could contribute to end-user productivity outages.
5252
5353
### Safe deployment practices
5454

0 commit comments

Comments
 (0)