You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-updates.md
+46-20Lines changed: 46 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,11 +3,11 @@ title: Microsoft Defender Antivirus security intelligence and product updates
3
3
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: high
6
-
ms.date: 10/30/2024
6
+
ms.date: 02/20/2025
7
7
audience: ITPro
8
8
ms.topic: reference
9
-
author: denisebmsft
10
-
ms.author: deniseb
9
+
author: emmwalshh
10
+
ms.author: ewalsh
11
11
ms.custom: nextgen
12
12
ms.reviewer: pahuijbr, tudobril, yongrhee
13
13
manager: deniseb
@@ -42,7 +42,7 @@ This article also includes:
42
42
-[Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
43
43
-[Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
44
44
45
-
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
45
+
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
@@ -58,7 +58,7 @@ Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-
58
58
59
59
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
60
60
61
-
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
61
+
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
62
62
63
63
Engine updates are included with security intelligence updates and are released on a monthly cadence.
64
64
@@ -82,7 +82,7 @@ For more information, see [Manage the sources for Microsoft Defender Antivirus p
82
82
83
83
- To learn more about the gradual rollout process, and to see more information about the next release, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md).
84
84
85
-
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
85
+
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
86
86
87
87
- If you're looking for a list of Microsoft Defender processes, see the spreadsheet provided at [Enable access to Microsoft Defender for Endpoint service URLs in the proxy server](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The sheet also lists the services and their associated URLs that your network must be able to connect to.
- Platform: **4.18.225010.xxxx** (*Platform release is pending*)
106
+
- Engine: **1.1.25010.7**
107
+
- Support phase: **Security and Critical Updates**
108
+
109
+
#### What's new
110
+
111
+
- Improved handling of [attack surface reduction rule](attack-surface-reduction-rules-reference.md) exclusions.
112
+
- Improved AMSI scan performance with changes to exclusion handling.
113
+
- Fixed [Controlled Folder Access](controlled-folders.md) (CFA) protection for OneDrive when backup is enabled.
114
+
- Fixed performance issues with [full scans](schedule-antivirus-scans.md) when initiated from the Microsoft Defender portal.
115
+
- Fixed ASR warn mode processing for containerized objects (such as Office files) when the unblock option is selected.
116
+
- Fixed ASR warn mode processing when exclusions are applied.
117
+
- Fixed performance handling with file transfers having Mark of the Web (MoTW) set.
118
+
- Implemented `AzureAd` cache to handle offline environments with [device control](device-control-overview.md).
119
+
- Resolved an issue with `TrustLabelProtectionStatus` being reset after a Microsoft Defender platform update.
120
+
- Resolved an issue with [tamper protection for exclusions](/defender-endpoint/manage-tamper-protection-intune#tamper-protection-for-antivirus-exclusions) where an exclusion policy was handled by System Center Configuration Manager.
121
+
- Fixed issue with device control auditing of removable media.
122
+
- Fixed issue with MDM policy management on Azure Virtual Desktop.
123
+
- Added support for wildcards in [tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection) trusted process.
124
+
- Improved device control policy enforcement in offline environments.
125
+
- Fixed issue in the `WDNisDrv.sys` driver that caused system hangs during shutdown.
- Improved detection logic to reduce false positives related to the ASR rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
112
-
- Resolved an issue that could lead to a Windows device to be marked as [non-compliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
113
-
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting was not honored.
137
+
- Improved detection logic to reduce false positives related to the Azure Site Recovery rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
138
+
- Resolved an issue that could lead to a Windows device to be marked as [noncompliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
139
+
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting wasn't honored.
114
140
- Fixed `SharedSignatureRoot` processing when an empty value was set.
115
141
- Fixed a problem with [device control](device-control-overview.md) where certain file systems (like `FAT`, `FAT32`, `exFAT`) with volume information displayed when a blocking rule was defined.
116
142
- Improved performance in specific scenarios where network files were accessed.
117
-
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy was not being honored.
143
+
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy wasn't being honored.
118
144
- Fixed potential deadlock for [custom detection rules](/defender-xdr/custom-detection-rules) on the Windows client
119
-
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md)were not being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
120
-
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings)were not honored
145
+
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md)weren't being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
146
+
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings)weren't honored
121
147
122
148
> [!IMPORTANT]
123
149
> On Windows Server 2019 and later, a new binary (`MpDefenderCoreService.exe`) will be included in the update package to support future service improvements (more information to follow).
@@ -137,7 +163,7 @@ Updates contain:
137
163
- Fixed an issue with device control regarding printer security checks.
138
164
- Resolved an issue with platform rollback after an upgrade from Windows 10 to Windows 11.
139
165
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
140
-
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and have reached their end-of-servicing date.
166
+
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and reached their end-of-servicing date.
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
153
-
- Optimized [network protection](network-protection.md) calls to the backend that occur as a result of suspicious connection checks.
179
+
- Optimized [network protection](network-protection.md) calls to the backend that occurs as a result of suspicious connection checks.
154
180
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in the [Defender CSP](/windows/client-management/mdm/defender-csp) so that changing this value in the console takes effect on the endpoint.
155
-
- Resolved an issue where file evidence location was not always captured in scenarios where the remote location is inaccessible.
181
+
- Resolved an issue where file evidence location wasn't always captured in scenarios where the remote location is inaccessible.
156
182
- New event log added (`5016`) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
157
183
- Fixed a prioritization issue with [full scans](mdav-scan-best-practices.md) initiated from the portal that resulted in longer than expected full scan duration.
158
184
@@ -171,7 +197,7 @@ Platform and engine updates are provided on a monthly cadence. To be fully suppo
171
197
During the technical support (only) phase, commercially reasonable support incidents are provided through Microsoft Customer Service & Support and Microsoft's managed support offerings (such as Premier Support). If a support incident requires escalation to development for further guidance, requires a nonsecurity update, or requires a security update, customers are asked to upgrade to the latest platform version or an intermediate update (*).
172
198
173
199
> [!NOTE]
174
-
> If you are manually deploying Microsoft Defender Antivirus Platform Update, or if you are using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
200
+
> If you're manually deploying Microsoft Defender Antivirus Platform Update, or if you're using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
175
201
176
202
## How to roll back an update
177
203
@@ -187,7 +213,7 @@ In the unfortunate event that you encounter issues after a platform update, you
187
213
188
214
## Platform version included with Windows 10 releases
189
215
190
-
The below table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
216
+
The table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
191
217
192
218
|Windows 10 release |Platform version |Engine version |Support phase |
193
219
|:---|:---|:---|:---|
@@ -208,13 +234,13 @@ For Windows 10 release information, see the [Windows lifecycle fact sheet](https
208
234
209
235
## Updates for Deployment Image Servicing and Management (DISM)
210
236
211
-
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and antimalware updates. Updates are available for:
237
+
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and anti-malware updates. Updates are available for:
212
238
213
239
- Windows 10 and 11 (Enterprise, Pro, and Home editions)
214
240
- Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows Server 2012 R2
215
241
- WIM and VHD(x) files
216
242
217
-
Updates are released for x86, x64, and ARM64 Windows architecture.
243
+
Updates are released for x86, x64, and Arm64 Windows architecture.
218
244
219
245
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
220
246
@@ -268,7 +294,7 @@ After a new package version is released, support for the previous two versions i
268
294
269
295
| Article | Description |
270
296
|:---|:---|
271
-
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images)| Review antimalware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
297
+
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images)| Review anti-malware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
272
298
|[Manage how protection updates are downloaded and applied](manage-protection-updates-microsoft-defender-antivirus.md)| Protection updates can be delivered through many sources. |
273
299
|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)| You can schedule when protection updates should be downloaded. |
274
300
|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)| If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |
0 commit comments