Skip to content

Commit b642972

Browse files
authored
Merge pull request #2661 from MicrosoftDocs/mdav-release
Mdav release notes - engine
2 parents ae87863 + b4bbcac commit b642972

File tree

1 file changed

+46
-20
lines changed

1 file changed

+46
-20
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 46 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 10/30/2024
6+
ms.date: 02/20/2025
77
audience: ITPro
88
ms.topic: reference
9-
author: denisebmsft
10-
ms.author: deniseb
9+
author: emmwalshh
10+
ms.author: ewalsh
1111
ms.custom: nextgen
1212
ms.reviewer: pahuijbr, tudobril, yongrhee
1313
manager: deniseb
@@ -42,7 +42,7 @@ This article also includes:
4242
- [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
4343
- [Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
4444

45-
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
45+
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
4646

4747
[!INCLUDE [MDE automated setup guide](../includes/security-analyzer-setup-guide.md)]
4848

@@ -58,7 +58,7 @@ Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-
5858
5959
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
6060

61-
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
61+
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
6262

6363
Engine updates are included with security intelligence updates and are released on a monthly cadence.
6464

@@ -82,7 +82,7 @@ For more information, see [Manage the sources for Microsoft Defender Antivirus p
8282

8383
- To learn more about the gradual rollout process, and to see more information about the next release, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md).
8484

85-
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
85+
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
8686

8787
- If you're looking for a list of Microsoft Defender processes, see the spreadsheet provided at [Enable access to Microsoft Defender for Endpoint service URLs in the proxy server](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The sheet also lists the services and their associated URLs that your network must be able to connect to.
8888

@@ -98,6 +98,32 @@ Updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### January-2025 (Platform: 4.18.25010.xxxx | Engine: 1.1.25010.7)
102+
103+
- Security intelligence update version: **1.423.21.0**
104+
- Release date: **February 20, 2025** (Engine) / **TBD** (Platform)
105+
- Platform: **4.18.225010.xxxx** (*Platform release is pending*)
106+
- Engine: **1.1.25010.7**
107+
- Support phase: **Security and Critical Updates**
108+
109+
#### What's new
110+
111+
- Improved handling of [attack surface reduction rule](attack-surface-reduction-rules-reference.md) exclusions.
112+
- Improved AMSI scan performance with changes to exclusion handling.
113+
- Fixed [Controlled Folder Access](controlled-folders.md) (CFA) protection for OneDrive when backup is enabled.
114+
- Fixed performance issues with [full scans](schedule-antivirus-scans.md) when initiated from the Microsoft Defender portal.
115+
- Fixed ASR warn mode processing for containerized objects (such as Office files) when the unblock option is selected.
116+
- Fixed ASR warn mode processing when exclusions are applied.
117+
- Fixed performance handling with file transfers having Mark of the Web (MoTW) set.
118+
- Implemented `AzureAd` cache to handle offline environments with [device control](device-control-overview.md).
119+
- Resolved an issue with `TrustLabelProtectionStatus` being reset after a Microsoft Defender platform update.
120+
- Resolved an issue with [tamper protection for exclusions](/defender-endpoint/manage-tamper-protection-intune#tamper-protection-for-antivirus-exclusions) where an exclusion policy was handled by System Center Configuration Manager.
121+
- Fixed issue with device control auditing of removable media.
122+
- Fixed issue with MDM policy management on Azure Virtual Desktop.
123+
- Added support for wildcards in [tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection) trusted process.
124+
- Improved device control policy enforcement in offline environments.
125+
- Fixed issue in the `WDNisDrv.sys` driver that caused system hangs during shutdown.
126+
101127
### September-2024 (Platform: 4.18.24090.11 | Engine 1.1.24090.11)
102128

103129
- Security intelligence update version: **1.421.12.0**
@@ -108,16 +134,16 @@ Updates contain:
108134

109135
#### What's new
110136

111-
- Improved detection logic to reduce false positives related to the ASR rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
112-
- Resolved an issue that could lead to a Windows device to be marked as [non-compliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
113-
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting was not honored.
137+
- Improved detection logic to reduce false positives related to the Azure Site Recovery rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
138+
- Resolved an issue that could lead to a Windows device to be marked as [noncompliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
139+
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting wasn't honored.
114140
- Fixed `SharedSignatureRoot` processing when an empty value was set.
115141
- Fixed a problem with [device control](device-control-overview.md) where certain file systems (like `FAT`, `FAT32`, `exFAT`) with volume information displayed when a blocking rule was defined.
116142
- Improved performance in specific scenarios where network files were accessed.
117-
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy was not being honored.
143+
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy wasn't being honored.
118144
- Fixed potential deadlock for [custom detection rules](/defender-xdr/custom-detection-rules) on the Windows client
119-
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) were not being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
120-
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) were not honored
145+
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) weren't being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
146+
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) weren't honored
121147

122148
> [!IMPORTANT]
123149
> On Windows Server 2019 and later, a new binary (`MpDefenderCoreService.exe`) will be included in the update package to support future service improvements (more information to follow).
@@ -137,7 +163,7 @@ Updates contain:
137163
- Fixed an issue with device control regarding printer security checks.
138164
- Resolved an issue with platform rollback after an upgrade from Windows 10 to Windows 11.
139165
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
140-
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and have reached their end-of-servicing date.
166+
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and reached their end-of-servicing date.
141167

142168
### July-2024 (Platform: 4.18.24070.5 | Engine: 1.1.24070.3)
143169

@@ -150,9 +176,9 @@ Updates contain:
150176
#### What's new
151177

152178
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
153-
- Optimized [network protection](network-protection.md) calls to the backend that occur as a result of suspicious connection checks.
179+
- Optimized [network protection](network-protection.md) calls to the backend that occurs as a result of suspicious connection checks.
154180
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in the [Defender CSP](/windows/client-management/mdm/defender-csp) so that changing this value in the console takes effect on the endpoint.
155-
- Resolved an issue where file evidence location was not always captured in scenarios where the remote location is inaccessible.
181+
- Resolved an issue where file evidence location wasn't always captured in scenarios where the remote location is inaccessible.
156182
- New event log added (`5016`) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
157183
- Fixed a prioritization issue with [full scans](mdav-scan-best-practices.md) initiated from the portal that resulted in longer than expected full scan duration.
158184

@@ -171,7 +197,7 @@ Platform and engine updates are provided on a monthly cadence. To be fully suppo
171197
During the technical support (only) phase, commercially reasonable support incidents are provided through Microsoft Customer Service & Support and Microsoft's managed support offerings (such as Premier Support). If a support incident requires escalation to development for further guidance, requires a nonsecurity update, or requires a security update, customers are asked to upgrade to the latest platform version or an intermediate update (*).
172198

173199
> [!NOTE]
174-
> If you are manually deploying Microsoft Defender Antivirus Platform Update, or if you are using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
200+
> If you're manually deploying Microsoft Defender Antivirus Platform Update, or if you're using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
175201
176202
## How to roll back an update
177203

@@ -187,7 +213,7 @@ In the unfortunate event that you encounter issues after a platform update, you
187213

188214
## Platform version included with Windows 10 releases
189215

190-
The below table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
216+
The table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
191217

192218
|Windows 10 release |Platform version |Engine version |Support phase |
193219
|:---|:---|:---|:---|
@@ -208,13 +234,13 @@ For Windows 10 release information, see the [Windows lifecycle fact sheet](https
208234
209235
## Updates for Deployment Image Servicing and Management (DISM)
210236

211-
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and antimalware updates. Updates are available for:
237+
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and anti-malware updates. Updates are available for:
212238

213239
- Windows 10 and 11 (Enterprise, Pro, and Home editions)
214240
- Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows Server 2012 R2
215241
- WIM and VHD(x) files
216242

217-
Updates are released for x86, x64, and ARM64 Windows architecture.
243+
Updates are released for x86, x64, and Arm64 Windows architecture.
218244

219245
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
220246

@@ -268,7 +294,7 @@ After a new package version is released, support for the previous two versions i
268294

269295
| Article | Description |
270296
|:---|:---|
271-
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images) | Review antimalware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
297+
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images) | Review anti-malware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
272298
|[Manage how protection updates are downloaded and applied](manage-protection-updates-microsoft-defender-antivirus.md) | Protection updates can be delivered through many sources. |
273299
|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) | You can schedule when protection updates should be downloaded. |
274300
|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md) | If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |

0 commit comments

Comments
 (0)