You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-gp.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
36
36
37
37
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
38
38
39
-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
39
+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
40
40
41
41
1. Select the operating system.
42
42
@@ -179,7 +179,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
179
179
180
180
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
181
181
182
-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
182
+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Offboarding**.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-defender-deployment-tool.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,21 +95,21 @@ The Defender deployment tool enforces the following set of prerequisites checks,
95
95
96
96
:::image type="content" source="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png" alt-text="Screenshot showing the help command output." lightbox="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png":::
97
97
98
-
The following table provides examples of commands for useful scenarios.
99
-
100
-
|**Scenario**|**Command**|
101
-
|:-------------|:------------|
102
-
| Check for unmet non-blocking prerequisites |`sudo ./defender_deployment_tool.sh --pre-req-non-blocking`|
103
-
| Run the connectivity test |`sudo ./defender_deployment_tool.sh --connectivity-test`|
104
-
| Deploy to a custom location |`sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/`|
105
-
| Deploy from the insider-slow channel |`sudo ./defender_deployment_tool.sh --channel insiders-slow`|
106
-
| Deploy using a proxy |`sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>`|
107
-
| Deploy a specific agent version |`sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod`|
108
-
| Upgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004`|
109
-
| Downgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004`|
| Only onboard if Defender is already installed |`sudo ./defender_deployment_tool.sh --only-onboard`|
112
-
| Offboard Defender |`sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)*|
98
+
The following table provides examples of commands for useful scenarios.
99
+
100
+
|**Scenario**|**Command**|
101
+
|:-------------|:------------|
102
+
| Check for unmet non-blocking prerequisites |`sudo ./defender_deployment_tool.sh --pre-req-non-blocking`|
103
+
| Run the connectivity test |`sudo ./defender_deployment_tool.sh --connectivity-test`|
104
+
| Deploy to a custom location |`sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/`|
105
+
| Deploy from the insider-slow channel |`sudo ./defender_deployment_tool.sh --channel insiders-slow`|
106
+
| Deploy using a proxy |`sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>`|
107
+
| Deploy a specific agent version |`sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod`|
108
+
| Upgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004`|
109
+
| Downgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004`|
| Only onboard if Defender is already installed |`sudo ./defender_deployment_tool.sh --only-onboard`|
112
+
| Offboard Defender |`sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)*|
113
113
114
114
## Verify deployment status
115
115
@@ -204,11 +204,11 @@ Defender for Endpoint on Linux can be deployed from one of the following channel
204
204
- insiders-slow
205
205
- prod (production)
206
206
207
-
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices ininsiders-fastare the first to receive updates and new features, followed later byinsiders-slowand lastly byprod.
207
+
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices ininsiders-fastare the first to receive updates and new features, followed later byinsiders-slowand lastly byprod.
208
208
209
209
By default, the deployment tool configures your device to use the prod channel. You can use the configuration options described in this document to deploy from a different channel.
210
210
211
-
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use eitherinsiders-fast or insiders-slow. If you've already deployed Defender forEndpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustratedin the following example, where the channel is changed from insiders-fast to prod:
211
+
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use eitherinsiders-fast or insiders-slow. If you've already deployed Defender forEndpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustratedin the following example, where the channel is changed from insiders-fast to prod:
212
212
213
213
1. Remove the insiders-fast channel version of Defender for Endpoint on Linux..
214
214
@@ -225,7 +225,7 @@ To preview new features and provide early feedback, it's recommended that you co
225
225
1. Install Microsoft Defender for Endpoint on Linux using the production channel.
Copy file name to clipboardExpand all lines: defender-endpoint/onboarding.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ If you're onboarding devices in the Microsoft Defender portal, follow these step
37
37
38
38
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
39
39
40
-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40
+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
41
41
42
42
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
Copy file name to clipboardExpand all lines: defender-endpoint/preferences-setup.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ appliesto:
23
23
# Configure general Defender for Endpoint settings
24
24
25
25
26
-
Use the **Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
26
+
Use the **System > Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
Copy file name to clipboardExpand all lines: defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ This article provides information about new features and important product updat
26
26
## November 2025
27
27
28
28
- (Preview) The **Vulnerability Management** section in the Microsoft Defender portal is now located under **Exposure management**. This change is part of the vulnerability management integration to Microsoft Security Exposure Management, which significantly expands the scope and capabilities of the platform. [Learn more](#microsoft-defender-vulnerability-management-and-microsoft-security-exposure-management-integration).
29
-
- (Preview) **Microsoft Secure Score now includes new recommendations** to help organizations proactively prevent common endpoint attack techniques.
29
+
- (GA) **Microsoft Secure Score now includes new recommendations** to help organizations proactively prevent common endpoint attack techniques.
30
30
-**Require LDAP client signing** and **Require LDAP server signing** - help ensure integrity of directory requests so attackers can't tamper with or manipulate group memberships or permissions in transit.
31
31
-**Encrypt LDAP client traffic** - prevents exposure of credentials and sensitive user information by enforcing encrypted communication instead of clear-text LDAP.
32
32
-**Enforce LDAP channel binding** - prevents man-in-the-middle relay attacks by ensuring the authentication is cryptographically tied to the TLS session. If the TLS channel changes, the bind fails, stopping credential replay.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-devicetvmsecureconfigurationassessment-table.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ appliesto:
21
21
- Microsoft Defender XDR
22
22
- Microsoft Sentinel in the Microsoft Defender portal
23
23
ms.topic: reference
24
-
ms.date: 03/28/2025
24
+
ms.date: 11/27/2025
25
25
---
26
26
27
27
# DeviceTvmSecureConfigurationAssessment
@@ -48,8 +48,8 @@ For information on other tables in the advanced hunting schema, see [the advance
48
48
|`ConfigurationCategory`|`string`| Category or grouping to which the configuration belongs: Application, OS, Network, Accounts, Security controls |
49
49
|`ConfigurationSubcategory`|`string`| Subcategory or subgrouping to which the configuration belongs. In many cases, string describes specific capabilities or features. |
50
50
|`ConfigurationImpact`|`real`| Rated impact of the configuration to the overall configuration score (1-10) |
51
-
|`IsCompliant`|`boolean`| Indicates whether the configuration or policy is properly configured <br /> * A value of 1 is Compliant<br /> * A value of 0 is Not Compliant|
52
-
|`IsApplicable`|`boolean`| Indicates whether the configuration or policy applies to the device <br /> * A value of 1 is Applicable<br /> * A value of 0 is Not Applicable |
51
+
|`IsCompliant`|`boolean`| Indicates whether the configuration or policy is properly configured <br /> * A value of True is Compliant<br /> * A value of False is Not Compliant|
52
+
|`IsApplicable`|`boolean`| Indicates whether the configuration or policy applies to the device <br /> * A value of True is Applicable<br /> * A value of False is Not Applicable |
53
53
|`Context`|`dynamic`| Additional contextual information about the configuration or policy |
54
54
|`IsExpectedUserImpact`|`boolean`| Indicates whether there will be user impact if the configuration or policy is applied |
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-schema-changes.md
+9-7Lines changed: 9 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ appliesto:
21
21
- Microsoft Defender XDR
22
22
- Microsoft Sentinel in the Microsoft Defender portal
23
23
ms.topic: reference
24
-
ms.date: 11/04/2025
24
+
ms.date: 11/27/2025
25
25
---
26
26
27
27
# Advanced hunting schema - Naming changes
@@ -38,10 +38,12 @@ Naming changes are automatically applied to queries that are saved in Microsoft
38
38
- Queries that are saved elsewhere outside Microsoft Defender XDR
39
39
40
40
## November 2025
41
+
- The Boolean field values in advanced hunting results will change from numeric (`1` and `0`) to textual (`True` and `False`) on January 25, 2026. While your queries and custom detection rules won't be affected by this change, you might want to update your automated processes (for example, scripts, playbooks, or integrations) parsing these values.
41
42
42
-
The [`AADSignInEventsBeta`](advanced-hunting-aadsignineventsbeta-table.md) and [`AADSpnSignInEventsBeta`](advanced-hunting-aadspnsignineventsbeta-table.md) tables are being replaced by [`EntraIdSignInEvents`](advanced-hunting-entraidsigninevents-table.md) and [`EntraIdSpnSignInEvents`](advanced-hunting-entraidspnsigninevents-table.md), respectively. These changes are being made to remove the former tables' preview status and to align them with the existing product branding.
43
43
44
-
The `EntraIdSignInEvents` and `EntraIdSpnSignInEvents` tables are now available. The legacy `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` tables will remain in the schema for 30 days to allow time for updating your queries. Your custom detections will be updated automatically and won't require any changes. On December 9, 2025, `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` will be removed from the schema.
44
+
- The [`AADSignInEventsBeta`](advanced-hunting-aadsignineventsbeta-table.md) and [`AADSpnSignInEventsBeta`](advanced-hunting-aadspnsignineventsbeta-table.md) tables are being replaced by [`EntraIdSignInEvents`](advanced-hunting-entraidsigninevents-table.md) and [`EntraIdSpnSignInEvents`](advanced-hunting-entraidspnsigninevents-table.md), respectively. These changes are being made to remove the former tables' preview status and to align them with the existing product branding.
45
+
46
+
The `EntraIdSignInEvents` and `EntraIdSpnSignInEvents` tables are now available. The legacy `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` tables will remain in the schema for 30 days to allow time for updating your queries. Your custom detections will be updated automatically and won't require any changes. On December 9, 2025, `AADSignInEventsBeta`and `AADSpnSignInEventsBeta` will be removed from the schema.
45
47
46
48
## September 2025
47
49
@@ -60,7 +62,7 @@ The `DeviceTvmSoftwareInventoryVulnerabilities` table has been deprecated. Repla
60
62
61
63
## February 2021
62
64
63
-
1. In the [EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md) and [EmailEvents](advanced-hunting-emailevents-table.md) tables, the `MalwareFilterVerdict` and `PhishFilterVerdict` columns have been replaced by the `ThreatTypes` column. The `MalwareDetectionMethod` and `PhishDetectionMethod` columns were also replaced by the `DetectionMethods` column. This streamlining allows us to provide more information under the new columns. The mapping is provided below.
65
+
- In the [EmailAttachmentInfo](advanced-hunting-emailattachmentinfo-table.md) and [EmailEvents](advanced-hunting-emailevents-table.md) tables, the `MalwareFilterVerdict` and `PhishFilterVerdict` columns have been replaced by the `ThreatTypes` column. The `MalwareDetectionMethod` and `PhishDetectionMethod` columns were also replaced by the `DetectionMethods` column. This streamlining allows us to provide more information under the new columns. The mapping is provided below.
64
66
65
67
| Table name | Original column name | New column name | Reason for change
66
68
|--|--|--|--|
@@ -70,11 +72,11 @@ The `DeviceTvmSoftwareInventoryVulnerabilities` table has been deprecated. Repla
70
72
|`EmailEvents`|`MalwareFilterVerdict` <br>`PhishFilterVerdict`|`ThreatTypes`| Include more threat types |
71
73
72
74
73
-
2. In the `EmailAttachmentInfo` and `EmailEvents` tables, the `ThreatNames` column was added to give more information about the email threat. This column contains values like Spam or Phish.
75
+
- In the `EmailAttachmentInfo` and `EmailEvents` tables, the `ThreatNames` column was added to give more information about the email threat. This column contains values like Spam or Phish.
74
76
75
-
3. In the [DeviceInfo](advanced-hunting-deviceinfo-table.md) table, the `DeviceObjectId` column was replaced by the `AadDeviceId` column based on customer feedback.
77
+
- In the [DeviceInfo](advanced-hunting-deviceinfo-table.md) table, the `DeviceObjectId` column was replaced by the `AadDeviceId` column based on customer feedback.
76
78
77
-
4. In the [DeviceEvents](advanced-hunting-deviceevents-table.md) table, several ActionType names were modified to better reflect the description of the action. Details of the changes can be found below.
79
+
- In the [DeviceEvents](advanced-hunting-deviceevents-table.md) table, several ActionType names were modified to better reflect the description of the action. Details of the changes can be found below.
78
80
79
81
| Table name | Original ActionType name | New ActionType name | Reason for change
Copy file name to clipboardExpand all lines: defender-xdr/preview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,6 @@ If you already have preview features turned on and you're a Microsoft Defender f
64
64
65
65
:::image type="content" source="media/preview-features-settings.png" alt-text="Screenshot of the preview features settings.":::
66
66
67
-
If you don't yet have preview features turned on, manage Defender for Business and Defender for Endpoint preview features from the **Settings > Endpoints > Advanced features > Preview features** page, and Defender for Cloud Apps preview features from the **Settings > Cloud Apps > General > Preview features** page.
67
+
If you don't yet have preview features turned on, manage Defender for Business and Defender for Endpoint preview features from the **System > Settings > Endpoints > Advanced features > Preview features** page, and Defender for Cloud Apps preview features from the **Settings > Cloud Apps > General > Preview features** page.
0 commit comments