You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/isolation-exclusions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: how-to
15
15
ms.subservice: edr
16
16
search.appverid: met150
17
-
ms.date: 06/22/2025
17
+
ms.date: 07/01/2025
18
18
---
19
19
20
20
# Isolation exclusions (preview)
@@ -57,7 +57,7 @@ There are two steps to using isolation exclusion: defining isolation exclusion r
57
57
58
58
### Prerequisites
59
59
60
-
* Isolation exclusion is available on Windows (minimum client version 10.8470) and macOS (minimum client version 101.240902).
60
+
* Isolation exclusion is available on Windows 11, Windows 10 version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and macOS.
61
61
* Isolation exclusion must be enabled. Enabling isolation exclusion requires Security Admin or Manage Security settings permissions or above. To enable isolation exclusion, sign in to the [Microsoft Defender portal](https://security.microsoft.com) and go to **Settings** > **Endpoints** > **Advanced features** and enable **Isolation Exclusion Rules** feature.
62
62
63
63
:::image type="content" source="./media/isolation-exclusions/enable-exclusions.png" alt-text="Screenshot showing how to enable isolation exclusions." lightbox="./media/isolation-exclusions/enable-exclusions.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/mde-plugin-wsl.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,16 +15,15 @@ ms.collection:
15
15
ms.custom:
16
16
- partner-contribution
17
17
audience: ITPro
18
-
ms.date: 11/11/2024
18
+
ms.date: 07/01/2025
19
19
search.appverid: MET150
20
20
---
21
21
22
22
# Microsoft Defender for Endpoint plug-in for Windows Subsystem for Linux (WSL)
23
23
24
24
**Applies to:**
25
25
26
-
- Microsoft Defender for Endpoint for servers
27
-
- Microsoft Defender for Servers Plan 1 or Plan 2
26
+
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
27
29
28
## Overview
30
29
@@ -134,7 +133,7 @@ If your host machine contains multiple proxy settings, the plug-in selects the p
134
133
135
134
3. Network & Internet proxy settings.
136
135
137
-
For example, if your host machine has both `Winhttp proxy` and `Network & Internet proxy`, the plug-in selects `Winhttp proxy` as the proxy configuration.
136
+
For example, if your host machine has both `Winhttp proxy` and `Network & Internet proxy`, the plug-in selects `Winhttp proxy` as the proxy configuration.
138
137
139
138
> [!NOTE]
140
139
> The `DefenderProxyServer` registry key is no longer supported. Follow the steps described earlier in this article to configure proxy in plug-in.
@@ -294,7 +293,7 @@ Check the following things:
294
293
- If your machine has a proxy setup, run the command `healthCheck --extendedProxy`. This will provide information on which proxy(s) is set on your machine and whether these configurations are invalid for WSL defender.
- If the steps mentioned above do not fix the problem, include the following configuration settings in the `.wslconfig` located in your `%UserProfile%` and restart WSL. Details about settings can be found in [WSL Settings](/windows/wsl/wsl-config#main-wsl-settings).
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-mac.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for Endpoint on macOS overview
3
3
ms.reviewer: joshbregman
4
-
description: An introducttion and overview of Microsoft Defender for Endpoint on macOS.
4
+
description: An introduction and overview of Microsoft Defender for Endpoint on macOS.
5
5
ms.service: defender-endpoint
6
6
author: emmwalshh
7
7
ms.author: ewalsh
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: install-set-up-deploy
16
16
ms.subservice: macos
17
17
search.appverid: met150
18
-
ms.date: 06/17/2025
18
+
ms.date: 07/01/2025
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on macOS
@@ -46,7 +46,7 @@ This article describes how to install, configure, update, and use Defender for E
46
46
> [!TIP]
47
47
> If you have any feedback that you would like to share, submit it by opening Microsoft Defender for Endpoint on Mac on your device and navigating to **Help**\>**Send feedback**.
48
48
49
-
To get the latest features, including preview capabilities (such as endpoint detection and response for your Mac devices), configure your macOS device running Defender for Endpoint to use the Beta channel (formerly `Insider-Fast`).
49
+
To get the latest features, including preview capabilities, configure your macOS device running Defender for Endpoint to use the Beta channel (formerly `Insider-Fast`).
50
50
51
51
## How to install Microsoft Defender for Endpoint on Mac
Copy file name to clipboardExpand all lines: defender-endpoint/respond-machine-alerts.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
5
5
ms.author: diannegali
6
6
author: diannegali
7
7
ms.localizationpriority: medium
8
-
ms.date: 04/09/2025
8
+
ms.date: 07/01/2025
9
9
manager: deniseb
10
10
audience: ITPro
11
11
ms.collection:
@@ -216,7 +216,7 @@ Depending on the severity of the attack and the sensitivity of the device, you m
216
216
-`iptables`
217
217
-`ip6tables`
218
218
- Linux kernel with `CONFIG_NETFILTER`, `CONFID_IP_NF_IPTABLES`, and `CONFIG_IP_NF_MATCH_OWNER`
219
-
- Selective isolation is available for devices running Windows 10, version 1709 or later, and Windows 11. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
219
+
- Selective isolation is available for devices running on Windows 11, Windows 10 version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and macOS. For more information about selective isolation, see [Isolation exclusions](./isolation-exclusions.md).
220
220
- When isolating a device, only certain processes and destinations are allowed. Therefore, devices that are behind a full VPN tunnel won't be able to reach the Microsoft Defender for Endpoint cloud service after the device is isolated. We recommend using a split-tunneling VPN for Microsoft Defender for Endpoint and Microsoft Defender Antivirus cloud-based protection-related traffic.
221
221
- The feature supports VPN connection.
222
222
- You must have at least the `Active remediation actions` role assigned. For more information, see [Create and manage roles](user-roles.md).
@@ -64,8 +64,8 @@ The following table gives information about the supported Microsoft Defender for
64
64
> - For Windows Server 2012 R2 and Windows Server 2016, use the modern, unified solution. See [Onboard Windows Servers to the Defender for Endpoint service](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2).
65
65
> - On Linux Server, network protection, web protection, and custom network indicators are currently in preview.
66
66
> - On Linux, network protection, web protection, and custom network indicators are currently in preview.
67
-
> - Endpoint & network device discovery is supported on Windows Server 2019 or later, and on Windows 10 and Windows 11.
68
-
> - Microsoft Defender Vulnerability Management is not supported on Rocky and Alma currently.
67
+
> - Endpoint & network device discovery is supported on Windows Server 2019 or later, and on Windows 10 and Windows 11.
69
68
> - For Windows 7, Windows 8.1, and Windows Server 2008 R2, use [MMA](/defender-endpoint/onboard-downlevel#install-and-configure-microsoft-monitoring-agent-mma) for the EDR sensor and [System Center Endpoint Protection](/defender-endpoint/onboard-downlevel#configure-and-update-system-center-endpoint-protection-clients) (SCEP) for antivirus protection.
70
69
70
+
71
71
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-office-365/defender-for-office-365-whats-new.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
8
8
author: chrisda
9
9
manager: deniseb
10
10
ms.localizationpriority: medium
11
-
ms.date: 05/19/2025
11
+
ms.date: 7/1/2025
12
12
audience: ITPro
13
13
ms.collection:
14
14
- m365-security
@@ -47,6 +47,8 @@ For more information on what's new with other Microsoft Defender security produc
47
47
48
48
For more information, see [MC1096885](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC1096885).
49
49
50
+
- AI-powered Submissions Response introduces generative AI explanations for admin email submissions to Microsoft. For more information, see [Submission result definitions](submissions-result-definitions.md).
51
+
50
52
## May 2025
51
53
52
54
- In government cloud environments, :::image type="icon" source="media/m365-cc-sc-take-actions-icon.png" border="false"::: **Take action** replaces the **Message actions** drop down list on the **Email** tab (view) of the details area of the **All email**, **Malware**, or **Phish** views in [Threat Explorer (Explorer)](threat-explorer-real-time-detections-about.md):
0 commit comments