Skip to content

Commit be44d65

Browse files
committed
Merge branch 'main' into release-preview-sentinel-lake
2 parents dcf9ad4 + 75d5e49 commit be44d65

33 files changed

+248
-251
lines changed

ATPDocs/alerts-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.reviewer: rlitinsky
1010

1111
## What are Microsoft Defender for Identity security alerts?
1212

13-
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity sensors on your network, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
13+
Microsoft Defender for Identity security alerts provide information about the suspicious activities detected by Defender for Identity, and the actors and computers involved in each threat. Alert evidence lists contain direct links to the involved users and computers, to help make your investigations easy and direct.
1414

1515
> [!NOTE]
1616
> Defender for Identity isn't designed to serve as an auditing or logging solution that captures every single operation or activity on the servers where the sensor is installed. It only captures the data required for its detection and recommendation mechanisms.

ATPDocs/understanding-security-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ The alerts page provides context into the alert, by combining attack signals and
6767

6868
> [!NOTE]
6969
> Microsoft Defender for Identity alerts currently appear in two different layouts in the Microsoft Defender XDR portal.
70-
> While the alert views show different information, all alerts are based on detections from Defender for Identity sensors. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
70+
> While the alert views show different information, all alerts are based on Defender for Identity collected data. The differences in layout and information shown are part of an ongoing transition to a unified alerting experience across Microsoft Defender products.
7171
7272
To view alerts from both Defender for Identity and Defender XDR, select **Filter**, then under **Service sources** choose **Microsoft Defender for Identity** and **Defender XDR**, and select **Apply**:
7373

CloudAppSecurityDocs/caac-known-issues.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -119,27 +119,26 @@ When a session policy is enforced using Edge in-browser protection and the user
119119

120120
Example Scenario:
121121

122-
A user was originally assigned a CA policy for the Salesforce application, along with an Defender for Cloud apps session policy that blocked file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
122+
A user was originally assigned a CA policy for Salesforce along with a Defender for Cloud Apps session policy to block file downloads. As a result, downloads were blocked when the user accessed Salesforce in Edge.
123123

124124
Although the admin later removed the CA policy, the user still experiences the download block in Edge due to cached policy data.
125125

126126
Mitigation Options:
127127

128128
Option 1: Automatic cleanup
129-
1. Reassign the user/app to the CA policy.
130-
2. Remove the corresponding Defender for Cloud Apps session policy.
131-
3. Have the user access the application using Edge, this will trigger the policy removal automatically.
132-
4. Remove the CA policy again.
129+
1. Add the user/app back into the scope of the CA policy.
130+
2. Remove the corresponding Defender for Cloud Apps session policy.
131+
3. Wait for users to access the application using Edge. This will automatically trigger the policy removal.
132+
4. Remove the user/app from the scope of the CA policy.
133133

134-
Option 2: Manual cleanup
135-
1. Delete the cached policy file
136-
- Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
137-
- Delete the file: mda_store.txt
138-
139-
2. Remove the work profile in Edge
140-
- Open Microsoft Edge.
141-
- Navigate to Profile Settings.
142-
- Delete the work profile associated with the outdated session policy.
134+
Option 2: Delete the cached policy file (Manual cleanup)
135+
1. Go to: C:\Users\<username>\AppData\Local\Microsoft\Edge\
136+
2. Delete the file: mda_store.1.txt
137+
138+
Option 3: Remove the work profile in Edge (Manual cleanup)
139+
1. Open Edge.
140+
2. Navigate to Profile Settings.
141+
3. Delete the work profile associated with the outdated session policy.
143142

144143
These steps will force a policy refresh and resolve enforcement issues related to outdated session policies.
145144

defender-endpoint/android-configure.md

Lines changed: 3 additions & 69 deletions
Original file line numberDiff line numberDiff line change
@@ -179,29 +179,6 @@ From version 1.0.3425.0303 of Microsoft Defender for Endpoint on Android, you're
179179
- For Android Enterprise with a work profile, only apps installed on the work profile will be supported.
180180
- For other BYOD modes, by default, vulnerability assessment of apps will **not** be enabled. However, when the device is on administrator mode, admins can explicitly enable this feature through Microsoft Intune to get the list of apps installed on the device. For more information, see details below.
181181

182-
### Configure privacy for device administrator mode
183-
184-
Use the following steps to **enable vulnerability assessment of apps** from devices in **device administrator** mode for targeted users.
185-
186-
> [!NOTE]
187-
> By default, this is turned off for devices enrolled with device admin mode.
188-
189-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
190-
191-
- **Platform**: Select Android device administrator
192-
- **Profile**: Select "Custom" and select Create.
193-
194-
2. In the **Basics** section, specify a name and description of the profile.
195-
196-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
197-
198-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
199-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderTVMPrivacyMode**
200-
- Data type: Select Integer in the drop-down list.
201-
- Value: Enter 0 to disable privacy setting (By default, the value is 1)
202-
203-
4. Select **Next** and assign this profile to targeted devices/users.
204-
205182
### Configure privacy for Android Enterprise work profile
206183

207184
Defender for Endpoint supports vulnerability assessment of apps in the work profile. However, in case you want to turn off this feature for targeted users, you can use the following steps:
@@ -222,28 +199,6 @@ Turning the above privacy controls on or off won't affect the device compliance
222199

223200
Privacy control for phish report can be used to disable the collection of domain name or website information in the phish threat report. This setting gives organizations the flexibility to choose whether they want to collect the domain name when a malicious or phish website is detected and blocked by Defender for Endpoint.
224201

225-
### Configure privacy for phishing alert report on Android Device Administrator enrolled devices:
226-
227-
Use the following steps to turn it on for targeted users:
228-
229-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
230-
231-
- **Platform**: Select Android device administrator.
232-
- **Profile**: Select "Custom" and select **Create**.
233-
234-
2. In the **Basics** section, specify a name and description of the profile.
235-
236-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
237-
238-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
239-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeURLInReport**
240-
- Data type: Select Integer in the drop-down list.
241-
- Value: Enter 1 to enable privacy setting. The default value is 0.
242-
243-
4. Select **Next** and assign this profile to targeted devices/users.
244-
245-
Using this privacy control won't affect the device compliance check or conditional access.
246-
247202
### Configure privacy for phishing alert report on Android Enterprise work profile
248203

249204
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -263,28 +218,6 @@ Turning the above privacy controls on or off won't affect the device compliance
263218

264219
Privacy control for malware threat report can be used to disable the collection of app details (name and package information) from the malware threat report. This setting gives organizations the flexibility to choose whether they want to collect the app name when a malicious app is detected.
265220

266-
### Configure privacy for malware alert report on Android Device Administrator enrolled devices:
267-
268-
Use the following steps to turn it on for targeted users:
269-
270-
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Devices** > **Configuration profiles** > **Create profile** and enter the following settings:
271-
272-
- **Platform**: Select Android device administrator.
273-
- **Profile**: Select "Custom" and select **Create**.
274-
275-
2. In the **Basics** section, specify a name and description of the profile.
276-
277-
3. In the **Configuration settings**, select Add **OMA-URI** setting:
278-
279-
- **Name**: Enter a unique name and description for this OMA-URI setting so you can find it easily later.
280-
- OMA-URI: **./Vendor/MSFT/DefenderATP/DefenderExcludeAppInReport**
281-
- Data type: Select Integer in the drop-down list.
282-
- Value: Enter 1 to enable privacy setting. The default value is 0.
283-
284-
4. Select **Next** and assign this profile to targeted devices/users.
285-
286-
Using this privacy control won't affect the device compliance check or conditional access. For example, devices with a malicious app will always have a risk level of "Medium".
287-
288221
### Configure privacy for malware alert report on Android Enterprise work profile
289222

290223
Use the following steps to turn on privacy for targeted users in the work profile:
@@ -308,9 +241,10 @@ Use the following steps to configure Disable out sign:
308241
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** > **App configuration policies** > **Add** > **Managed devices**.
309242
2. Give the policy a name, select **Platform > Android Enterprise**, and select the profile type.
310243
3. Select **Microsoft Defender for Endpoint** as the target app.
311-
4. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
244+
1. In the Settings page, select **Use configuration designer** and add **Disable Sign Out** as the key and **Integer** as the value type.
312245

313-
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles and 0 for device administrator mode.
246+
- By default, Disable Sign Out = 1 for Android Enterprise personally owned work profiles, fully managed, company owned personally enabled profiles.
247+
314248
- Admins need to make Disable Sign Out = 0 to enable the sign out button in the app. Users are able to see the sign out button once the policy is pushed.
315249

316250
5. Select **Next** and assign this profile to targeted devices and users.

defender-endpoint/android-intune.md

Lines changed: 1 addition & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -33,58 +33,7 @@ Learn how to deploy Defender for Endpoint on Android on Microsoft Intune Company
3333

3434
> [!NOTE]
3535
> **Defender for Endpoint on Android is now available on [Google Play](https://play.google.com/store/apps/details?id=com.microsoft.scmx)**
36-
>
37-
> You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across device administrator and Android Enterprise enrollment modes. Updates to the app are automatic via Google Play.
38-
39-
## Deploy on Device Administrator enrolled devices
40-
41-
Learn how to deploy Defender for Endpoint on Android by using the Microsoft Intune Company Portal for device administrator enrolled devices.
42-
43-
### Add as Android store app
44-
45-
1. In the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) , go to **Apps** \> **Android Apps** \> **Add** \> **Android store app**. Then choose **Select**.
46-
47-
:::image type="content" source="media/mda-addandroidstoreapp.png" alt-text="The Add Android store application pane in the Microsoft Intune admin center portal" lightbox="media/mda-addandroidstoreapp.png":::
48-
49-
2. On the **Add app** page, in the **App Information** section specify the following details:
50-
51-
- **Name**
52-
- **Description**
53-
- **Publisher** as Microsoft.
54-
- **App store URL** as `https://play.google.com/store/apps/details?id=com.microsoft.scmx` (URL for the Defender for Endpoint app in the Google Play Store)
55-
56-
Other fields are optional. Then select **Next**.
57-
58-
:::image type="content" source="media/mda-addappinfo.png" alt-text=" The Add App page displaying the application's publisher and URL information in the Microsoft Intune admin center portal" lightbox="media/mda-addappinfo.png":::
59-
60-
3. In the **Assignments** section, go to the **Required** section and select **Add group.** You can then choose the user group (or groups) to receive the Defender for Endpoint on Android app. Choose **Select**, and then tap **Next**.
61-
62-
The selected user group should consist of Intune enrolled users.
63-
64-
:::image type="content" source="media/363bf30f7d69a94db578e8af0ddd044b.png" alt-text="Screenshot that shows the Add group pane in the Add App page in the Microsoft Intune admin center portal." lightbox="media/363bf30f7d69a94db578e8af0ddd044b.png":::
65-
66-
4. In the **Review+Create** section, verify that all the information entered is correct, and then select **Create**.
67-
68-
In a few moments, the Defender for Endpoint app should be created, and a notification should appear in the upper right corner of the screen.
69-
70-
:::image type="content" source="media/86cbe56f88bb6e93e9c63303397fc24f.png" alt-text="The application status pane in the Microsoft Intune admin center portal" lightbox="media/86cbe56f88bb6e93e9c63303397fc24f.png":::
71-
72-
5. In the app information page that is displayed, in the **Monitor** section, select **Device install status** to verify that the device installation completed successfully.
73-
74-
:::image type="content" source="media/513cf5d59eaaef5d2b5bc122715b5844.png" alt-text="The Device install status page in the Microsoft Defender portal" lightbox="media/513cf5d59eaaef5d2b5bc122715b5844.png":::
75-
76-
### Complete onboarding and check status
77-
78-
1. After Defender for Endpoint on Android is installed on the device, you should see the app icon.
79-
80-
:::image type="content" source="media/7cf9311ad676ec5142002a4d0c2323ca.jpg" alt-text="The Microsoft Defender ATP icon listed in the Search pane" lightbox="media/7cf9311ad676ec5142002a4d0c2323ca.jpg":::
81-
82-
2. Tap the Microsoft Defender for Endpoint app icon, and follow the on-screen instructions to complete onboarding. The details include end-user acceptance of Android permissions required by Defender for Endpoint on Android.
83-
84-
3. Upon successful onboarding, the device shows up in the list of devices in the [Microsoft Defender portal](https://security.microsoft.com).
85-
86-
:::image type="content" source="media/9fe378a1dce0f143005c3aa53d8c4f51.png" alt-text="A device in the Microsoft Defender for Endpoint portal" lightbox="media/9fe378a1dce0f143005c3aa53d8c4f51.png":::
87-
36+
> > You can connect to Google Play from Microsoft Intune to deploy Defender for Endpoint app across device administrator and Android Enterprise enrollment modes. Updates to the app are automatic via Google Play.
8837
## Deploy on Android Enterprise enrolled devices
8938

9039
Defender for Endpoint on Android supports Android Enterprise enrolled devices.

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,18 @@ ms.date: 05/15/2025
2828

2929
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3030

31+
### Releases for Defender for Endpoint on Android
32+
33+
#### July 2025
34+
35+
|Build|1.0.7901.0101|
36+
| -------- | -------- |
37+
|Release Date|July 10, 2025|
38+
39+
**What's New**
40+
41+
UX Improvement for home page and tiles screens, for more details please visit this link - [Android UX Enhancement](/defender-endpoint/android-new-ux)
42+
3143
#### Alerts for activities related to open wireless connection and certificates are now detected as events
3244

3345
May 2025

defender-endpoint/ios-configure-features.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -384,6 +384,8 @@ Once the client versions are deployed to target iOS devices, processing starts.
384384

385385
> [!NOTE]
386386
> If you're using SSL inspection solution within your iOS device, add the domain names `securitycenter.windows.com` (in commercial environments) and `securitycenter.windows.us` (in GCC environments) for threat and vulnerability management features to work.
387+
>
388+
> The TVM Privacy permission approval screen will only appear for Unsupervised and Non-Zero touch enabled devices. Even For Non-Zero touch enabled devices approval is __not required only on supervised devices__ where the `issupervised` key is configured
387389
388390
## Disable sign out
389391

defender-endpoint/ios-whatsnew.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,18 @@ search.appverid: met150
2929

3030
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3131

32+
## Releases for Defender for Endpoint on iOS
33+
34+
### July-2025
35+
36+
| Build| 1.1.67040101|
37+
| -------- | -------- |
38+
| Release Date| July 8, 2025|
39+
40+
**What's New**
41+
42+
- UX Improvement, please visit the attached link for more details - [iOS UX Experience](/defender-endpoint/ios-new-ux)
43+
3244
#### Alerts for activities related to open wireless connections are now detected as events
3345

3446
**May 2025**

defender-endpoint/linux-install-manually.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -488,7 +488,7 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
488488
The following external package dependencies exist for the `mdatp` package:
489489

490490
- The mdatp RPM package requires `glibc >= 2.17`
491-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`
491+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`
492492
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`
493493

494494
> [!NOTE]
@@ -503,6 +503,7 @@ The following external package dependencies exist for the `mdatp` package:
503503
> - The `mde-netfilter` package also has the following package dependencies:
504504
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
505505
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
506+
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
506507

507508
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
508509

defender-endpoint/linux-installer-script.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -193,7 +193,7 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
193193
The following external package dependencies exist for the `mdatp` package:
194194

195195
- The `mdatp RPM` package requires - `glibc >= 2.17`
196-
- For DEBIAN the `mdatp` package requires `libc6 >= 2.23`,`uuid-runtime`
196+
- For DEBIAN the `mdatp` package requires `libc6 >= 2.23`
197197
- For Mariner the `mdatp` package requires `attr`,`diffutils`, `libacl`, `libattr`,`libselinux-utils`, `selinux-policy`, `policycoreutils`
198198

199199
> [!NOTE]
@@ -205,6 +205,7 @@ The following external package dependencies exist for the `mdatp` package:
205205
> - The `mde-netfilter` package also has the following package dependencies:
206206
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
207207
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
208+
> Beginning with version `101.25042.0003`, uuid-runtime is no longer required as an external-dependency.
208209

209210
## Troubleshoot installation issues
210211

0 commit comments

Comments
 (0)