You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-updates.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ This article also includes:
42
42
-[Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
43
43
-[Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
44
44
45
-
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
45
+
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
@@ -58,7 +58,7 @@ Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-
58
58
59
59
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
60
60
61
-
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
61
+
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
62
62
63
63
Engine updates are included with security intelligence updates and are released on a monthly cadence.
64
64
@@ -82,7 +82,7 @@ For more information, see [Manage the sources for Microsoft Defender Antivirus p
82
82
83
83
- To learn more about the gradual rollout process, and to see more information about the next release, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md).
84
84
85
-
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
85
+
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
86
86
87
87
- If you're looking for a list of Microsoft Defender processes, see the spreadsheet provided at [Enable access to Microsoft Defender for Endpoint service URLs in the proxy server](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The sheet also lists the services and their associated URLs that your network must be able to connect to.
88
88
@@ -119,7 +119,7 @@ Updates contain:
119
119
- Support phase: **Security and Critical Updates**
120
120
121
121
#### What's new
122
-
- Improved handling of ASR rules exclusions.
122
+
- Improved handling of Azure Site Recovery rules (Azure Site Recovery) exclusions.
123
123
- Improved `AMSI` scan performance via changes to exclusion handling
124
124
- Fixed Control Folder Access (CFA) protection for OneDrive when backup is enabled.
125
125
- Fixed performance issues with Full scans when triggered from the portal.
@@ -134,16 +134,16 @@ Updates contain:
134
134
- Added support for wildcards in Tamper protection trusted process.
135
135
- Improved Device control policy enforcement in offline environments.
136
136
- Fixed issue in `WDNisDrv.sys` driver causing system hangs during shutdown.
137
-
- Improved detection logic to reduce false positives related to the ASR rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
138
-
- Resolved an issue that could lead to a Windows device to be marked as [non-compliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
139
-
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting was not honored.
137
+
- Improved detection logic to reduce false positives related to the Azure Site Recovery rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
138
+
- Resolved an issue that could lead to a Windows device to be marked as [noncompliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
139
+
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting wasn't honored.
140
140
- Fixed `SharedSignatureRoot` processing when an empty value was set.
141
141
- Fixed a problem with [device control](device-control-overview.md) where certain file systems (like `FAT`, `FAT32`, `exFAT`) with volume information displayed when a blocking rule was defined.
142
142
- Improved performance in specific scenarios where network files were accessed.
143
-
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy was not being honored.
143
+
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy wasn't being honored.
144
144
- Fixed potential deadlock for [custom detection rules](/defender-xdr/custom-detection-rules) on the Windows client
145
-
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md)were not being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
146
-
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings)were not honored
145
+
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md)weren't being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
146
+
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings)weren't honored
147
147
148
148
> [!IMPORTANT]
149
149
> On Windows Server 2019 and later, a new binary (`MpDefenderCoreService.exe`) will be included in the update package to support future service improvements (more information to follow).
@@ -163,7 +163,7 @@ Updates contain:
163
163
- Fixed an issue with device control regarding printer security checks.
164
164
- Resolved an issue with platform rollback after an upgrade from Windows 10 to Windows 11.
165
165
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
166
-
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and have reached their end-of-servicing date.
166
+
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and reached their end-of-servicing date.
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
179
-
- Optimized [network protection](network-protection.md) calls to the backend that occur as a result of suspicious connection checks.
179
+
- Optimized [network protection](network-protection.md) calls to the backend that occurs as a result of suspicious connection checks.
180
180
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in the [Defender CSP](/windows/client-management/mdm/defender-csp) so that changing this value in the console takes effect on the endpoint.
181
-
- Resolved an issue where file evidence location was not always captured in scenarios where the remote location is inaccessible.
181
+
- Resolved an issue where file evidence location wasn't always captured in scenarios where the remote location is inaccessible.
182
182
- New event log added (`5016`) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
183
183
- Fixed a prioritization issue with [full scans](mdav-scan-best-practices.md) initiated from the portal that resulted in longer than expected full scan duration.
184
184
@@ -197,7 +197,7 @@ Platform and engine updates are provided on a monthly cadence. To be fully suppo
197
197
During the technical support (only) phase, commercially reasonable support incidents are provided through Microsoft Customer Service & Support and Microsoft's managed support offerings (such as Premier Support). If a support incident requires escalation to development for further guidance, requires a nonsecurity update, or requires a security update, customers are asked to upgrade to the latest platform version or an intermediate update (*).
198
198
199
199
> [!NOTE]
200
-
> If you are manually deploying Microsoft Defender Antivirus Platform Update, or if you are using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
200
+
> If you're manually deploying Microsoft Defender Antivirus Platform Update, or if you're using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
201
201
202
202
## How to roll back an update
203
203
@@ -213,7 +213,7 @@ In the unfortunate event that you encounter issues after a platform update, you
213
213
214
214
## Platform version included with Windows 10 releases
215
215
216
-
The below table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
216
+
The table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
217
217
218
218
|Windows 10 release |Platform version |Engine version |Support phase |
219
219
|:---|:---|:---|:---|
@@ -234,13 +234,13 @@ For Windows 10 release information, see the [Windows lifecycle fact sheet](https
234
234
235
235
## Updates for Deployment Image Servicing and Management (DISM)
236
236
237
-
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and antimalware updates. Updates are available for:
237
+
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and anti-malware updates. Updates are available for:
238
238
239
239
- Windows 10 and 11 (Enterprise, Pro, and Home editions)
240
240
- Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows Server 2012 R2
241
241
- WIM and VHD(x) files
242
242
243
-
Updates are released for x86, x64, and ARM64 Windows architecture.
243
+
Updates are released for x86, x64, and Arm64 Windows architecture.
244
244
245
245
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
246
246
@@ -294,7 +294,7 @@ After a new package version is released, support for the previous two versions i
294
294
295
295
| Article | Description |
296
296
|:---|:---|
297
-
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images)| Review antimalware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
297
+
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images)| Review anti-malware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
298
298
|[Manage how protection updates are downloaded and applied](manage-protection-updates-microsoft-defender-antivirus.md)| Protection updates can be delivered through many sources. |
299
299
|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)| You can schedule when protection updates should be downloaded. |
300
300
|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)| If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |
0 commit comments