Skip to content

Commit c2b795e

Browse files
committed
Update microsoft-defender-antivirus-updates.md
1 parent c0400a3 commit c2b795e

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ This article also includes:
4242
- [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
4343
- [Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
4444

45-
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
45+
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
4646

4747
[!INCLUDE [MDE automated setup guide](../includes/security-analyzer-setup-guide.md)]
4848

@@ -58,7 +58,7 @@ Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-
5858
5959
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
6060

61-
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
61+
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
6262

6363
Engine updates are included with security intelligence updates and are released on a monthly cadence.
6464

@@ -82,7 +82,7 @@ For more information, see [Manage the sources for Microsoft Defender Antivirus p
8282

8383
- To learn more about the gradual rollout process, and to see more information about the next release, see [Manage the gradual rollout process for Microsoft Defender updates](manage-gradual-rollout.md).
8484

85-
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
85+
- To learn more about security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
8686

8787
- If you're looking for a list of Microsoft Defender processes, see the spreadsheet provided at [Enable access to Microsoft Defender for Endpoint service URLs in the proxy server](configure-environment.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The sheet also lists the services and their associated URLs that your network must be able to connect to.
8888

@@ -119,7 +119,7 @@ Updates contain:
119119
- Support phase: **Security and Critical Updates**
120120

121121
#### What's new
122-
- Improved handling of ASR rules exclusions.
122+
- Improved handling of Azure Site Recovery rules (Azure Site Recovery) exclusions.
123123
- Improved `AMSI` scan performance via changes to exclusion handling
124124
- Fixed Control Folder Access (CFA) protection for OneDrive when backup is enabled.
125125
- Fixed performance issues with Full scans when triggered from the portal.
@@ -134,16 +134,16 @@ Updates contain:
134134
- Added support for wildcards in Tamper protection trusted process.
135135
- Improved Device control policy enforcement in offline environments.
136136
- Fixed issue in `WDNisDrv.sys` driver causing system hangs during shutdown.
137-
- Improved detection logic to reduce false positives related to the ASR rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
138-
- Resolved an issue that could lead to a Windows device to be marked as [non-compliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
139-
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting was not honored.
137+
- Improved detection logic to reduce false positives related to the Azure Site Recovery rule, [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes)
138+
- Resolved an issue that could lead to a Windows device to be marked as [noncompliant in Intune](/mem/intune/fundamentals/reports#device-compliance-reports) when Microsoft Defender Antivirus starts.
139+
- Resolved an issue with catchup scan configuration, where the [DaysUntilAggressiveCatchupQuickScan](/windows/client-management/mdm/defender-csp#configurationdaysuntilaggressivecatchupquickscan) policy setting wasn't honored.
140140
- Fixed `SharedSignatureRoot` processing when an empty value was set.
141141
- Fixed a problem with [device control](device-control-overview.md) where certain file systems (like `FAT`, `FAT32`, `exFAT`) with volume information displayed when a blocking rule was defined.
142142
- Improved performance in specific scenarios where network files were accessed.
143-
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy was not being honored.
143+
- Fixed an issue with [Azure Virtual Desktop](/azure/virtual-desktop/overview) where the Intune policy wasn't being honored.
144144
- Fixed potential deadlock for [custom detection rules](/defender-xdr/custom-detection-rules) on the Windows client
145-
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) were not being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
146-
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) were not honored
145+
- Resolved an issue where [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) weren't being honored with [AMSI](/windows/win32/amsi/antimalware-scan-interface-portal).
146+
- Fixed issue impacting a subset of devices where [antivirus exclusions configured through SCCM](/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#exclusion-settings) weren't honored
147147

148148
> [!IMPORTANT]
149149
> On Windows Server 2019 and later, a new binary (`MpDefenderCoreService.exe`) will be included in the update package to support future service improvements (more information to follow).
@@ -163,7 +163,7 @@ Updates contain:
163163
- Fixed an issue with device control regarding printer security checks.
164164
- Resolved an issue with platform rollback after an upgrade from Windows 10 to Windows 11.
165165
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
166-
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and have reached their end-of-servicing date.
166+
- Removed support for Windows RT devices, like Surface RT, that use 32-bit ARM processors and reached their end-of-servicing date.
167167

168168
### July-2024 (Platform: 4.18.24070.5 | Engine: 1.1.24070.3)
169169

@@ -176,9 +176,9 @@ Updates contain:
176176
#### What's new
177177

178178
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
179-
- Optimized [network protection](network-protection.md) calls to the backend that occur as a result of suspicious connection checks.
179+
- Optimized [network protection](network-protection.md) calls to the backend that occurs as a result of suspicious connection checks.
180180
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in the [Defender CSP](/windows/client-management/mdm/defender-csp) so that changing this value in the console takes effect on the endpoint.
181-
- Resolved an issue where file evidence location was not always captured in scenarios where the remote location is inaccessible.
181+
- Resolved an issue where file evidence location wasn't always captured in scenarios where the remote location is inaccessible.
182182
- New event log added (`5016`) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
183183
- Fixed a prioritization issue with [full scans](mdav-scan-best-practices.md) initiated from the portal that resulted in longer than expected full scan duration.
184184

@@ -197,7 +197,7 @@ Platform and engine updates are provided on a monthly cadence. To be fully suppo
197197
During the technical support (only) phase, commercially reasonable support incidents are provided through Microsoft Customer Service & Support and Microsoft's managed support offerings (such as Premier Support). If a support incident requires escalation to development for further guidance, requires a nonsecurity update, or requires a security update, customers are asked to upgrade to the latest platform version or an intermediate update (*).
198198

199199
> [!NOTE]
200-
> If you are manually deploying Microsoft Defender Antivirus Platform Update, or if you are using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
200+
> If you're manually deploying Microsoft Defender Antivirus Platform Update, or if you're using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.
201201
202202
## How to roll back an update
203203

@@ -213,7 +213,7 @@ In the unfortunate event that you encounter issues after a platform update, you
213213

214214
## Platform version included with Windows 10 releases
215215

216-
The below table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
216+
The table provides the Microsoft Defender Antivirus platform and engine versions that are shipped with the latest Windows 10 releases:
217217

218218
|Windows 10 release |Platform version |Engine version |Support phase |
219219
|:---|:---|:---|:---|
@@ -234,13 +234,13 @@ For Windows 10 release information, see the [Windows lifecycle fact sheet](https
234234
235235
## Updates for Deployment Image Servicing and Management (DISM)
236236

237-
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and antimalware updates. Updates are available for:
237+
To avoid a gap in protection, keep your OS installation images up to date with the latest antivirus and anti-malware updates. Updates are available for:
238238

239239
- Windows 10 and 11 (Enterprise, Pro, and Home editions)
240240
- Windows Server 2022, Windows Server 2019, Windows Server 2016, and Windows Server 2012 R2
241241
- WIM and VHD(x) files
242242

243-
Updates are released for x86, x64, and ARM64 Windows architecture.
243+
Updates are released for x86, x64, and Arm64 Windows architecture.
244244

245245
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
246246

@@ -294,7 +294,7 @@ After a new package version is released, support for the previous two versions i
294294

295295
| Article | Description |
296296
|:---|:---|
297-
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images) | Review antimalware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
297+
|[Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images) | Review anti-malware update packages for your OS installation images (WIM and VHD files). Get Microsoft Defender Antivirus updates for Windows 10 (Enterprise, Pro, and Home editions), Windows Server 2019, Windows Server 2022, Windows Server 2016, and Windows Server 2012 R2 installation images. |
298298
|[Manage how protection updates are downloaded and applied](manage-protection-updates-microsoft-defender-antivirus.md) | Protection updates can be delivered through many sources. |
299299
|[Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) | You can schedule when protection updates should be downloaded. |
300300
|[Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md) | If an endpoint misses an update or scheduled scan, you can force an update or scan the next time a user signs in. |

0 commit comments

Comments
 (0)