Skip to content

Commit caa2fdf

Browse files
committed
Merge branch 'main' into EOP-chrisda
2 parents 9e85bee + 3d68711 commit caa2fdf

File tree

7 files changed

+67
-57
lines changed

7 files changed

+67
-57
lines changed

ATPDocs/health-alerts.md

Lines changed: 14 additions & 14 deletions
Large diffs are not rendered by default.

defender-endpoint/respond-file-alerts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,8 @@ This action takes effect on devices with Windows 10, version 1703 or later, and
9090
- **Search box** - select **File** from the drop-down menu and enter the file name
9191

9292
> [!NOTE]
93-
> The stop and quarantine file action is limited to a maximum of 1000 devices. To stop a file on a larger number of devices, see [Add indicator to block or allow file](#add-indicator-to-block-or-allow-a-file).
93+
> The stop and quarantine file action is limited to a maximum of 1000 devices. To stop a file on a larger number of devices, see [Add indicator to block or allow file](#add-indicator-to-block-or-allow-a-file).<br>
94+
> The Stop and quarantine action has a maximum timeout period of 3 days. If the targeted device remains offline for longer than this period after the action is initiated, the action will not be delivered to that device.<br> To ensure the file remains blocked beyond the timeout or after the action completes, it's recommended to create an indicator to block the file explicitly.
9495
9596
2. Go to the top bar and select **Stop and Quarantine File**.
9697

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 06/27/2025
17+
ms.date: 07/04/2025
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -57,7 +57,7 @@ This article provides instructions on how to run the tool via Live Response on W
5757

5858
1. While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
5959

60-
```console
60+
```console
6161
Putfile MDEClientAnalyzerPreview.zip
6262
Run MDELiveAnalyzer.ps1
6363
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
@@ -114,7 +114,7 @@ The following script performs the first six steps of the [Running the Binary ver
114114

115115
echo "Getting XMDEClientAnalyzerBinary"
116116
wget --quiet -O /tmp/XMDEClientAnalyzerBinary.zip https://go.microsoft.com/fwlink/?linkid=2297517
117-
echo 'c65a4e4c6851d130942bfacd147a9d18b8a92b4f50facf519477fd1c41a1c323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
117+
echo 'C65A4E4C6851D130942BFACD147A9D18B8A92B4F50FACF519477FD1C41A1C323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
118118

119119
echo "Unzipping XMDEClientAnalyzerBinary.zip"
120120
unzip -q /tmp/XMDEClientAnalyzerBinary.zip -d /tmp/XMDEClientAnalyzerBinary
@@ -140,7 +140,7 @@ The following script performs the first six steps of the [Running the Python ver
140140

141141
echo "Getting XMDEClientAnalyzer.zip"
142142
wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
143-
echo '36C2B13AE657456119F3DC2A898FD9D354499A33F65015670CE2CD8A937F3C66 XMDEClientAnalyzer.zip' | sha256sum -c
143+
echo '07E6A7B89E28A78309D5B6F1E25E4CDFBA9CA141450E422D76441C03AD3477E7 XMDEClientAnalyzer.zip' | sha256sum -c
144144

145145
echo "Unzipping XMDEClientAnalyzer.zip"
146146
unzip -q XMDEClientAnalyzer.zip -d /tmp/XMDEClientAnalyzer

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.localizationpriority: medium
1616
ms.topic: troubleshooting
17-
ms.date: 06/05/2025
17+
ms.date: 07/07/2025
1818
---
1919

2020
# Vulnerability support in Microsoft Defender Vulnerability Management
@@ -33,6 +33,28 @@ This article provides information on inaccuracies that have been reported. You c
3333
3434
The following tables present the relevant vulnerability information organized by month.
3535

36+
## July 2025
37+
38+
| Inaccuracy report ID | Description | Fix date |
39+
|---|---|---|
40+
| 96976 | Improved accuracy for HashiCorp Boundary | 01-July-25 |
41+
42+
## June 2025
43+
44+
| Inaccuracy report ID | Description | Fix date |
45+
|---|---|---|
46+
| 91312 | Fixed inaccuracy in Zoom vulnerabilities- CVE-2018-15715, CVE-2024-27238, CVE-2024-27240 & CVE-2024-39819 | 10-June-25 |
47+
| 97104 | Fixed inaccuracy in Devolutions Remote Desktop Manager vulnerabilities- CVE-2024-11621, CVE-2024-8474, CVE-2025-1635 & CVE-2025-1636 | 10-June-25 |
48+
| 93464 | Fixed inaccuracy in Teamviewer vulnerabilities- CVE-2024-1933, CVE-2024-7479, CVE-2024-7481 & CVE-2025-0065 | 24-June-25 |
49+
| 99450 | Fixed inaccurate detections in MongoDB | 24-June-25 |
50+
| 98375 | Fixed inaccuracy in CVE-2023-32430 | 24-June-25 |
51+
| 99991 | Fixed bad normalization in Postman | 24-June-25 |
52+
| - | Fixed inaccurate detections in Git-scm | 24-June-25 |
53+
| 96989 | Fixed bad detections in Santesoft Sante Free PACS Server | 24-June-25 |
54+
| - | Added Microsoft Defender Vulnerability Management support for UI for ASP.NET AJAX | 24-June-25 |
55+
| - | Fixed bad normalization in Zotero | 24-June-25 |
56+
| 98813 | Fixed inaccuracy in Gonitro vulnerabilities- CVE-2016-8709 and CVE-2024-35288 | 24-June-25 |
57+
3658
## May 2025
3759

3860
| Inaccuracy report ID | Description | Fix date |

defender-vulnerability-management/tvm-supported-os.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- Tier2
1414
ms.topic: reference
1515
search.appverid: met150
16-
ms.date: 06/27/2025
16+
ms.date: 07/07/2025
1717
---
1818

1919
# Supported operating systems, platforms, and capabilities

unified-secops-platform/mto-advanced-hunting.md

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@ title: Advanced hunting in Microsoft Defender multitenant management
33
description: Learn about advanced hunting in Microsoft Defender multitenant management
44
search.appverid: met150
55
ms.service: unified-secops-platform
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: bagol
7+
author: batamig
88
ms.localizationpriority: medium
9-
manager: dansimp
9+
manager: orspodek
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- highpri
1414
- tier1
1515
- usx-security
1616
ms.topic: article
17-
ms.date: 05/02/2025
17+
ms.date: 07/07/2025
1818
appliesto:
1919
- Microsoft Defender XDR
2020
- Microsoft Sentinel in the Microsoft Defender portal
@@ -23,18 +23,15 @@ appliesto:
2323
# Advanced hunting in Microsoft Defender multitenant management
2424

2525
Advanced hunting in Microsoft Defender multitenant management allows you to proactively hunt for intrusion attempts and breach activity in email, data, devices, and accounts across multiple tenants and workspaces at the same time. If you have multiple tenants with Microsoft Sentinel workspaces onboarded to the Microsoft Defender portal, search for security information and event management (SIEM) data together with extended detection and response (XDR) data across multiple tenants and workspaces.
26-
2726

2827
Multiple workspaces per tenant are supported in multitenant Advanced hunting as preview.
2928

30-
3129
## Quotas
3230

3331
In multitenant environments, advanced hunting queries can return a maximum of 50,000 records in total. The result set from each individual tenant is capped at 50,000 divided by the number of tenants queried.
3432

3533
For more information about service limits in advanced hunting, read [Understand advanced hunting quotas](/defender-xdr/advanced-hunting-limits#understand-advanced-hunting-quotas-and-usage-parameters).
3634

37-
3835
## Run cross-tenant queries
3936

4037
You can run any query that you already have access to in the multitenant management **Advanced hunting** page.
@@ -70,8 +67,8 @@ You can run any query that you already have access to in the multitenant managem
7067
| take 10
7168
```
7269

73-
> [!NOTE]
74-
> If you have tables with the same name but different schemas in multiple workspaces and want to use them in the same query, you should use the workspace operator to uniquely identify the table that you need.
70+
>[!IMPORTANT]
71+
> Running queries across multiple tenants using the `adx(x)` operator will run separate ADX queries per tenant and aggregate them, which might return duplicate results. Use the `adx(x)` operator with multiple tenants only if you need to join tenant results with ADX data. For more information about ADX in Advanced hunting, see [Use Microsoft Sentinel functions, saved queries, and custom rules](/defender-xdr/advanced-hunting-defender-use-custom-rules#use-adx-operator-for-azure-data-explorer-queries).
7572
7673
To learn more about advanced hunting in Microsoft Defender XDR, read [Proactively hunt for threats with advanced hunting in Microsoft Defender XDR](/defender-xdr/advanced-hunting-overview).
7774

@@ -101,16 +98,14 @@ For more information, see [Query multiple workspaces](/azure/sentinel/extend-sen
10198
10299
## View schema tables
103100

104-
You can view the [advanced hunting schema tables](/defender-xdr/advanced-hunting-schema-tables) in the left pane inside the advanced hunting page under the **Schema** tab.
101+
View the [advanced hunting schema tables](/defender-xdr/advanced-hunting-schema-tables) in the left pane inside the advanced hunting page under the **Schema** tab.
105102

106103
The schema list is a unified view of all tables from all your tenants regardless of the tenant selected in the upper right tenant selector.
107104

108105
This could mean that some tables that appear here might only be available for query in some tenants, like custom Microsoft Sentinel tables.
109106

110-
111107
## View and manage custom detection rules
112108

113-
114109
You can also manage custom detection rules from multiple tenants in the custom detection rules page.
115110

116111
### View custom detection rules by tenant
@@ -139,11 +134,6 @@ To manage detection rules:
139134

140135
1. Select **Open detection rules** to view this rule in a new tab for the specific tenant in the [Microsoft Defender portal](https://security.microsoft.com). To learn more, see [Custom detection rules](/defender-xdr/custom-detection-rules).
141136

142-
143-
144-
145-
146-
147137
## Related content
148138

149139
- [Set up Microsoft Defender multitenant management](mto-requirements.md)

unified-secops-platform/whats-new.md

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: unified-secops-platform
66
ms.author: bagol
77
author: batamig
88
ms.localizationpriority: medium
9-
ms.date: 07/01/2025
9+
ms.date: 07/08/2025
1010
manager: orspodek
1111
audience: ITPro
1212
ms.collection:
@@ -22,6 +22,21 @@ This article lists recent features added for unified security operations in the
2222

2323
## July 2025
2424

25+
- [No limit on the number of workspaces you can onboard to the Defender portal](#no-limit-on-the-number-of-workspaces-you-can-onboard-to-the-defender-portal)
26+
- [Microsoft Sentinel in the Azure portal to be retired July 2026](#microsoft-sentinel-in-the-azure-portal-to-be-retired-july-2026)
27+
28+
### No limit on the number of workspaces you can onboard to the Defender portal
29+
30+
There is no longer any limit to the number of workspaces you can onboard to the Defender portal.
31+
32+
Limitations still apply to the number of workspaces you can include in a Log Analytics query, and in the number of workspaces you can or should include in a scheduled analytics rule.
33+
34+
For more information, see:
35+
36+
- [Connect Microsoft Sentinel to the Microsoft Defender portal](microsoft-sentinel-onboard.md)
37+
- [Multiple Microsoft Sentinel workspaces in the Defender portal](/azure/sentinel/workspaces-defender-portal)
38+
- [Extend Microsoft Sentinel across workspaces and tenants](/azure/sentinel/extend-sentinel-across-workspaces-tenants)
39+
2540
### Microsoft Sentinel in the Azure portal to be retired July 2026
2641

2742
Microsoft Sentinel is [generally available in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal), including for customers without Microsoft Defender XDR or an E5 license. This means that you can use Microsoft Sentinel in the Defender portal even if you aren't using other Microsoft Defender services.
@@ -194,24 +209,6 @@ Microsoft Sentinel workbooks are based on Azure Monitor workbooks, and help you
194209

195210
For more information, see [Visualize and monitor your data by using workbooks in Microsoft Sentinel](/azure/sentinel/monitor-your-data) and [Connect Microsoft Sentinel to Microsoft Defender XDR](microsoft-sentinel-onboard.md).
196211

197-
## November 2024
198-
199-
- [Microsoft Sentinel availability in Microsoft Defender portal](#microsoft-sentinel-availability-in-microsoft-defender-portal)
200-
- [Feature availability for Government clouds](#feature-availability-for-government-clouds)
201-
202-
### Microsoft Sentinel availability in Microsoft Defender portal
203-
204-
We previously announced Microsoft Sentinel is generally available in the Microsoft Defender portal. For preview, Microsoft Sentinel is now available in the Defender portal without Microsoft Defender XDR or an E5 license. For more information, see:
205-
206-
- [Microsoft Sentinel in the Microsoft Defender portal](/azure/sentinel/microsoft-sentinel-defender-portal)
207-
- [Connect Microsoft Sentinel to the Microsoft Defender portal](microsoft-sentinel-onboard.md)
208-
209-
### Feature availability for Government clouds
210-
211-
In the Defender portal, all Microsoft Sentinel features that are in general availability are now available in both commercial and GCC High and DoD clouds. Features still in preview are available only in the commercial cloud.
212-
213-
For more information, see [Microsoft Sentinel feature support for Azure commercial/other clouds](/azure/sentinel/feature-availability#experience-in-the-defender-portal) and [Microsoft Defender XDR for US Government customers](/defender-xdr/usgov).
214-
215212
## Related content
216213

217214
For more information on what's new with other Microsoft Defender security products and Microsoft Sentinel, see:

0 commit comments

Comments
 (0)