Skip to content

Commit caafd3f

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-li-1734528284
2 parents b2a2aff + 10d239e commit caafd3f

12 files changed

+540
-759
lines changed
Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,19 @@
11
---
2-
title: include file
3-
description: include file
4-
ms.topic: include
2+
title: Include file
3+
description: Include file
4+
ms.topic: Include
55
ms.date: 09/26/2023
66
---
77

88
Defender for Identity sensors can be installed on the following operating systems:
99

1010
- **Windows Server 2016**
11-
- **Windows Server 2019**. Requires [KB4487044](https://support.microsoft.com/topic/february-12-2019-kb4487044-os-build-17763-316-6502eb5d-dde8-6902-e149-27ef359ed616) or a newer cumulative update. Sensors installed on Server 2019 without this update will be automatically stopped if the *ntdsai.dll* file version found in the system directory is older than *10.0.17763.316*
11+
- **Windows Server 2019**. Requires [KB4487044](https://support.microsoft.com/topic/february-12-2019-kb4487044-os-build-17763-316-6502eb5d-dde8-6902-e149-27ef359ed616) or a newer cumulative update. Sensors installed on Server 2019 without this update will be automatically stopped if the `ntdsai.dll` file version found in the system directory is older `than 10.0.17763.316`
1212
- **Windows Server 2022**
13+
- **Windows Server 2025**
1314

1415
For all operating systems:
1516

1617
- Both servers with desktop experience and server cores are supported.
17-
- Nano servers are not supported.
18+
- Nano servers aren't supported.
1819
- Installations are supported for domain controllers, AD FS, and AD CS servers.

CloudAppSecurityDocs/network-requirements.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ To see which data center you're connecting to, do the following steps:
2828
To use Defender for Cloud Apps in the Microsoft Defender Portal, add **outbound port 443** for the following IP addresses and DNS names to your firewall's allowlist:
2929

3030
```ini
31+
cdn.cloudappsecurity.com
32+
cdn-discovery.cloudappsecurity.com
3133
adaproddiscovery.azureedge.net
3234
*.s-microsoft.com
3335
*.msecnd.net

defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.custom: nextgen
99
ms.reviewer: pahuijbr
1010
manager: deniseb
1111
ms.subservice: ngp
12-
ms.date: 11/01/2024
12+
ms.date: 12/26/2024
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -75,6 +75,9 @@ For details on configuring Microsoft Configuration Manager (current branch), see
7575
> [!NOTE]
7676
> If real-time protection is turned on, files are scanned before they are accessed and executed. The scanning scope includes all files, including files on mounted removable media, such as USB drives. If the device performing the scan has real-time protection or on-access protection turned on, the scan also includes network shares.
7777
78+
> [!TIP]
79+
> If you have a Network-Attached Storage (NAS) or Storage Area Network (SAN), you can use Internet Content Adaption Protocol (ICAP) scanning with the Microsoft Defender Antivirus engine. For more information, see **[Tech Community Blog: MetaDefender ICAP with Windows Defender Antivirus: World-class security for hybrid environments](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/metadefender-icap-with-windows-defender-antivirus-world-class/ba-p/800234)**.
80+
7881
## Use PowerShell to configure scanning options
7982

8083
For more information on how to use PowerShell with Microsoft Defender Antivirus, see the following articles:

0 commit comments

Comments
 (0)