You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-business/mdb-get-started.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,7 @@ ms.collection:
19
19
- tier1
20
20
- essentials-get-started
21
21
ms.custom: intro-get-started
22
+
#customer intent: As a Defender for Business admin, I need quick guidance to navigate the Microsoft Defender portal and find first steps so I can get started securing devices and email.
Copy file name to clipboardExpand all lines: defender-endpoint/aggregated-reporting.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier3
13
13
ms.topic: article
14
14
search.appverid: met150
15
-
ms.date: 03/04/2025
15
+
ms.date: 10/20/2025
16
16
appliesto:
17
17
- Microsoft Defender for Endpoint Plan 2
18
18
---
@@ -33,13 +33,16 @@ When aggregated reporting is turned on, you can query for a summary of all suppo
33
33
34
34
The following requirements must be met before turning on aggregated reporting:
35
35
36
-
- Defender for Endpoint Plan 2 license
37
36
- Permissions to enable advanced features
38
37
39
-
Aggregated reporting supports the following:
40
38
41
-
- Client version: Windows version 24H and later
42
-
- Operating systems: Windows 11 (22H2, Enterprise), Windows 10 (20H2, 21H1, 21H2), Windows Server 2019 and later, Windows Server version 20H2 or Azure Stack HCI OS, version 23H2 and later
39
+
### Supported operating systems:
40
+
41
+
- Windows 10 (20H2, 21H1, 21H2)
42
+
- Windows 11 (22H2, Enterprise)
43
+
- Windows Server 2019 and later
44
+
- Windows Server version 20H2 or Azure Stack HCI OS, version 23H2 and later
45
+
- Client version: Windows version 24H and later
43
46
44
47
## Turn on aggregated reporting
45
48
@@ -77,9 +80,9 @@ To query new data with aggregated reports:
77
80
3. When necessary, create new custom rules to incorporate new action types.
78
81
4. Go to the **Advanced Hunting** page and query the new data.
79
82
80
-
Here is an example of advanced hunting query results with aggregated reports.
83
+
Here is an example of advanced hunting query results with aggregated reports.
81
84
82
-
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports-small.png" alt-text="Screenshot of advanced hunting query results with aggregated reports." lightbox="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports.png":::
85
+
:::image type="content" source="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports-small.png" alt-text="Screenshot of advanced hunting query results with aggregated reports." lightbox="/defender-endpoint/media/reports/aggregated-reporting/sample-results-aggregated-reports.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/amsi-on-mdav.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: batamig
5
5
ms.author: bagol
6
6
manager: bagol
7
7
ms.reviewer: yongrhee
8
-
ms.date: 12/05/2024
8
+
ms.date: 10/20/2025
9
9
appliesto:
10
10
- Microsoft Defender for Endpoint Plan 1
11
11
- Microsoft Defender for Endpoint Plan 2
@@ -29,11 +29,6 @@ ai-usage: ai-assisted
29
29
# Anti-malware Scan Interface (AMSI) integration with Microsoft Defender Antivirus
30
30
31
31
32
-
**Platforms**:
33
-
34
-
- Windows 10 and newer
35
-
- Windows Server 2016 and newer
36
-
37
32
Microsoft Defender for Endpoint utilizes the anti-malware Scan Interface (AMSI) to enhance protection against fileless malware, dynamic script-based attacks, and other nontraditional cyber threats. This article describes the benefits of AMSI integration, the types of scripting languages it supports, and how to enable AMSI for improved security.
38
33
39
34
## What is fileless malware?
@@ -67,9 +62,12 @@ Microsoft Defender Antivirus blocks most malware using generic, heuristic, and b
67
62
- Detecting and remediating WMI persistence techniques by scanning the WMI repository, both periodically and whenever anomalous behavior is observed
68
63
- Detecting reflective DLL injection through enhanced memory scanning techniques and behavioral monitoring
69
64
70
-
## Why AMSI?
65
+
## Prerequisites
71
66
72
-
AMSI provides a deeper level of inspection for malicious software that employs obfuscation and evasion techniques on Windows' built-in scripting hosts. By integrating AMSI, Microsoft Defender for Endpoint offers extra layers of protection against advanced threats.
67
+
### Supported operating systems
68
+
69
+
- Windows 10 and later
70
+
- Windows Server 2016 and later
73
71
74
72
### Supported Scripting Languages
75
73
@@ -84,6 +82,11 @@ If you use Microsoft 365 Apps, AMSI also supports JavaScript, VBA, and XLM.
84
82
85
83
AMSI doesn't currently support Python or Perl.
86
84
85
+
## Why AMSI?
86
+
87
+
AMSI provides a deeper level of inspection for malicious software that employs obfuscation and evasion techniques on Windows' built-in scripting hosts. By integrating AMSI, Microsoft Defender for Endpoint offers extra layers of protection against advanced threats.
88
+
89
+
87
90
### Enabling AMSI
88
91
89
92
To enable AMSI, you need to enable script scanning. See [Configure scanning options for Microsoft Defender Antivirus](configure-advanced-scan-types-microsoft-defender-antivirus.md).
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+21-8Lines changed: 21 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Configure Microsoft Defender for Endpoint on Android features
3
3
description: Describes how to configure Microsoft Defender for Endpoint on Android
4
4
ms.service: defender-endpoint
5
-
ms.author: bagol
6
-
author: batamig
5
+
ms.author: painbar
6
+
author: paulinbar
7
7
ms.reviewer: denishdonga
8
8
ms.localizationpriority: medium
9
9
manager: bagol
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: how-to
16
16
ms.subservice: android
17
17
search.appverid: met150
18
-
ms.date: 06/05/2025
18
+
ms.date: 10/23/2025
19
19
appliesto:
20
20
- Microsoft Defender for Endpoint Plan 1
21
21
- Microsoft Defender for Endpoint Plan 2
@@ -110,11 +110,12 @@ In the Microsoft Intune admin center, navigate to Apps > App configuration polic
110
110
> [!IMPORTANT]
111
111
> Starting May 19, 2025, alerts are no longer generated in the Microsoft Defender portal for mobile devices connecting or disconnecting to an open wireless network and for downloading/installing/deleting self-signed certificates. Instead, these activities are now generated as events and are viewable in the device timeline.
112
112
> Here are key changes about this new experience:
113
-
> - For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on Android available on mid-May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.
114
-
> - When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.
115
-
> - Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including trusted networks, are sent to the device timeline as events.
116
-
> - Users allow-listed certificates: After the update, downloading/installing/deleting self-signed certificates events, including user-trusted certificates, are sent to the device timeline as events.
117
-
> - The previous experience of generating alerts for these activities still continue to apply to GCC tenants.
113
+
- For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on Android available on mid-May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.
114
+
- When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.
115
+
- Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including trusted networks, are sent to the device timeline as events.
116
+
- Users allow-listed certificates: After the update, downloading/installing/deleting self-signed certificates events, including user-trusted certificates, are sent to the device timeline as events.
117
+
- The previous experience of generating alerts for these activities still continue to apply to GCC tenants.
118
+
118
119
119
120
## Privacy Controls
120
121
@@ -127,6 +128,18 @@ Following privacy controls are available for configuring the data that is sent b
127
128
|Vulnerability assessment of apps |By default only information about apps installed in the work profile is sent for vulnerability assessment. Admins can disable privacy to include personal apps|
128
129
|Network Protection | Admins can enable or disable privacy in network protection. If enabled, then Defender won't send network details.|
129
130
131
+
## Root Detection (Preview)
132
+
133
+
Microsoft Defender for Endpoint has the ability to detect unmanaged and managed devices that are rooted. These root detection checks are done periodically. If a device is detected as rooted, the following events occur:
134
+
135
+
- A high-risk alert is reported to the Microsoft Defender portal. If Device Compliance and Conditional Access are set up based on device risk score, then the device is blocked from accessing corporate data.
136
+
137
+
- User data on the app is cleared after the device has been detected as rooted. The feature is enabled by default; no action is required from admin or user.
138
+
139
+
**Prerequisite**
140
+
141
+
- Company portal must be installed, and version must be >=5.0.6621.0
142
+
130
143
### Configure privacy alert report
131
144
132
145
Admins can now enable privacy control for the phishing report, malware report, and network report sent by Microsoft Defender for Endpoint on Android. This configuration ensures that the domain name, app details, and network details, respectively, aren't sent as part of the alert whenever a corresponding threat is detected.
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,20 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](
29
29
30
30
### Releases for Defender for Endpoint on Android
31
31
32
+
#### October 2025
33
+
34
+
| Build| 1.0.8201.0101|
35
+
| -------- | -------- |
36
+
| Release Date | October 2, 2025 |
37
+
38
+
**What's New**
39
+
40
+
- Improved UX experience for the onboarding screens, for more details please visit this link - [UX Enhancement](/defender-endpoint/android-new-ux)
41
+
42
+
- Global Secure Access Kerberos SSO support on Android (GA): Kerberos SSO experience for users on Android devices with Global Secure Access is now supported. User will need to install and configure a 3rd party SSO client.
Retrieves a specific live response command result by its index.
42
-
43
-
## Limitations
44
-
45
-
1. Rate limitations for this API are 100 calls per minute and 1500 calls per
46
-
hour.
47
-
48
-
## Minimum requirements
38
+
## Prerequisites
49
39
50
-
Before you can initiate a session on a device, make sure you fulfill the following requirements:
40
+
Devices must be running one of the following versions of Windows:
51
41
52
-
-**Verify that you're running a supported version of Windows**.
42
+
### Supported operating systems
53
43
54
-
Devices must be running one of the following versions of Windows
55
-
56
-
-**Windows 11**
44
+
- Windows 11
57
45
58
-
-**Windows 10**
46
+
- Windows 10
59
47
-[Version 1909](/windows/whats-new/whats-new-windows-10-version-1909) or later
60
48
-[Version 1903](/windows/whats-new/whats-new-windows-10-version-1903) with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)
61
49
-[Version 1809 (RS 5)](/windows/whats-new/whats-new-windows-10-version-1809) with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818)
62
50
-[Version 1803 (RS 4)](/windows/whats-new/whats-new-windows-10-version-1803) with [KB4537795](https://support.microsoft.com/help/4537795/windows-10-update-kb4537795)
63
51
-[Version 1709 (RS 3)](/windows/whats-new/whats-new-windows-10-version-1709) with [KB4537816](https://support.microsoft.com/help/4537816/windows-10-update-kb4537816)
64
52
65
-
-**Windows Server 2019 - Only applicable for Public preview**
53
+
- Windows Server 2019 - Only applicable for Public preview
66
54
- Version 1903 or (with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)) later
67
55
- Version 1809 (with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818))
68
-
69
-
-**Windows Server 2022**
70
56
71
-
-**Windows Server 2025**
72
-
-**Azure Stack HCI OS, version 23H2 and later**
57
+
- Windows Server 2022 and later
58
+
59
+
- Azure Stack HCI OS, version 23H2 and later
60
+
61
+
## API description
62
+
63
+
Retrieves a specific live response command result by its index.
64
+
65
+
## Limitations
66
+
67
+
1. Rate limitations for this API are 100 calls per minute and 1500 calls per
@@ -42,11 +40,11 @@ See [Overview of automated investigations](../automated-investigations.md) for m
42
40
43
41
1. Rate limitations for this API are 50 calls per hour.
44
42
45
-
## Requirements for AIR
43
+
## Prerequisites
46
44
47
-
Your organization must have Defender for Endpoint see:[Minimum requirements for Microsoft Defender for Endpoint](../minimum-requirements.md).
45
+
Your organization must have Defender for Endpoint, see [Minimum requirements for Microsoft Defender for Endpoint](../minimum-requirements.md).
48
46
49
-
Currently, AIR only supports the following OS versions:
47
+
### Supported operating systems
50
48
51
49
- Windows 11
52
50
- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later
@@ -67,8 +65,8 @@ Delegated (work or school account)|Alert.ReadWrite|'Read and write alerts'
67
65
> [!NOTE]
68
66
> When obtaining a token using user credentials:
69
67
>
70
-
> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information)
71
-
> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information)
68
+
> - The user needs to have at least the following role permission: 'Active remediation actions' (See [Create and manage roles](../user-roles.md) for more information).
69
+
> - The user needs to have access to the device, based on device group settings (See [Create and manage device groups](../machine-groups.md) for more information).
72
70
>
73
71
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
0 commit comments