Skip to content

Commit ccd3bf3

Browse files
authored
Merge branch 'main' into patch-8
2 parents 1773f3a + ee0f99e commit ccd3bf3

18 files changed

+310
-87
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 26 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -3,70 +3,45 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 07/23/2025
6+
ms.date: 09/18/2025
77
audience: ITPro
88
ms.topic: reference
9-
author: batamig
10-
ms.author: bagol
11-
ms.custom: nextgen
12-
ms.reviewer: pahuijbr, tudobril, yongrhee
13-
manager: bagol
9+
author: KesemSharabi
10+
ms.author: kesharab
1411
ms.subservice: ngp
15-
ms.collection:
16-
- m365-security
17-
- tier2
18-
- mde-ngp
1912
search.appverid: met150
13+
appliesto:
14+
- Microsoft Defender for Endpoint Plan 1
15+
- Microsoft Defender for Endpoint Plan 2
2016
---
2117

2218
# Microsoft Defender Antivirus security intelligence and product updates
2319

24-
**Applies to:**
20+
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices are protected against new malware and attack techniques. Update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). You can find the lates engine, platform, and signature date in [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates)
2521

26-
- [Microsoft Defender for Endpoint Plans 1 and 2](microsoft-defender-endpoint.md)
27-
- Microsoft Defender Antivirus
28-
29-
**Platforms**
30-
31-
- Windows
32-
33-
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques. Update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). This article includes information about the two types of updates for keeping Microsoft Defender Antivirus current:
22+
This article is aimed at **Windows** devices, and includes information about the following two types of updates:
3423

3524
- [Security intelligence updates](#security-intelligence-updates)
36-
- [Product updates](#product-updates)
37-
38-
This article also includes:
39-
40-
- [Microsoft Defender Antivirus platform support](#microsoft-defender-antivirus-platform-and-engine-support)
41-
- [How to roll back an update](#how-to-roll-back-an-update) (if necessary)
42-
- [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
43-
- [Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
44-
45-
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
4625

47-
[!INCLUDE [MDE automated setup guide](../includes/security-analyzer-setup-guide.md)]
26+
- [Product updates](#product-updates)
4827

4928
## Security intelligence updates
5029

51-
Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) (also called the *Microsoft Advanced Protection Service*, or MAPS) and periodically downloads dynamic security intelligence updates to provide more protection. These dynamic updates don't take the place of regular security intelligence updates via security intelligence update KB2267602.
30+
Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md), also known as *Microsoft Advanced Protection Service*, or *MAPS*. Defender Antivirus periodically downloads dynamic security [intelligence updates](https://www.microsoft.com/en-us/wdsi/defenderupdates). These updates don't replace regular security intelligence updates. Engine updates are included with security intelligence updates and are released monthly.
5231

53-
> [!NOTE]
54-
> Updates are released under the following KBs:
55-
>
56-
> - Microsoft Defender Antivirus: KB2267602
57-
> - System Center Endpoint Protection: KB2461484
32+
Updates are released under the following KBs:
5833

59-
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
34+
- Microsoft Defender Antivirus: KB2267602
6035

61-
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
36+
- System Center Endpoint Protection: KB2461484
6237

63-
Engine updates are included with security intelligence updates and are released on a monthly cadence.
38+
[Cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) is always on and requires an active connection to the internet to function. Security intelligence updates occur on a scheduled cadence which you can configure using a policy.
6439

6540
## Product updates
6641

6742
Microsoft Defender Antivirus requires monthly updates (KB4052623) known as *platform updates*.
6843

69-
You can manage the distribution of updates through one of the following methods:
44+
You can manage the distribution of updates using one of the following methods:
7045

7146
- [Windows Server Update Service (WSUS)](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus)
7247
- [Microsoft Configuration Manager](/configmgr/sum/understand/software-updates-introduction)
@@ -99,6 +74,17 @@ Updates contain:
9974
- Serviceability improvements
10075
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
10176

77+
### August-2025 (Platform: 4.18.25080.5 | Engine: 1.1.25080.5)
78+
79+
- Security intelligence update version: **1.437.1.0**
80+
- Release date: **September 16, 2025 (Engine) / September 17, 2025 (Platform)**
81+
- Platform: **4.18.25080.5**
82+
- Engine: **1.1.25080.5**
83+
- Support phase: **Security and Critical Updates**
84+
85+
#### What's new
86+
87+
Improved Defender update reliability by allowing non-admin processes to trigger shared signature updates, reducing unnecessary privilege requirements.
10288

10389
### July-2025 (Platform: 4.18.25070.5 | Engine: 1.1.25070.4)
10490

defender-for-cloud-apps/data-protection-policies.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,11 @@ The following are examples of file policies that can be created:
4444

4545
* **Sensitive file extension** - Receive an alert about files with specific extensions that are highly exposed. Select the specific extension (for example, crt for certificates) or filename and exclude those files with private sharing level.
4646

47+
## Prerequisites
48+
49+
To set up the first File Policy in a tenant, you need Microsoft Entra **Service Principal** permissions. **Service Principal** permissions are only automatically given if no file policy exists yet. After the first file policy is created, you can create more without needing those permissions.
50+
51+
4752
## Create a new file policy
4853

4954
To create a new file policy, follow this procedure:
@@ -98,8 +103,6 @@ To create a new file policy, follow this procedure:
98103

99104
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
100105

101-
102-
103106
1. To view file policy matches, files that are suspected to violate the policy, go to **Policies** -> **Policy management**. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
104107

105108
## Limitations

defender-office-365/email-authentication-spf-configure.md

Lines changed: 25 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
author: chrisda
66
ms.author: chrisda
77
manager: bagol
8-
ms.date: 07/24/2025
8+
ms.date: 09/17/2025
99
audience: ITPro
1010
ms.topic: how-to
1111

@@ -48,7 +48,7 @@ Before we get started, here's what you need to know about SPF in Microsoft 365 b
4848
> [!TIP]
4949
> Email authentication protection for _undefined_ subdomains is covered by DMARC. Any subdomains (defined or not) inherit the DMARC settings of the parent domain (which can be overridden per subdomain). For more information, see [Set up DMARC to validate the From address domain for cloud senders](email-authentication-dmarc-configure.md).
5050
51-
- **If you own registered but unused domains**: If you own registered domains that aren't used for email or anything at all (also known as _parked domains_), configure SPF TXT records to indicate that no email should ever come from those domains as described later in this article.
51+
- **If you own registered but unused domains**: If you own registered domains that aren't used for email or anything at all (also known as _parked domains_), configure SPF TXT records to indicate that no email should ever come from those domains as described [later in this article](#scenario-parked-domains).
5252

5353
- **SPF alone is not enough**. For the best level of email protection for your custom domains, you also need to configure DKIM and DMARC as part of your overall [email authentication](email-authentication-about.md) strategy. For more information, see the [Next Steps](#next-steps) section at the end of this article.
5454

@@ -127,43 +127,56 @@ Important points to remember:
127127
> [!TIP]
128128
> As previously mentioned in this article, you create the SPF TXT record for a domain or subdomain at the domain registrar for the domain. No SPF TXT record configuration is available in Microsoft 365.
129129
130-
- **Scenario**: You use contoso.com for email in Microsoft 365, and Microsoft 365 is the only source of email from contoso.com.
130+
### Scenario: Microsoft 365 email only
131131

132-
**SPF TXT record for contoso.com in Microsoft 365 and Microsoft 365 Government Community Cloud (GCC)**:
132+
You use contoso.com for email in Microsoft 365, and Microsoft 365 is the only source of email from contoso.com
133+
134+
- **SPF TXT record for contoso.com in Microsoft 365 and Microsoft 365 Government Community Cloud (GCC)**:
133135

134136
```text
135137
v=spf1 include:spf.protection.outlook.com -all
136138
```
137139

138-
**SPF TXT record for contoso.com in Microsoft 365 Government Community Cloud High (GCC High) and Microsoft 365 Department of Defense (DoD)**:
140+
- **SPF TXT record for contoso.com in Microsoft 365 Government Community Cloud High (GCC High) and Microsoft 365 Department of Defense (DoD)**:
139141

140142
```text
141143
v=spf1 include:spf.protection.office365.us -all
142144
```
143145

144-
**SPF TXT record for contoso.com in Microsoft 365 operated by 21Vianet**
146+
- **SPF TXT record for contoso.com in Microsoft 365 operated by 21Vianet**:
145147

146148
```text
147149
v=spf1 include:spf.protection.partner.outlook.cn -all
148150
```
149151

150-
- **Scenario**: You use contoso.com for email in Microsoft 365, and you already configured the SPF TXT record in contoso.com with all sources of email from the domain. You also own the domains contoso.net and contoso.org, but you don't use them for email. You want to specify that no one is authorized to send email from contoso.net or contoso.org.
152+
### Scenario: Parked domains
153+
154+
You own the domains contoso.net and contoso.org, but you don't use them for email. You want to specify no one is authorized to send email from contoso.net or contoso.org.
151155

152-
**SPF TXT record for contoso.net**:
156+
- **SPF TXT record for contoso.net**:
153157

154158
```txt
155159
v=spf1 -all
156160
```
157161

158-
**SPF TXT record for contoso.org**:
162+
- **SPF TXT record for contoso.org**:
159163

160164
```txt
161165
v=spf1 -all
162166
```
163167

164-
- **Scenario**: You use contoso.com for email in Microsoft 365. You plan on sending mail from the following sources:
165-
- An on-premises email server with the external email address of 192.168.0.10. Because you have direct control over this email source, we consider it OK to use the server for senders in the contoso.com domain.
166-
- The Adatum bulk mailing service. Because you don't have direct control over this email source, we recommend using a subdomain, so you create marketing.contoso.com for that purpose. According to the Adatum service documentation, you need to add `include:servers.adatum.com` to the SPF TXT record for your domain.
168+
> [!NOTE]
169+
> As previously mentioned in this article, each subdomain requires its own SPF TXT record. For parked domains, it's virtually impossible to guess which subdomains might be needed. **If** the domain registrar supports wildcard records, you can use the following syntax to specify no one is authorized to send email from any subdomains of the parked domain:
170+
>
171+
> **Hostname**: `_*.contoso.net` or `_*.contoso.org`<br/>
172+
> **TXT value**: `v=spf1 -all`
173+
174+
### Scenario: Microsoft 365 email with on-premises email and a non-Microsoft email service
175+
176+
You use contoso.com for email in Microsoft 365. You plan on sending mail from the following sources:
177+
178+
- An on-premises email server with the external email address of 192.168.0.10. Because you have direct control over this email source, we consider it OK to use the server for senders in the contoso.com domain.
179+
- The Adatum bulk mailing service. Because you don't have direct control over this email source, we recommend using a subdomain, so you create marketing.contoso.com for that purpose. According to the Adatum service documentation, you need to add `include:servers.adatum.com` to the SPF TXT record for your domain.
167180

168181
**SPF TXT record for contoso.com**:
169182

defender-office-365/mdo-email-entity-page.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
author: chrisda
66
ms.author: chrisda
77
manager: bagol
8-
ms.date: 07/07/2025
8+
ms.date: 09/22/2025
99
audience: ITPro
1010
ms.topic: article
1111
ms.service: defender-office-365
@@ -297,7 +297,10 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
297297

298298
If you select an entry in the **Attachments** view by clicking on the **Attachment filename** value, a details flyout opens that contains the following information:
299299

300-
- **Deep analysis** tab: Information is available on this tab if [Safe Attachments](safe-attachments-about.md) scanned (detonated) the attachment. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **File detonation**.
300+
- **Deep analysis** tab: Information is available on this tab if [Safe Attachments](safe-attachments-about.md) scanned (detonated) the attachment and it is identified as malicious through detonation. You can identify these messages in Threat Explorer using the following methods:
301+
- **Detection technology** query filter with the value **File detonation**.
302+
- **Detonation available** indicator in the **Details** column.
303+
- The detonation count shown in the Email Summary Panel.
301304

302305
- **Detonation chain** section: Safe Attachments detonation of a single file can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious file that caused the verdict, and all other files affected by the detonation. These attached files might not be directly present in the email. But, including the analysis is important to determining why the file was found to be malicious.
303306

@@ -359,7 +362,7 @@ If you select an entry in the **Attachments** view by selecting the check box ne
359362

360363
### URL view
361364

362-
The **URL** view shows information about all original or reweritten URLs in the message, along with the scanning results for each URL.
365+
The **URL** view shows information about all original or rewritten URLs in the message, along with the scanning results for each URL.
363366

364367
The following attachment information is available in this view. Select a column header to sort by that column. To add or remove columns, select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns are selected.
365368

@@ -378,7 +381,10 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
378381

379382
If you select an entry in the **URL** view by clicking on the **URL** value, a details flyout opens that contains the following information:
380383

381-
- **Deep analysis** tab: Information is available on this tab if [Safe Links](safe-links-about.md) scanned (detonated) the URL. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **URL detonation**.
384+
- **Deep analysis** tab: Information is available on this tab if [Safe Links](safe-links-about.md) scanned (detonated) the URL and it is identified as malicious through detonation. You can identify these messages in Threat Explorer using the following methods:
385+
- **Detection technology** query filter with the value **URL detonation**.
386+
- **Detonation available** indicator in the **Details** column.
387+
- The detonation count shown in the Email Summary Panel.
382388

383389
- **Detonation chain** section: Safe Links detonation of a single URL can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious URL that caused the verdict, and all other URLs affected by the detonation. These URLs might not be directly present in the email. But, including the analysis is important to determining why the URL was found to be malicious.
384390

0 commit comments

Comments
 (0)