You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-updates.md
+26-40Lines changed: 26 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,70 +3,45 @@ title: Microsoft Defender Antivirus security intelligence and product updates
3
3
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: high
6
-
ms.date: 07/23/2025
6
+
ms.date: 09/18/2025
7
7
audience: ITPro
8
8
ms.topic: reference
9
-
author: batamig
10
-
ms.author: bagol
11
-
ms.custom: nextgen
12
-
ms.reviewer: pahuijbr, tudobril, yongrhee
13
-
manager: bagol
9
+
author: KesemSharabi
10
+
ms.author: kesharab
14
11
ms.subservice: ngp
15
-
ms.collection:
16
-
- m365-security
17
-
- tier2
18
-
- mde-ngp
19
12
search.appverid: met150
13
+
appliesto:
14
+
- Microsoft Defender for Endpoint Plan 1
15
+
- Microsoft Defender for Endpoint Plan 2
20
16
---
21
17
22
18
# Microsoft Defender Antivirus security intelligence and product updates
23
19
24
-
**Applies to:**
20
+
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices are protected against new malware and attack techniques. Update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). You can find the lates engine, platform, and signature date in [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates)
25
21
26
-
-[Microsoft Defender for Endpoint Plans 1 and 2](microsoft-defender-endpoint.md)
27
-
- Microsoft Defender Antivirus
28
-
29
-
**Platforms**
30
-
31
-
- Windows
32
-
33
-
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques. Update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). This article includes information about the two types of updates for keeping Microsoft Defender Antivirus current:
22
+
This article is aimed at **Windows** devices, and includes information about the following two types of updates:
-[How to roll back an update](#how-to-roll-back-an-update) (if necessary)
42
-
-[Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
43
-
-[Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
44
-
45
-
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) (also called the*Microsoft Advanced Protection Service*, or MAPS) and periodically downloads dynamic security intelligence updates to provide more protection. These dynamic updates don't take the place of regular security intelligence updates via security intelligence update KB2267602.
30
+
Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md), also known as*Microsoft Advanced Protection Service*, or *MAPS*. Defender Antivirus periodically downloads dynamic security [intelligence updates](https://www.microsoft.com/en-us/wdsi/defenderupdates). These updates don't replace regular security intelligence updates. Engine updates are included with security intelligence updates and are released monthly.
52
31
53
-
> [!NOTE]
54
-
> Updates are released under the following KBs:
55
-
>
56
-
> - Microsoft Defender Antivirus: KB2267602
57
-
> - System Center Endpoint Protection: KB2461484
32
+
Updates are released under the following KBs:
58
33
59
-
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
34
+
-Microsoft Defender Antivirus: KB2267602
60
35
61
-
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
36
+
- System Center Endpoint Protection: KB2461484
62
37
63
-
Engine updates are included with security intelligence updates and are released on a monthly cadence.
38
+
[Cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) is always on and requires an active connection to the internet to function. Security intelligence updates occur on a scheduled cadence which you can configure using a policy.
64
39
65
40
## Product updates
66
41
67
42
Microsoft Defender Antivirus requires monthly updates (KB4052623) known as *platform updates*.
68
43
69
-
You can manage the distribution of updates through one of the following methods:
44
+
You can manage the distribution of updates using one of the following methods:
70
45
71
46
-[Windows Server Update Service (WSUS)](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus)
Copy file name to clipboardExpand all lines: defender-for-cloud-apps/data-protection-policies.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,11 @@ The following are examples of file policies that can be created:
44
44
45
45
***Sensitive file extension** - Receive an alert about files with specific extensions that are highly exposed. Select the specific extension (for example, crt for certificates) or filename and exclude those files with private sharing level.
46
46
47
+
## Prerequisites
48
+
49
+
To set up the first File Policy in a tenant, you need Microsoft Entra **Service Principal** permissions. **Service Principal** permissions are only automatically given if no file policy exists yet. After the first file policy is created, you can create more without needing those permissions.
50
+
51
+
47
52
## Create a new file policy
48
53
49
54
To create a new file policy, follow this procedure:
@@ -98,8 +103,6 @@ To create a new file policy, follow this procedure:
98
103
99
104
:::image type="content" source="media/file-policy-edit-and-preview-results.png" alt-text="Screenshot that shows how you can see a preview of the filtered results for file policies.":::
100
105
101
-
102
-
103
106
1. To view file policy matches, files that are suspected to violate the policy, go to **Policies** -> **Policy management**. Filter the results to display only the file policies using the **Type** filter at the top. For more information about the matches for each policy, under the **Count** column, select the number of **matches** for a policy. Alternatively, select the three dots at the end of the row for a policy and choose **View all matches**. This opens the **File policy report**. Select the **Matching now** tab to see files that currently match the policy. Select the **History** tab to see a history back to up to six months of files that matched the policy.
Copy file name to clipboardExpand all lines: defender-office-365/email-authentication-spf-configure.md
+25-12Lines changed: 25 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
author: chrisda
6
6
ms.author: chrisda
7
7
manager: bagol
8
-
ms.date: 07/24/2025
8
+
ms.date: 09/17/2025
9
9
audience: ITPro
10
10
ms.topic: how-to
11
11
@@ -48,7 +48,7 @@ Before we get started, here's what you need to know about SPF in Microsoft 365 b
48
48
> [!TIP]
49
49
> Email authentication protection for _undefined_ subdomains is covered by DMARC. Any subdomains (defined or not) inherit the DMARC settings of the parent domain (which can be overridden per subdomain). For more information, see [Set up DMARC to validate the From address domain for cloud senders](email-authentication-dmarc-configure.md).
50
50
51
-
-**If you own registered but unused domains**: If you own registered domains that aren't used for email or anything at all (also known as _parked domains_), configure SPF TXT records to indicate that no email should ever come from those domains as described later in this article.
51
+
-**If you own registered but unused domains**: If you own registered domains that aren't used for email or anything at all (also known as _parked domains_), configure SPF TXT records to indicate that no email should ever come from those domains as described [later in this article](#scenario-parked-domains).
52
52
53
53
-**SPF alone is not enough**. For the best level of email protection for your custom domains, you also need to configure DKIM and DMARC as part of your overall [email authentication](email-authentication-about.md) strategy. For more information, see the [Next Steps](#next-steps) section at the end of this article.
54
54
@@ -127,43 +127,56 @@ Important points to remember:
127
127
> [!TIP]
128
128
> As previously mentioned in this article, you create the SPF TXT record for a domain or subdomain at the domain registrar for the domain. No SPF TXT record configuration is available in Microsoft 365.
129
129
130
-
-**Scenario**: You use contoso.com for email in Microsoft 365, and Microsoft 365 is the only source of email from contoso.com.
130
+
### Scenario: Microsoft 365email only
131
131
132
-
**SPF TXT record for contoso.com in Microsoft 365 and Microsoft 365 Government Community Cloud (GCC)**:
132
+
You use contoso.com for email in Microsoft 365, and Microsoft 365 is the only source of email from contoso.com
133
+
134
+
-**SPF TXT record for contoso.com in Microsoft 365 and Microsoft 365 Government Community Cloud (GCC)**:
133
135
134
136
```text
135
137
v=spf1 include:spf.protection.outlook.com -all
136
138
```
137
139
138
-
**SPF TXT record for contoso.com in Microsoft 365 Government Community Cloud High (GCC High) and Microsoft 365 Department of Defense (DoD)**:
140
+
-**SPF TXT record for contoso.com in Microsoft 365 Government Community Cloud High (GCC High) and Microsoft 365 Department of Defense (DoD)**:
139
141
140
142
```text
141
143
v=spf1 include:spf.protection.office365.us -all
142
144
```
143
145
144
-
**SPF TXT record for contoso.com in Microsoft 365 operated by 21Vianet**
146
+
-**SPF TXT record for contoso.com in Microsoft 365 operated by 21Vianet**:
-**Scenario**: You use contoso.com for email in Microsoft 365, and you already configured the SPF TXT record in contoso.com with all sources of email from the domain. You also own the domains contoso.net and contoso.org, but you don't use them for email. You want to specify that no one is authorized to send email from contoso.net or contoso.org.
152
+
### Scenario: Parked domains
153
+
154
+
You own the domains contoso.net and contoso.org, but you don't use them for email. You want to specify no one is authorized to send email from contoso.net or contoso.org.
151
155
152
-
**SPF TXT record for contoso.net**:
156
+
-**SPF TXT record for contoso.net**:
153
157
154
158
```txt
155
159
v=spf1 -all
156
160
```
157
161
158
-
**SPF TXT record for contoso.org**:
162
+
-**SPF TXT record for contoso.org**:
159
163
160
164
```txt
161
165
v=spf1 -all
162
166
```
163
167
164
-
-**Scenario**: You use contoso.com for email in Microsoft 365. You plan on sending mail from the following sources:
165
-
- An on-premises email server with the external email address of 192.168.0.10. Because you have direct control over this email source, we consider it OK to use the server for senders in the contoso.com domain.
166
-
- The Adatum bulk mailing service. Because you don't have direct control over this email source, we recommend using a subdomain, so you create marketing.contoso.com for that purpose. According to the Adatum service documentation, you need to add `include:servers.adatum.com` to the SPF TXT record for your domain.
168
+
> [!NOTE]
169
+
> As previously mentioned in this article, each subdomain requires its own SPF TXT record. For parked domains, it's virtually impossible to guess which subdomains might be needed. **If** the domain registrar supports wildcard records, you can use the following syntax to specify no one is authorized to send email from any subdomains of the parked domain:
170
+
>
171
+
> **Hostname**: `_*.contoso.net` or `_*.contoso.org`<br/>
172
+
> **TXT value**: `v=spf1 -all`
173
+
174
+
### Scenario: Microsoft 365 email with on-premises email and a non-Microsoft email service
175
+
176
+
You use contoso.com for email in Microsoft 365. You plan on sending mail from the following sources:
177
+
178
+
- An on-premises email server with the external email address of 192.168.0.10. Because you have direct control over this email source, we consider it OK to use the server for senders in the contoso.com domain.
179
+
- The Adatum bulk mailing service. Because you don't have direct control over this email source, we recommend using a subdomain, so you create marketing.contoso.com for that purpose. According to the Adatum service documentation, you need to add `include:servers.adatum.com` to the SPF TXT record for your domain.
Copy file name to clipboardExpand all lines: defender-office-365/mdo-email-entity-page.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
author: chrisda
6
6
ms.author: chrisda
7
7
manager: bagol
8
-
ms.date: 07/07/2025
8
+
ms.date: 09/22/2025
9
9
audience: ITPro
10
10
ms.topic: article
11
11
ms.service: defender-office-365
@@ -297,7 +297,10 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
297
297
298
298
If you select an entry in the **Attachments** view by clicking on the **Attachment filename** value, a details flyout opens that contains the following information:
299
299
300
-
-**Deep analysis** tab: Information is available on this tab if [Safe Attachments](safe-attachments-about.md) scanned (detonated) the attachment. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **File detonation**.
300
+
-**Deep analysis** tab: Information is available on this tab if [Safe Attachments](safe-attachments-about.md) scanned (detonated) the attachment and it is identified as malicious through detonation. You can identify these messages in Threat Explorer using the following methods:
301
+
-**Detection technology** query filter with the value **File detonation**.
302
+
-**Detonation available** indicator in the **Details** column.
303
+
- The detonation count shown in the Email Summary Panel.
301
304
302
305
-**Detonation chain** section: Safe Attachments detonation of a single file can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious file that caused the verdict, and all other files affected by the detonation. These attached files might not be directly present in the email. But, including the analysis is important to determining why the file was found to be malicious.
303
306
@@ -359,7 +362,7 @@ If you select an entry in the **Attachments** view by selecting the check box ne
359
362
360
363
### URL view
361
364
362
-
The **URL** view shows information about all original or reweritten URLs in the message, along with the scanning results for each URL.
365
+
The **URL** view shows information about all original or rewritten URLs in the message, along with the scanning results for each URL.
363
366
364
367
The following attachment information is available in this view. Select a column header to sort by that column. To add or remove columns, select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns**. By default, all available columns are selected.
365
368
@@ -378,7 +381,10 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
378
381
379
382
If you select an entry in the **URL** view by clicking on the **URL** value, a details flyout opens that contains the following information:
380
383
381
-
-**Deep analysis** tab: Information is available on this tab if [Safe Links](safe-links-about.md) scanned (detonated) the URL. You can identify these messages in Threat Explorer by using the query filter **Detection technology** with the value **URL detonation**.
384
+
-**Deep analysis** tab: Information is available on this tab if [Safe Links](safe-links-about.md) scanned (detonated) the URL and it is identified as malicious through detonation. You can identify these messages in Threat Explorer using the following methods:
385
+
-**Detection technology** query filter with the value **URL detonation**.
386
+
-**Detonation available** indicator in the **Details** column.
387
+
- The detonation count shown in the Email Summary Panel.
382
388
383
389
-**Detonation chain** section: Safe Links detonation of a single URL can trigger multiple detonations. The _detonation chain_ tracks the path of detonations, including the original malicious URL that caused the verdict, and all other URLs affected by the detonation. These URLs might not be directly present in the email. But, including the analysis is important to determining why the URL was found to be malicious.
0 commit comments