Skip to content

Commit cfca806

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-li-1740001173
2 parents fdd2e9c + 3edd3ad commit cfca806

File tree

8 files changed

+82
-48
lines changed

8 files changed

+82
-48
lines changed

CloudAppSecurityDocs/release-notes.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,17 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
2121

2222
## February 2025
2323

24+
### Enhanced alert source accuracy
25+
26+
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
27+
The goal is to improve the accuracy of alert origins, facilitating better identification, management, and response to alerts.
28+
29+
To learn more about the different alert sources in Defender XDR see the _Alert sources_ section of [Investigate alerts in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn](/defender-xdr/investigate-alerts?tabs=settings)
30+
31+
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0)
32+
33+
### Network requirement updates
34+
2435
Due to improvements being made to Microsoft Defender for Cloud Apps to improve security and performance, you must update network information in your system's firewall and additional third-party services. Make these changes by March 16, 2025 to ensure uninterrupted access to our services:
2536

2637
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
@@ -128,7 +139,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
128139

129140
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
130141

131-
For more information see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
142+
For more information, see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
132143

133144
### Connect Mural to Defender for Cloud Apps (Preview)
134145

defender-endpoint/guidance-for-pen-testing-and-bas.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,8 @@ It's important to get the settings correct. To resolve misconfiguration issues,
7070
| Windows | Microsoft Defender for Endpoint security settings management <br/>(*Recommended*) | [Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies)](evaluate-mda-using-mde-security-settings-management.md) |
7171
| Windows | Group Policy | [Evaluate Microsoft Defender Antivirus using Group Policy](evaluate-mdav-using-gp.md) |
7272
| Windows | PowerShell | [Evaluate Microsoft Defender Antivirus using PowerShell](microsoft-defender-antivirus-using-powershell.md) |
73-
| Mac | Jamf (or another tool) | [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md) |
74-
| Linux | Configuration profile <br/> Defender for Endpoint security settings management | [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md) |
73+
| Mac |Microsoft Defender for Endpoint security settings management or Intune or Jamf or another tool| [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md) |
74+
| Linux |Microsoft Defender for Endpoint security settings management or another tool.| [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md) |
7575

7676
## How to submit possible false negatives for investigation
7777

@@ -113,7 +113,7 @@ It's crucial to report to Microsoft as soon as possible. The advanced hunting te
113113

114114
| Portal | Description |
115115
|--|--|
116-
| MDSI portal | The MDSI portal is a service provided by Microsoft Security Intelligence. It allows users to submit files for malware analysis. Microsoft security researchers analyze these files to determine if they're threats, unwanted applications, or normal files. The portal is used to report detection concerns to Microsoft Defender Research, submit files for analysis, and track the results of submissions.<br/><br/>This portal was formerly known as the Windows Defender Security Intelligence (WSDI). Because it currently supports Mac, Linux, and Android submissions, its name changed. |
116+
| MDSI portal | The MDSI portal is a service provided by Microsoft Defender Security Intelligence. It allows users to submit files for malware analysis. Microsoft Defender security researchers analyze these files to determine if they're threats, unwanted applications, or normal files. The portal is used to report detection concerns to Microsoft Defender Research, submit files for analysis, and track the results of submissions.<br/><br/>|
117117
| Microsoft Defender portal | If you have a subscription to Microsoft Defender XDR, or your subscription includes Defender for Endpoint Plan 2, you can use the **Submissions** page in the Microsoft Defender portal. |
118118

119119
1. Submit the data you gathered during steps 1-2 by using either the MDSI portal or the Microsoft Defender portal.

defender-endpoint/mde-linux-arm.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,16 +43,28 @@ Initially, the following Linux distributions are supported in preview:
4343

4444
- Ubuntu 20.04 ARM64
4545
- Ubuntu 22.04 ARM64
46+
- Ubuntu 24.04 ARM64
47+
4648
- Amazon Linux 2 ARM64
4749
- Amazon Linux 2023 ARM64
4850

51+
- RHEL 8.x ARM64
52+
53+
- RHEL 9.x ARM64
54+
55+
- Oracle Linux 8.x ARM64
56+
57+
- Oracle Linux 9.x ARM64
58+
59+
- SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64
60+
4961
> [!NOTE]
5062
> Support for more Linux distributions is planned as part of this preview program.
5163
52-
The installation procedures in this article install the agent version `101.24102.0002` from the insiders-slow channel on the ARM64-based device. (See [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md).)
53-
5464
## Deploy Defender for Endpoint on Linux for ARM64-based devices
5565

66+
The deployment procedures in this article installs the agent version `101.24102.0003` from the insiders-slow channel on the ARM64-based device. (See [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md).)
67+
5668
You can choose from several methods to deploy Defender for Endpoint on Linux to your ARM64-based device:
5769

5870
- [Installer script](#deploy-using-the-installer-script)
@@ -351,7 +363,7 @@ See these articles:
351363

352364
## Troubleshoot deployment issues
353365

354-
If you run into any issues deploying Defender for Endpoint on Linux to your ARM64-based devices, help is available. First, review our list of common issues and how to resolve them. If the problem persists, contact us.
366+
If you run into any issues deploying Defender for Endpoint on Linux to your ARM64-based devices, help is available. First, review our list of common issues and how to resolve them. If the problem persists, [contact us](#contact-us-if-you-need-help).
355367

356368
### Common issues and how to resolve them
357369

defender-endpoint/mde-security-settings-management.md

Lines changed: 17 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ As a security administrator, you can configure different Microsoft Defender Anti
5151
5252
You'll find endpoint security policies under **Endpoints** > **Configuration management** > **Endpoint security policies**.
5353

54-
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal":::
54+
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal" lightbox="./media/endpoint-security-policies.png":::
5555

5656
The following list provides a brief description of each endpoint security policy type:
5757

@@ -109,14 +109,14 @@ To verify that you have successfully created a policy, select a policy name from
109109

110110
> [!NOTE]
111111
> It can take up to 90 minutes for a policy to reach a device. To speed up the process, for devices Managed by Defender for Endpoint, you can select **Policy sync** from the actions menu so that it's applied in approximately 10 minutes.
112-
> :::image type="content" source="./media/policy-sync.png" alt-text="Image showing policy sync button":::
112+
>
113+
> :::image type="content" source="./media/policy-sync.png" alt-text="Image showing policy sync button" lightbox="./media/policy-sync.png":::
113114
114115
The policy page displays details that summarize the status of the policy. You can view a policy's status, which devices it is applied to, and assigned groups.
115116

116117
During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md#security-policies).
117118

118-
119-
:::image type="content" source="./media/security-policies-list.png" alt-text="Security policies tab with list of policies":::
119+
:::image type="content" source="./media/security-policies-list.png" alt-text="Security policies tab with list of policies" lightbox="./media/security-policies-list.png":::
120120

121121
## Antivirus policies for Windows and Windows Server
122122

@@ -131,14 +131,10 @@ During an investigation, you can also view the **Security policies** tab in the
131131
|PUA Protection|PUA Protection on|
132132

133133
For more information, see:
134-
135-
[Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
136-
137-
[Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
138-
139-
[Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
140-
141-
[Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
134+
- [Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
135+
- [Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
136+
- [Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
137+
- [Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
142138

143139
1. **Cloud protection features**:
144140

@@ -165,9 +161,7 @@ Standard security intelligence updates can take hours to prepare and deliver; ou
165161
|Archive Max Depth | Not configured|
166162
|Archive Max Size | Not configured|
167163

168-
For more information, see:
169-
170-
[Configure Microsoft Defender Antivirus scanning options](/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus)
164+
For more information, see [Configure Microsoft Defender Antivirus scanning options](/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus).
171165

172166
**Security Intelligence updates**:
173167

@@ -187,10 +181,8 @@ For more information, see:
187181
> 'MMPC' is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
188182
189183
For more information, see:
190-
191-
[Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
192-
193-
[Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
184+
- [Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
185+
- [Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
194186

195187
**Engine updates**:
196188

@@ -247,10 +239,8 @@ For more information, see [Manage the gradual rollout process for Microsoft Defe
247239
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
248240
249241
For more information, see:
250-
251-
[Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
252-
253-
[Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
242+
- [Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
243+
- [Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
254244

255245
**Threat severity default action**:
256246

@@ -285,10 +275,8 @@ Disable local administrator AV settings such as exclusions, and set the policies
285275
|Excluded Processes | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe|
286276

287277
For more information, see:
288-
289-
[Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
290-
291-
[Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
278+
- [Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
279+
- [Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
292280

293281
**Microsoft Defender Core service:**
294282

@@ -383,9 +371,7 @@ For more information, see [Attack surface reduction rules deployment overview](/
383371
| -------- | -------- |
384372
| TamperProtection (Device) | On|
385373

386-
For more information, see:
387-
388-
[Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection)
374+
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
389375

390376
#### Check the Cloud Protection network connectivity
391377

@@ -398,7 +384,7 @@ cd "C:\Program Files\Windows Defender"
398384
MpCmdRun.exe -ValidateMapsConnection
399385
```
400386

401-
For more information [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
387+
For more information, see [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
402388

403389
#### Check the platform update version
404390

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 15 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -89,20 +89,32 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
8989

9090
- Ubuntu 20.04 ARM64
9191
- Ubuntu 22.04 ARM64
92+
- Ubuntu 24.04 ARM64
93+
9294
- Amazon Linux 2 ARM64
9395
- Amazon Linux 2023 ARM64
9496

95-
> [!IMPORTANT]
97+
- RHEL 8.x ARM64
98+
99+
- RHEL 9.x ARM64
100+
101+
- Oracle Linux 8.x ARM64
102+
103+
- Oracle Linux 9.x ARM64
104+
105+
- SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64
106+
107+
> [!IMPORTANT]
96108
> Support for Microsoft Defender for Endpoint on Linux for ARM64-based Linux devices is now in preview. For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
97109
98-
> [!NOTE]
110+
> [!NOTE]
99111
> The workstation versions of these distributions are unsupported.
100112
> Distributions and versions that aren't explicitly listed are unsupported (even if they're derived from the officially supported distributions).
101113
> After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
102114
> Currently, Rocky and Alma distributions aren't supported in Microsoft Defender Vulnerability Management.
103115
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version agnostic. The minimal requirement for the kernel version to be `3.10.0-327` or later.
104116
105-
> [!CAUTION]
117+
> [!CAUTION]
106118
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions isn't supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
107119
108120
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.

defender-for-iot/manage-devices-inventory.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,10 @@ To customize the device inventory views:
4242

4343
[!INCLUDE [defender-iot-site-association](includes/site-association.md)]
4444

45+
### OT network tag
46+
47+
When a Defender for Endpoint agent is associated with a site, all devices discovered by that agent automatically receive the **Network type: OT** tag in the **Tags** column to show that these devices are part of the site. This tag helps users focus on devices that belong to their OT network.
48+
4549
## Manage OT devices
4650

4751
- [Explore the device inventory](/defender-endpoint/machines-view-overview#explore-the-device-inventory) including search, export to CSV, and more.

defender-xdr/breadcrumb/toc.yml

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,15 @@
1212
- name: Microsoft Defender XDR
1313
tocHref: /unified-secops-platform/
1414
topicHref: /defender-xdr/index
15+
- name: Microsoft Defender XDR
16+
tocHref: /defender-for-endpoint/
17+
topicHref: /defender-xdr/index
18+
- name: Microsoft Defender XDR
19+
tocHref: /defender-office-365/
20+
topicHref: /defender-xdr/index
21+
- name: Microsoft Defender XDR
22+
tocHref: /defender-cloud-apps/
23+
topicHref: /defender-xdr/index
1524

1625
## Azure override
1726
- name: 'Microsoft Defender'

0 commit comments

Comments
 (0)