You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/release-notes.md
+12-1Lines changed: 12 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,17 @@ For news about earlier releases, see [Archive of past updates for Microsoft Defe
21
21
22
22
## February 2025
23
23
24
+
### Enhanced alert source accuracy
25
+
26
+
Microsoft Defender for Cloud Apps is enhancing its alert sources to deliver more precise information. This update, applicable to new alerts only, will be reflected across various experiences and APIs, including the Defender XDR portal, Advanced hunting, and Graph API.
27
+
The goal is to improve the accuracy of alert origins, facilitating better identification, management, and response to alerts.
28
+
29
+
To learn more about the different alert sources in Defender XDR see the _Alert sources_ section of [Investigate alerts in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn](/defender-xdr/investigate-alerts?tabs=settings)
30
+
31
+
To learn more about the Graph API alert resource: [alert resource type - Microsoft Graph v1.0 | Microsoft Learn](/graph/api/resources/security-alert?view=graph-rest-1.0)
32
+
33
+
### Network requirement updates
34
+
24
35
Due to improvements being made to Microsoft Defender for Cloud Apps to improve security and performance, you must update network information in your system's firewall and additional third-party services. Make these changes by March 16, 2025 to ensure uninterrupted access to our services:
25
36
26
37
- Update your firewall rules to allow outbound traffic on port 443 to the following new CDN (Content Delivery Network) endpoints before March 16, 2025:
@@ -128,7 +139,7 @@ Administrators who understand the power of Edge in-browser protection, can now r
128
139
129
140
A primary reason is security, since the barrier to circumventing session controls using Edge is much higher than with reverse proxy technology.
130
141
131
-
For more information see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
142
+
For more information, see [Enforce Edge in-browser protection when accessing business apps](in-browser-protection.md#enforce-microsoft-edge-browser-protection-when-accessing-business-apps).
132
143
133
144
### Connect Mural to Defender for Cloud Apps (Preview)
Copy file name to clipboardExpand all lines: defender-endpoint/guidance-for-pen-testing-and-bas.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,8 +70,8 @@ It's important to get the settings correct. To resolve misconfiguration issues,
70
70
| Windows | Microsoft Defender for Endpoint security settings management <br/>(*Recommended*) |[Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies)](evaluate-mda-using-mde-security-settings-management.md)|
71
71
| Windows | Group Policy |[Evaluate Microsoft Defender Antivirus using Group Policy](evaluate-mdav-using-gp.md)|
72
72
| Windows | PowerShell |[Evaluate Microsoft Defender Antivirus using PowerShell](microsoft-defender-antivirus-using-powershell.md)|
73
-
| Mac |Jamf (or another tool) |[Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)|
74
-
| Linux | Configuration profile <br/> Defender for Endpoint security settings management |[Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)|
73
+
| Mac |Microsoft Defender for Endpoint security settings management or Intune or Jamf or another tool|[Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md)|
74
+
| Linux |Microsoft Defender for Endpoint security settings management or another tool.|[Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md)|
75
75
76
76
## How to submit possible false negatives for investigation
77
77
@@ -113,7 +113,7 @@ It's crucial to report to Microsoft as soon as possible. The advanced hunting te
113
113
114
114
| Portal | Description |
115
115
|--|--|
116
-
| MDSI portal | The MDSI portal is a service provided by Microsoft Security Intelligence. It allows users to submit files for malware analysis. Microsoft security researchers analyze these files to determine if they're threats, unwanted applications, or normal files. The portal is used to report detection concerns to Microsoft Defender Research, submit files for analysis, and track the results of submissions.<br/><br/>This portal was formerly known as the Windows Defender Security Intelligence (WSDI). Because it currently supports Mac, Linux, and Android submissions, its name changed. |
116
+
| MDSI portal | The MDSI portal is a service provided by Microsoft Defender Security Intelligence. It allows users to submit files for malware analysis. Microsoft Defender security researchers analyze these files to determine if they're threats, unwanted applications, or normal files. The portal is used to report detection concerns to Microsoft Defender Research, submit files for analysis, and track the results of submissions.<br/><br/>|
117
117
| Microsoft Defender portal | If you have a subscription to Microsoft Defender XDR, or your subscription includes Defender for Endpoint Plan 2, you can use the **Submissions** page in the Microsoft Defender portal. |
118
118
119
119
1. Submit the data you gathered during steps 1-2 by using either the MDSI portal or the Microsoft Defender portal.
Copy file name to clipboardExpand all lines: defender-endpoint/mde-linux-arm.md
+15-3Lines changed: 15 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,16 +43,28 @@ Initially, the following Linux distributions are supported in preview:
43
43
44
44
- Ubuntu 20.04 ARM64
45
45
- Ubuntu 22.04 ARM64
46
+
- Ubuntu 24.04 ARM64
47
+
46
48
- Amazon Linux 2 ARM64
47
49
- Amazon Linux 2023 ARM64
48
50
51
+
- RHEL 8.x ARM64
52
+
53
+
- RHEL 9.x ARM64
54
+
55
+
- Oracle Linux 8.x ARM64
56
+
57
+
- Oracle Linux 9.x ARM64
58
+
59
+
- SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64
60
+
49
61
> [!NOTE]
50
62
> Support for more Linux distributions is planned as part of this preview program.
51
63
52
-
The installation procedures in this article install the agent version `101.24102.0002` from the insiders-slow channel on the ARM64-based device. (See [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md).)
53
-
54
64
## Deploy Defender for Endpoint on Linux for ARM64-based devices
55
65
66
+
The deployment procedures in this article installs the agent version `101.24102.0003` from the insiders-slow channel on the ARM64-based device. (See [What's new in Microsoft Defender for Endpoint on Linux](linux-whatsnew.md).)
67
+
56
68
You can choose from several methods to deploy Defender for Endpoint on Linux to your ARM64-based device:
If you run into any issues deploying Defender for Endpoint on Linux to your ARM64-based devices, help is available. First, review our list of common issues and how to resolve them. If the problem persists, contact us.
366
+
If you run into any issues deploying Defender for Endpoint on Linux to your ARM64-based devices, help is available. First, review our list of common issues and how to resolve them. If the problem persists, [contact us](#contact-us-if-you-need-help).
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal":::
54
+
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal" lightbox="./media/endpoint-security-policies.png":::
55
55
56
56
The following list provides a brief description of each endpoint security policy type:
57
57
@@ -109,14 +109,14 @@ To verify that you have successfully created a policy, select a policy name from
109
109
110
110
> [!NOTE]
111
111
> It can take up to 90 minutes for a policy to reach a device. To speed up the process, for devices Managed by Defender for Endpoint, you can select **Policy sync** from the actions menu so that it's applied in approximately 10 minutes.
The policy page displays details that summarize the status of the policy. You can view a policy's status, which devices it is applied to, and assigned groups.
115
116
116
117
During an investigation, you can also view the **Security policies** tab in the device page to view the list of policies that are being applied to a particular device. For more information, see [Investigating devices](investigate-machines.md#security-policies).
117
118
118
-
119
-
:::image type="content" source="./media/security-policies-list.png" alt-text="Security policies tab with list of policies":::
119
+
:::image type="content" source="./media/security-policies-list.png" alt-text="Security policies tab with list of policies" lightbox="./media/security-policies-list.png":::
120
120
121
121
## Antivirus policies for Windows and Windows Server
122
122
@@ -131,14 +131,10 @@ During an investigation, you can also view the **Security policies** tab in the
131
131
|PUA Protection|PUA Protection on|
132
132
133
133
For more information, see:
134
-
135
-
[Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
136
-
137
-
[Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
138
-
139
-
[Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
140
-
141
-
[Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
134
+
-[Advanced technologies at the core of Microsoft Defender Antivirus](/defender-endpoint/adv-tech-of-mdav)
135
+
-[Enable and configure Microsoft Defender Antivirus always-on protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
136
+
-[Behavior monitoring in Microsoft Defender Antivirus](/defender-endpoint/behavior-monitor)
137
+
-[Detect and block potentially unwanted applications](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
142
138
143
139
1.**Cloud protection features**:
144
140
@@ -165,9 +161,7 @@ Standard security intelligence updates can take hours to prepare and deliver; ou
165
161
|Archive Max Depth | Not configured|
166
162
|Archive Max Size | Not configured|
167
163
168
-
For more information, see:
169
-
170
-
[Configure Microsoft Defender Antivirus scanning options](/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus)
164
+
For more information, see [Configure Microsoft Defender Antivirus scanning options](/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus).
171
165
172
166
**Security Intelligence updates**:
173
167
@@ -187,10 +181,8 @@ For more information, see:
187
181
> 'MMPC' is Microsoft Defender security intelligence center (WDSI formerly Microsoft Malware Protection Center) https://www.microsoft.com/en-us/wdsi/definitions.
188
182
189
183
For more information, see:
190
-
191
-
[Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
192
-
193
-
[Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
184
+
-[Microsoft Defender Antivirus security intelligence and product updates](/defender-endpoint/microsoft-defender-antivirus-updates)
185
+
-[Update channels for security intelligence updates](/defender-endpoint/manage-gradual-rollout)
194
186
195
187
**Engine updates**:
196
188
@@ -247,10 +239,8 @@ For more information, see [Manage the gradual rollout process for Microsoft Defe
247
239
> And for Windows Servers, on Saturday's at 1:00 AM. (60)
248
240
249
241
For more information, see:
250
-
251
-
[Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
252
-
253
-
[Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
242
+
-[Configure scheduled quick or full Microsoft Defender Antivirus scans](/defender-endpoint/schedule-antivirus-scans)
243
+
-[Microsoft Defender Antivirus full scan considerations and best practices](/defender-endpoint/mdav-scan-best-practices)
254
244
255
245
**Threat severity default action**:
256
246
@@ -285,10 +275,8 @@ Disable local administrator AV settings such as exclusions, and set the policies
285
275
|Excluded Processes | Add as needed for working around false positives (FPs) and/or troubleshooting high cpu utilizations in MsMpEng.exe|
286
276
287
277
For more information, see:
288
-
289
-
[Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
290
-
291
-
[Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
278
+
-[Prevent or allow users to locally modify Microsoft Defender Antivirus policy settings](/defender-endpoint/configure-local-policy-overrides-microsoft-defender-antivirus)
279
+
-[Configure custom exclusions for Microsoft Defender Antivirus](/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
292
280
293
281
**Microsoft Defender Core service:**
294
282
@@ -383,9 +371,7 @@ For more information, see [Attack surface reduction rules deployment overview](/
383
371
| -------- | -------- |
384
372
| TamperProtection (Device) | On|
385
373
386
-
For more information, see:
387
-
388
-
[Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection)
374
+
For more information, see [Protect security settings with tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
389
375
390
376
#### Check the Cloud Protection network connectivity
391
377
@@ -398,7 +384,7 @@ cd "C:\Program Files\Windows Defender"
398
384
MpCmdRun.exe -ValidateMapsConnection
399
385
```
400
386
401
-
For more information [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
387
+
For more information, see[Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+15-3Lines changed: 15 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,20 +89,32 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
89
89
90
90
- Ubuntu 20.04 ARM64
91
91
- Ubuntu 22.04 ARM64
92
+
- Ubuntu 24.04 ARM64
93
+
92
94
- Amazon Linux 2 ARM64
93
95
- Amazon Linux 2023 ARM64
94
96
95
-
> [!IMPORTANT]
97
+
- RHEL 8.x ARM64
98
+
99
+
- RHEL 9.x ARM64
100
+
101
+
- Oracle Linux 8.x ARM64
102
+
103
+
- Oracle Linux 9.x ARM64
104
+
105
+
- SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64
106
+
107
+
> [!IMPORTANT]
96
108
> Support for Microsoft Defender for Endpoint on Linux for ARM64-based Linux devices is now in preview. For more information, see [Microsoft Defender for Endpoint on Linux for ARM64-based devices (preview)](mde-linux-arm.md).
97
109
98
-
> [!NOTE]
110
+
> [!NOTE]
99
111
> The workstation versions of these distributions are unsupported.
100
112
> Distributions and versions that aren't explicitly listed are unsupported (even if they're derived from the officially supported distributions).
101
113
> After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
102
114
> Currently, Rocky and Alma distributions aren't supported in Microsoft Defender Vulnerability Management.
103
115
> Microsoft Defender for Endpoint for all other supported distributions and versions is kernel-version agnostic. The minimal requirement for the kernel version to be `3.10.0-327` or later.
104
116
105
-
> [!CAUTION]
117
+
> [!CAUTION]
106
118
> Running Defender for Endpoint on Linux side by side with other `fanotify`-based security solutions isn't supported. It can lead to unpredictable results, including hanging the operating system. If there are any other applications on the system that use `fanotify` in blocking mode, applications are listed in the `conflicting_applications` field of the `mdatp health` command output. The Linux **FAPolicyD** feature uses `fanotify` in blocking mode, and is therefore unsupported when running Defender for Endpoint in active mode. You can still safely take advantage of Defender for Endpoint on Linux EDR functionality after configuring the antivirus functionality Real Time Protection Enabled to [Passive mode](linux-preferences.md#enforcement-level-for-antivirus-engine).
107
119
108
120
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
When a Defender for Endpoint agent is associated with a site, all devices discovered by that agent automatically receive the **Network type: OT** tag in the **Tags** column to show that these devices are part of the site. This tag helps users focus on devices that belong to their OT network.
48
+
45
49
## Manage OT devices
46
50
47
51
-[Explore the device inventory](/defender-endpoint/machines-view-overview#explore-the-device-inventory) including search, export to CSV, and more.
0 commit comments