Skip to content

Commit cfe50de

Browse files
authored
Merge branch 'main' into WI410649-new-article-identity-security-iniatives
2 parents 6370dba + 8d77bdb commit cfe50de

File tree

4 files changed

+27
-22
lines changed

4 files changed

+27
-22
lines changed

defender-endpoint/behavior-monitor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
ms.service: defender-endpoint
1111
ms.subservice: ngp
1212
ms.localizationpriority: medium
13-
ms.date: 03/25/2025
13+
ms.date: 04/29/2025
1414
search.appverid: met150
1515
---
1616

@@ -69,7 +69,7 @@ The following table shows the different ways to configure behavior monitoring.
6969
| CSP | AllowBehaviorMonitoring | [Defender Policy CSP](/mem/intune/protect/antivirus-microsoft-defender-settings-windows#real-time-protection) |
7070
| Configuration Manager Tenant Attach | Turn on behavior monitoring | [Windows Antivirus policy settings from Microsoft Defender Antivirus for tenant attached devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows-tenant-attach#real-time-protection) |
7171
| Group Policy | Turn on behavior monitoring | [Download Group Policy Settings Reference Spreadsheet for Windows 11 2023 Update (23H2)](https://www.microsoft.com/download/details.aspx?id=105668) |
72-
| PowerShell | Set-Preference -DisableBehaviorMonitoring | [Set-MpPreference](/powershell/module/defender/set-mppreference#-disablebehaviormonitoring) |
72+
| PowerShell | Set-MpPreference -DisableBehaviorMonitoring | [Set-MpPreference](/powershell/module/defender/set-mppreference#-disablebehaviormonitoring) |
7373
| WMI | boolean DisableBehaviorMonitoring; | [MSFT\_MpPreference class](/previous-versions/windows/desktop/defender/msft-mppreference) |
7474

7575
If you use Microsoft Defender for Business, see [Review or edit your next-generation protection policies in Microsoft Defender for Business](/defender-business/mdb-next-generation-protection).

defender-endpoint/ios-configure-features.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -318,10 +318,10 @@ Defender for Endpoint on iOS enables admins to configure custom indicators on iO
318318

319319
> [!NOTE]
320320
> Defender for Endpoint on iOS supports creating custom indicators only for URLs and domains. IP based custom indicators aren't supported on iOS.
321+
> > IP `245.245.0.1` is an internal Defender IP and shouldn't be included in custom indicators by customers to avoid any functionality issues.
322+
> > For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
321323
>
322-
> IP `245.245.0.1` is an internal Defender IP and shouldn't be included in custom indicators by customers to avoid any functionality issues.
323-
>
324-
> For iOS, no alerts are generated in the Microsoft Defender portal when the URL or domain set in the indicator is accessed.
324+
> MDE portal Timeline doesn't display the URL for Custom URL Indicator Blocks for unsupervised devices, instead it marks hidden for privacy.
325325
326326
## Configure vulnerability assessment of apps
327327

@@ -374,7 +374,7 @@ Defender for Endpoint on iOS supports vulnerability assessments of OS and apps.
374374
- The privacy approval screen appears only for unsupervised devices.
375375
- Only if end-user approves the privacy, the app information is sent to the Defender for Endpoint console.
376376

377-
:::image type="content" source="media/tvm-user-privacy2.png" alt-text="Screenshot of the end user privacy screen." lightbox="media/tvm-user-privacy2.png":::
377+
:::image type="content" source="media/tvm-user-privacy2.png" alt-text="Screenshot of the end user privacy screen.":::
378378

379379
Once the client versions are deployed to target iOS devices, processing starts. Vulnerabilities found on those devices start showing up in the Defender Vulnerability Management dashboard. The processing might take few hours (max 24 hours) to complete. This time frame is especially true for the entire list of apps to show up in the software inventory.
380380

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -68,10 +68,14 @@ For detailed licensing information, see [Product Terms: Microsoft Defender for E
6868

6969
The following Linux server distributions and x64 (AMD64/EM64T) versions are supported:
7070

71-
- Red Hat Enterprise Linux 7.2 or higher
71+
- Red Hat Enterprise Linux 7.2 and higher
72+
7273
- Red Hat Enterprise Linux 8.x
7374
- Red Hat Enterprise Linux 9.x
74-
- CentOS 7.2 or higher, excluding CentOS Stream
75+
- CentOS 7.2 and higher, excluding CentOS Stream
76+
77+
- CentOS 8.x
78+
7579
- Ubuntu 16.04 LTS
7680
- Ubuntu 18.04 LTS
7781
- Ubuntu 20.04 LTS
@@ -80,7 +84,8 @@ The following Linux server distributions and x64 (AMD64/EM64T) versions are supp
8084
- Debian 9 - 12
8185
- SUSE Linux Enterprise Server 12.x
8286
- SUSE Linux Enterprise Server 15.x
83-
- Oracle Linux 7.2 or higher
87+
- Oracle Linux 7.2 and higher
88+
8489
- Oracle Linux 8.x
8590
- Oracle Linux 9.x
8691
- Amazon Linux 2
@@ -174,13 +179,6 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
174179
- For RHEL6 the mdatp RPM package requires `policycoreutils`, `libselinux`, and `mde-netfilter`.
175180
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, and `mde-netfilter`.
176181

177-
> [!NOTE]
178-
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
179-
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or older, the following additional dependency on the auditd package exists for mdatp:
180-
> - The mdatp RPM package requires `audit`, `semanage`.
181-
> - For DEBIAN, the mdatp package requires `auditd`.
182-
> - For Mariner, the mdatp package requires `audit`.
183-
184182
The `mde-netfilter` package also has the following package dependencies:
185183

186184
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`

defender-endpoint/mde-sdp-strategy.md

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: emmwalshh
66
ms.author: ewalsh
77
ms.reviewer: yongrhee
88
manager: deniseb
9-
ms.date: 09/16/2024
9+
ms.date: 04/29/2025
1010
ms.topic: conceptual
1111
ms.service: defender-endpoint
1212
ms.subservice: ngp
@@ -19,28 +19,35 @@ ms.collection:
1919

2020
# Use safe deployment practices to safeguard and manage your environment
2121

22-
Microsoft follows safe deployment practices (SDP) to minimize the risk of security updates having an unexpected impact. This article describes Microsoft Defender for Endpoint's approach to SDP and what customers can do to manage their own roll-out processes to add an extra layer of control.
22+
<!-- Added introductory text to emphasize why updates are important. Mirrors language from https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/microsoft-defender-for-endpoint%e2%80%99s-safe-deployment-practices/4220342 -->
23+
24+
Microsoft Defender for Endpoint helps protect organizations against sophisticated adversaries while optimizing for resiliency, performance, and compatibility, following [best practices for managing security tools in Windows](https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/). Keeping Microsoft Defender for Endpoint up to date is essential to ensure your devices have the latest technology and features needed to protect against new malware and attack techniques.
25+
26+
Microsoft follows safe deployment practices (SDP) to deliver critical new product capabilities while minimizing the risk of updates having unexpected impacts to endpoint performance and availability. This article describes Defender for Endpoint's approach to SDP and how customers can manage their own roll-out processes to add extra layers of control to meet their own business, technical, and security requirements.
27+
28+
## Approach and update types
2329

2430
Microsoft Defender for Endpoint ships updates externally only after all the certification and validation tests are completed across multiple iterations of internal devices.
2531

2632
Defender for Endpoint applies SDP to two distinct update mechanisms:
2733

28-
- Software and driver updates that are updated monthly (can potentially update kernel-mode components).
29-
- Security intelligence and detection logic updates that can be updated multiple times a day (updates only apply to user-mode components).
34+
- Software and driver updates that are updated monthly and can potentially update kernel-mode components.
35+
36+
- Security intelligence and detection logic updates that can be updated multiple times a day and apply only to user-mode components.
3037

3138
## Monthly SDP software and driver updates
3239

3340
Defender for Endpoint releases monthly software and driver updates that add new functionality, improve existing features, and resolve bugs.
3441

35-
Defender for Endpoint's kernel drivers capture system-wide signals like process execution, file creation, and network activity. These drivers are updated through Windows Update, over a gradual and staged deployment process after spending weeks in stabilization and testing. The deployment evaluation monitors key metrics like reliability, performance, battery, application compatibility, and more across hardware and software configurations.
42+
Defender for Endpoint's kernel drivers captures system-wide signals like process execution, file creation, and network activity. These drivers are updated through Windows Update, over a gradual and staged deployment process after spending weeks in stabilization and testing. The deployment evaluation monitors key metrics like reliability, performance, battery, application compatibility, and more across hardware and software configurations.
3643

3744
The process for rolling out software and driver updates for Defender for Endpoint is shown in this image:
3845

3946
:::image type="content" alt-text="Screenshot that shows the process for rolling out software and driver updates for Defender for Endpoint." source="/defender/media/defender-endpoint/mde-software-driver-updates.png" lightbox="/defender/media/defender-endpoint/mde-software-driver-updates.png":::
4047

4148
### Microsoft SDP for monthly updates
4249

43-
All code and content changes go through engineering release gates along with extensive validations and stability testing. After the certification and validation process, Microsoft ships the updates through multiple groups of devices known as stabilization rings. The first stabilization ring targets Microsoft's hundreds of thousands of employees and millions of internal devices. This helps ensure Microsoft discovers and addresses issues first, before customers.
50+
All code and content changes go through engineering release gates along with extensive validations and stability testing. After the certification and validation process, Microsoft ships the updates through multiple groups of devices known as stabilization rings. The first stabilization ring targets Microsoft's hundreds of thousands of employees and millions of internal devices. This helps ensure your devices are equipped with the latest technology and features necessary to defend against emerging malware and attack techniques.
4451

4552
Within each ring, Microsoft closely monitors quality signals such as product behavior and performance, false positives, as well as functional and reliability issues, before proceeding to roll out the update to a broader set of devices.
4653

0 commit comments

Comments
 (0)