Skip to content

Commit d311e07

Browse files
authored
Merge branch 'main' into docs-editor/live-response-1736368750
2 parents 2d183cf + 2b8f244 commit d311e07

File tree

2 files changed

+13
-2
lines changed

2 files changed

+13
-2
lines changed

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 10/17/2024
7+
ms.date: 01/10/2025
88
ms.topic: conceptual
99
author: emmwalshh
1010
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132132

133133
- Endpoints must be onboarded to Defender for Endpoint.
134134

135+
- Windows Security Center Service must be enabled.
136+
137+
> [!WARNING]
138+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140+
135141
> [!IMPORTANT]
136142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).

defender-xdr/incident-response-overview.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,12 @@ For more information, see [Automated investigation and response in Microsoft Def
5151

5252
It's not enough to respond to attacks as they occur. For extended, multi-phase attacks such as ransomware, you must proactively search for the evidence of an attack in progress and take action to stop it before it completes.
5353

54-
Advanced hunting is a query-based threat hunting tool in Microsoft Defender XDR that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. This flexible access to the Microsoft Defender XDR data enables unconstrained hunting for both known and potential threats.
54+
Advanced hunting is a query-based threat hunting tool in Microsoft Defender XDR that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities.
55+
56+
> [!TIP]
57+
> You can extend the 30 days of raw data of advanced hunting using [Microsoft XDR Streaming API](/defender-xdr/streaming-api) and [Microsoft Defender for Endpoint Streaming API](/defender-endpoint/api/raw-data-export).
58+
59+
This flexible access to the Microsoft Defender XDR data enables unconstrained hunting for both known and potential threats.
5560

5661
You can use the same threat hunting queries to build custom detection rules. These rules run automatically to check for and then respond to suspected breach activity, misconfigured machines, and other findings.
5762

0 commit comments

Comments
 (0)