Skip to content

Commit d3fd3ae

Browse files
Merge pull request #3547 from MicrosoftDocs/main
[AutoPublish] main to live - 04/22 15:32 PDT | 04/23 04:02 IST
2 parents aae3ffc + b0ebfed commit d3fd3ae

File tree

3 files changed

+22
-12
lines changed

3 files changed

+22
-12
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,19 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
6464

6565
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
6666

67+
### Apr-2025 (Build: 101.25032.0006 | Release version: 20.125032.6.0)
68+
69+
| Build: | **101.25032.0006** |
70+
|--------------------|-----------------------|
71+
| Release version: | **20.125032.6.0** |
72+
| Engine version: | **1.1.25020.3000** |
73+
| Signature version: | **1.427.158.0** |
74+
75+
##### What's new
76+
77+
- Hardware UUID is now displayed in the Security Portal
78+
- Bug and performance fixes
79+
6780
### Mar-2025 (Build: 101.25022.0003 | Release version: 20.125022.3.0)
6881

6982
| Build: | **101.25022.0003** |

defender-office-365/mdo-support-teams-sec-ops-guide.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier1
1717
description: A prescriptive playbook for SecOps personnel to manage Microsoft Teams protection in Microsoft Defender for Office 365.
1818
ms.service: defender-office-365
19-
ms.date: 04/16/2025
19+
ms.date: 04/22/2025
2020
appliesto:
2121
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
2222
---
@@ -69,15 +69,10 @@ SecOps team members can use threat hunting or information from external threat i
6969

7070
SecOps team members can triage and respond to false positive Teams messages (good messages blocked) on the **Quarantine** page in Defender for Office 365 at <https://security.microsoft.com/quarantine>.
7171

72-
- Teams messages detected by zero-hour auto protection (ZAP) are available on the **Teams messages** tab. SecOps team members can [take action](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-teams-messages) on these messages. For example, preview messages, download messages, submit messages to Microsoft for review, and release the messages from quarantine.
72+
Teams messages detected by zero-hour auto protection (ZAP) are available on the **Teams messages** tab. SecOps team members can [take action](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-teams-messages) on these messages. For example, preview messages, download messages, submit messages to Microsoft for review, and release the messages from quarantine.
7373

74-
> [!TIP]
75-
> Teams messages released from quarantine are available to senders and recipients in the original location in Teams chats and channel posts.
76-
77-
- Files in Teams messages detected by Safe Attachments for SharePoint, OneDrive, and Microsoft Teams are available on the **Files** tab. SecOps team members can [take action](quarantine-admin-manage-messages-files.md#take-action-on-quarantined-files) on these files. For example, view file details, download files, submit messages to Microsoft for review, and release the files from quarantine.
78-
79-
> [!TIP]
80-
> Files released from quarantine are available to users in the original location in SharePoint, OneDrive, and Teams.
74+
> [!TIP]
75+
> Teams messages released from quarantine are available to senders and recipients in the original location in Teams chats and channel posts.
8176
8277
## Enable SecOps to hunt for threats and detections in Microsoft Teams
8378

@@ -88,6 +83,10 @@ SecOps team members can proactively hunt for potentially malicious Teams message
8883
- **URL click** tab: This tab contains all user clicks on URLs in email, in supported Office files in SharePoint and OneDrive, and in Microsoft Teams. You can use the [available filters](threat-explorer-real-time-detections-about.md#filterable-properties-in-the-url-clicks-view-in-threat-explorer) to hunt on detection data.
8984

9085
- On the **Advanced hunting** page in the Defender portal at <https://security.microsoft.com/v2/advanced-hunting>. The following hunting tables are available for Teams-related threats:
86+
87+
> [!NOTE]
88+
> The hunting tables are currently in Preview.
89+
9190
- [MessageEvents](/defender-xdr/advanced-hunting-messageevents-table): Contains raw data about every internal and external Teams message that included a URL. Sender address, Sender display name, Sender type, and more are available in this table.
9291
- [MessagePostDeliveryEvents](/defender-xdr/advanced-hunting-messagepostdeliveryevents-table): Contains raw data about ZAP events on Teams messages.
9392
- [MessageUrlInfo](/defender-xdr/advanced-hunting-messageurlinfo-table): Contains raw data about URLs in Teams messages.

defender-xdr/pilot-deploy-defender-office-365.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.collection:
1818
- highpri
1919
- tier1
2020
ms.topic: concept-article
21-
ms.date: 05/31/2024
21+
ms.date: 04/22/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
#customer intent: To learn how to pilot and deploy Microsoft Defender for Office 365 in your production Microsoft 365 tenant.
@@ -32,14 +32,12 @@ This article assumes you have a production Microsoft 365 tenant and are piloting
3232

3333
Defender for Office 365 contributes to a Zero Trust architecture by helping to prevent or reduce business damage from a breach. For more information, see the [Prevent or reduce business damage from a breach](/security/zero-trust/adopt/prevent-reduce-business-damage-breach) business scenario in the Microsoft Zero Trust adoption framework.
3434

35-
<!---
3635
> [!TIP]
3736
> For information about configuring protection for Microsoft Teams, see the following articles:
3837
>
3938
> - [Microsoft Defender for Office 365 Plan 2 support for Microsoft Teams](/defender-office-365/mdo-support-teams-about)
4039
> - [Quickly configure Microsoft Teams protection in Microsoft Defender for Office 365 Plan 2](/defender-office-365/mdo-support-teams-quick-configure)
4140
> - [Security Operations Guide for Teams protection in Microsoft Defender for Office 365](/defender-office-365/mdo-support-teams-sec-ops-guide)
42-
--->
4341
4442
## End-to-end deployment for Microsoft Defender XDR
4543

0 commit comments

Comments
 (0)