Skip to content

Commit d851327

Browse files
Merge pull request #5342 from MicrosoftDocs/main
[AutoPublish] main to live - 10/22 13:31 PDT | 10/23 02:01 IST
2 parents dd054e0 + 9c485bc commit d851327

File tree

3 files changed

+11
-5
lines changed

3 files changed

+11
-5
lines changed

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,8 @@ Updates contain:
7777
### September-2025 (Platform: 4.18.25090.3009 | Engine: 1.1.25090.3001)
7878

7979
- Security intelligence update version: **1.439.345.0**
80-
- Release date: **September 8, 2025 (Engine) / September 21, 2025 (Platform)**
80+
- Release date: **October 8, 2025 (Engine) / October 21, 2025 (Platform)**
81+
8182
- Platform: **4.18.25090.3009**
8283
- Engine: **1.1.25090.3001**
8384
- Support phase: **Security and Critical Updates**

defender-office-365/email-authentication-dkim-configure.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
author: chrisda
66
ms.author: chrisda
77
manager: bagol
8-
ms.date: 10/06/2025
8+
ms.date: 10/22/2025
99
audience: ITPro
1010
ms.topic: how-to
1111

@@ -503,6 +503,11 @@ If you'd rather use PowerShell to rotate DKIM keys for a domain, connect to [Exc
503503

504504
To confirm the corresponding public key that's used to verify the DKIM signature (which infers the private key that was used to sign the message), check the **s=** value in the **DKIM-Signature** header field (the selector; for example, `s=selector1-contoso-com`).
505505

506+
> [!IMPORTANT]
507+
> If you change the bit depth of DKIM keys from 1024 to 2048 using the _KeySize_ parameter, the update applies only to the next active selector during the first key rotation. When you rotate keys again, the previously inactive selector becomes active, and the bit depth is also updated to 2048.
508+
>
509+
> When you rotate DKIM keys on a domain, the change isn't immediate. It takes four days (96 hours). While the key rotation is in progress, you can't do another key rotation.
510+
506511
For detailed syntax and parameter information, see the following articles:
507512

508513
- [Get-DkimSigningConfig](/powershell/module/exchangepowershell/get-dkimsigningconfig)

defender-office-365/quarantine-faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
author: chrisda
77
ms.author: chrisda
88
manager: bagol
9-
ms.date: 05/21/2025
9+
ms.date: 10/22/2025
1010
audience: ITPro
1111
ms.topic: faq
1212
ms.localizationpriority: medium
@@ -176,9 +176,9 @@ sections:
176176
- question: |
177177
Are wildcards supported when searching for quarantined messages? Can I search for quarantined messages for a specific domain?
178178
answer: |
179-
Wildcards aren't supported in the Microsoft Defender portal. For example, when searching for a sender, you need to specify the full email address. But, you can use wildcards in Exchange Online PowerShell PowerShell.
179+
Wildcards are supported in both the Microsoft Defender portal and Exchange Online PowerShell. For example, you can use `*@contoso.com` as a sender address or recipient address filter to search for quarantined messages.
180180
181-
For example, copy the following PowerShell code into NotePad and save the file as .ps1 in a location that's easy for you to find (for example, C:\Data\QuarantineRelease.ps1).
181+
For bulk search and release, copy the following PowerShell code into NotePad and save the file as .ps1 in a location that's easy for you to find (for example, C:\Data\QuarantineRelease.ps1).
182182
183183
Then, after you connect to [Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell), run the following command to run the script:
184184

0 commit comments

Comments
 (0)