Skip to content

Commit da3273c

Browse files
authored
Merge branch 'main' into 440863-file-policy-decryption-mda
2 parents 8cf4798 + 6ae5d91 commit da3273c

33 files changed

+260
-60
lines changed

ATPDocs/deploy/configure-windows-event-collection.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -235,15 +235,16 @@ To configure domain object auditing:
235235

236236
Now, all relevant changes to directory services appear as 4662 events when they're triggered.
237237

238-
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types:
238+
1. Repeat the steps in this procedure, but for **Applies to**, select the following object types <sup>1</sup>
239239
- **Descendant Group Objects**
240240
- **Descendant Computer Objects**
241241
- **Descendant msDS-GroupManagedServiceAccount Objects**
242242
- **Descendant msDS-ManagedServiceAccount Objects**
243-
- **Descendant msDS-DelegatedManagedServiceAccount Objects**
243+
- **Descendant msDS-DelegatedManagedServiceAccount Objects** <sup>2</sup>
244244

245245
> [!NOTE]
246-
> Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
246+
> 1. Assigning the auditing permissions on **All descendant objects** would also work, but you need only the object types detailed in the last step.
247+
> 2. The **msDS-DelegatedManagedServiceAccount** class is relevant only for domains running at least one Windows Server 2025 domain controller.
247248
248249
## Configure auditing on AD FS
249250

ATPDocs/identity-inventory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ Sort option applies to Display name, Domain, and Created time columns.
110110

111111
- **Critical Active Directory service accounts** card helps you quickly identify all Active Directory accounts designated as critical, making it easier to focus on identities most at risk.
112112

113-
At the top of each device inventory tab, the following device counts are available:
113+
At the top of the page, the following identities counts are available:
114114

115115
- __Total__: The total number of identities.
116116

@@ -120,7 +120,7 @@ At the top of each device inventory tab, the following device counts are availab
120120

121121
- **Services:** The number of all service accounts both on-premises and cloud.
122122

123-
You can use this information to help you prioritize devices for security posture improvements.
123+
You can use this information to help you prioritize identities for security posture improvements.
124124

125125
### Navigate to the Identity inventory page
126126

ATPDocs/ops-guide/ops-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article summarizes the Microsoft Defender for Identity activities we recomm
1313

1414
|Cadence |Tasks |
1515
|---------|---------|
16-
|**Daily** | - [Triage incidents by priority](ops-guide-daily.md#triage-incidents-by-priority) <br> - [Investigate users with a high investigation score](ops-guide-daily.md#investigate-users-with-a-high-investigation-score) <br>- [Configure tuning rules for benign true positives / false positive alerts](ops-guide-daily.md#configure-tuning-rules-for-benign-true-positives--false-positive-alerts)<br> - [Review the ITDR dashboard](ops-guide-daily.md#review-the-itdr-dashboard) <br>- [Proactively hunt](ops-guide-daily.md#proactively-hunt) <br> - [Review Defender for Identity health issues](ops-guide-daily.md#review-defender-for-identity-health-issues) |
16+
|**Daily** | - [Triage incidents by priority](ops-guide-daily.md#triage-incidents-by-priority) <br>- [Configure tuning rules for benign true positives / false positive alerts](ops-guide-daily.md#configure-tuning-rules-for-benign-true-positives--false-positive-alerts)<br> - [Review the ITDR dashboard](ops-guide-daily.md#review-the-itdr-dashboard) <br>- [Proactively hunt](ops-guide-daily.md#proactively-hunt) <br> - [Review Defender for Identity health issues](ops-guide-daily.md#review-defender-for-identity-health-issues) |
1717
|**Weekly** |- [Review Secure score recommendations](ops-guide-weekly.md#review-secure-score-recommendations) <br> - [Review and respond to emerging threats](ops-guide-weekly.md#review-and-respond-to-emerging-threats) <br>- [Proactively hunt](ops-guide-weekly.md#proactively-hunt) |
1818
|**Monthly** | - [Review tuned alerts and adjust tuning if needed](ops-guide-monthly.md#review-tuned-alerts-and-adjust-tuning-if-needed) <br> - [Track new changes in Microsoft Defender XDR and Defender for Identity](ops-guide-monthly.md#track-new-changes-in-microsoft-defender-xdr-and-defender-for-identity) |
1919
| **Quarterly / Ad hoc** <br>Depending on your organization's needs and processes | - [Review Microsoft service health](ops-guide-quarterly.md#review-microsoft-service-health) <br> - [Review server setup process to include sensors](ops-guide-quarterly.md#review-server-setup-process-to-include-sensors) <br>- [Check domain configuration via PowerShell](ops-guide-quarterly.md#check-domain-configuration-via-powershell) |

CloudAppSecurityDocs/governance-actions.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,7 @@ The following governance actions can be taken for connected apps either on a spe
8383

8484
- **Trash** – Move the file to the trash folder. (Box, Dropbox, Google Drive, OneDrive, SharePoint)
8585

86-
> [!NOTE]
87-
> These actions are restricted to users with specific administrative roles. If the options described are not visible or accessible, please confirm with your system administrator that your account has one of the following roles assigned:
86+
These actions are restricted to users with specific administrative roles. If the options described are not visible or accessible, please confirm with your system administrator that your account has one of the following roles assigned:
8887
- Security Operator
8988
- Security administrator
9089
- Global administrator

defender-endpoint/isolation-exclusions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: how-to
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 06/22/2025
17+
ms.date: 07/01/2025
1818
---
1919

2020
# Isolation exclusions (preview)
@@ -57,7 +57,7 @@ There are two steps to using isolation exclusion: defining isolation exclusion r
5757

5858
### Prerequisites
5959

60-
* Isolation exclusion is available on Windows (minimum client version 10.8470) and macOS (minimum client version 101.240902).
60+
* Isolation exclusion is available on Windows 11, Windows 10 version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and macOS.
6161
* Isolation exclusion must be enabled. Enabling isolation exclusion requires Security Admin or Manage Security settings permissions or above. To enable isolation exclusion, sign in to the [Microsoft Defender portal](https://security.microsoft.com) and go to **Settings** > **Endpoints** > **Advanced features** and enable **Isolation Exclusion Rules** feature.
6262

6363
:::image type="content" source="./media/isolation-exclusions/enable-exclusions.png" alt-text="Screenshot showing how to enable isolation exclusions." lightbox="./media/isolation-exclusions/enable-exclusions.png":::

defender-endpoint/linux-whatsnew.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 06/06/2025
9+
ms.date: 06/30/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,19 +43,20 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46-
### June-2025 Build: 101.25042.0002 | Release version: 30.125042.0002.0
46+
### June-2025 Build: 101.25042.0003 | Release version: 30.125042.0003.0
4747

48-
|Build: |**101.25042.0002** |
48+
|Build: |**101.25042.0003** |
4949
|-------------------|----------------------|
50-
|Released: |**June 4, 2025** |
51-
|Published: |**June 4, 2025** |
52-
|Release version: |**30.125042.0002.0** |
50+
|Released: |**June 30, 2025** |
51+
|Published: |**June 30, 2025** |
52+
|Release version: |**30.125042.0003.0** |
5353
|Engine version: |**1.1.25020.4000** |
5454
|Signature version: |**1.427.370.0** |
5555

5656
What's new
57-
58-
- Removed external dependency of uuid-runtime from MDE package
57+
- The Defender for Endpoint package rollout into production happens gradually. From the time the release notes are published, it might take up to a week for the package to be pushed to all production machines.
58+
- Removed external dependency of uuid-runtime from the Defender for Endpoint package
59+
- Other stability improvements and bug fixes
5960

6061
### May-2025 Build: 101.25032.0010 | Release version: 30.125032.0010.0
6162

defender-endpoint/mac-preferences.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: how-to
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 05/21/2025
18+
ms.date: 07/01/2025
1919
---
2020

2121
# Set preferences for Microsoft Defender for Endpoint on macOS
@@ -995,6 +995,8 @@ The following templates contain entries for all settings described in this docum
995995
<dict>
996996
<key>enforcementLevel</key>
997997
<string>real_time</string>
998+
<key>behaviorMonitoring</key>
999+
<string>enabled</string>
9981000
<key>scanAfterDefinitionUpdate</key>
9991001
<true/>
10001002
<key>scanArchives</key>

defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Each source has typical scenarios that depend on how your network is configured,
8181
|---|---|
8282
|Windows Server Update Service|You're using Windows Server Update Service to manage updates for your network.|
8383
|Microsoft Update|You want your endpoints to connect directly to Microsoft Update. This option is useful for endpoints that irregularly connect to your enterprise network, or if you don't use Windows Server Update Service to manage your updates.|
84-
|File share|You have devices that aren't connected to the Internet (such as virtual machines, or VMs). You can use your Internet-connected VM host to download the updates to a network share, from which the VMs can obtain the updates. See the [VDI deployment guide](deployment-vdi-microsoft-defender-antivirus.md) for how file shares are used in virtual desktop infrastructure (VDI) environments.|
84+
|UNC Share|You have devices that aren't connected to the Internet (such as virtual machines, or VMs). You can use your Internet-connected VM host to download the updates to a network share, from which the VMs can obtain the updates. See the [VDI deployment guide](deployment-vdi-microsoft-defender-antivirus.md) for how file shares are used in virtual desktop infrastructure (VDI) environments. Platform updates can also be deployed using this method. |
8585
|Microsoft Endpoint Configuration Manager|You're using Microsoft Endpoint Configuration Manager to update your endpoints.|
8686
|Security intelligence updates and platform updates for Microsoft Defender Antivirus and other Microsoft anti-malware (formerly referred to as MMPC)|[Make sure devices are updated to support SHA-2](https://support.microsoft.com/help/4472027/2019-sha-2-code-signing-support-requirement-for-windows-and-wsus). Microsoft Defender Antivirus Security intelligence and platform updates are delivered through Windows Update. As of October 21, 2019, security intelligence updates and platform updates are SHA-2 signed exclusively. <br/>Download the latest protection updates because of a recent infection or to help provision a strong, base image for [VDI deployment](deployment-vdi-microsoft-defender-antivirus.md). This option should be used only as a final fallback source, and not the primary source. It's only to be used if updates can't be downloaded from Windows Server Update Service or Microsoft Update for [a specified number of days](manage-outdated-endpoints-microsoft-defender-antivirus.md#set-the-number-of-days-before-protection-is-reported-as-out-of-date).|
8787

@@ -274,6 +274,32 @@ On a Windows File Server set up a network file share (UNC/mapped drive) to downl
274274
> [!NOTE]
275275
> Do not add the x64 (or x86) folder in the path. The `mpcmdrun.exe` process adds it automatically.
276276
277+
## Enable platform updates using UNC share
278+
279+
To enable platform updates using UNC share, download KB4052623 and copy it into the architecture folders as `updateplatform.exe`. These files are updated monthly and need to get manually updated by you.
280+
281+
KB4052623 is available for the following architectures:
282+
283+
* [x86](https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&arch=x86)
284+
285+
* [amd64](https://go.microsoft.com/fwlink/?LinkID=870379&clcid=0x409&arch=x64)
286+
287+
* [arm64](https://go.microsoft.com/fwlink/?LinkID=851034&clcid=0x409&arch=arm64)
288+
289+
**Example structure**
290+
291+
```dos
292+
[UNC Share]\
293+
x86\
294+
mpam-fe.exe
295+
mpam-d.exe
296+
updateplatform.exe
297+
x64\
298+
mpam-fe.exe
299+
mpam-d.exe
300+
updateplatform.exe
301+
```
302+
277303
## Related articles
278304

279305
- [Deploy Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)

defender-endpoint/mde-linux-prerequisites.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 04/08/2025
18+
ms.date: 06/30/2025
1919
---
2020

2121
# Prerequisites for Microsoft Defender for Endpoint on Linux
@@ -117,8 +117,7 @@ The following Linux server distributions and x64 (AMD64/EM64T) versions are supp
117117
> The workstation and desktop versions of these distributions are unsupported
118118
> Distributions and versions that aren't explicitly listed are unsupported (even if they're derived from the officially supported distributions).
119119
> After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that which are listed in this section are provided for technical upgrade support only.
120-
> Currently, Rocky and Alma distributions aren't supported in Microsoft Defender Vulnerability Management. However, Microsoft Defender for Endpoint is kernel-version agnostic for all other supported distributions and versions.
121-
> The minimal requirement for the kernel version is `3.10.0-327` or later.
120+
> Microsoft Defender for Endpoint is kernel-version agnostic for all other supported distributions and versions. The minimal requirement for the kernel version is `3.10.0-327` or later.
122121
123122
> [!WARNING]
124123
> Running Defender for Endpoint on Linux with other fanotify-based security solutions isn't supported. It can lead to unpredictable results, including hanging the operating system.
@@ -186,12 +185,14 @@ If the Microsoft Defender for Endpoint installation fails due to missing depende
186185
> - The mdatp RPM package requires `audit`, `semanage`.
187186
> - For DEBIAN, the mdatp package requires `auditd`.
188187
> - For Mariner, the mdatp package requires `audit`.
189-
> For version older than `101.25032.0000`:
190-
> - RPM package needs: `mde-netfilter`, `pcre`
191-
> - DEBIAN package needs: `mde-netfilter`, `libpcre3`
192-
> - The `mde-netfilter` package also has the following package dependencies:
193-
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
194-
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
188+
>
189+
> For versions older than `101.25032.0000`, the following requirements apply:
190+
> - RPM package needs: `mde-netfilter` and `pcre`
191+
> - DEBIAN package needs: `mde-netfilter` and `libpcre3`
192+
>
193+
> The `mde-netfilter` package also has the following package dependencies:
194+
> - For DEBIAN, the `mde-netfilter` package requires `libnetfilter-queue1` and `libglib2.0-0`
195+
> - For RPM, the `mde-netfilter` package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
195196
196197
## Installation instructions
197198

@@ -226,5 +227,5 @@ If you experience any installation issues, self-troubleshooting resources are av
226227
- [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md)
227228
- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md)
228229

229-
> [!TIP]
230-
> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/category/microsoft-defender-for-endpoint/discussions/microsoftdefenderatp)
230+
> [!TIP]
231+
> Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: [Microsoft Defender for Endpoint Tech Community](https://techcommunity.microsoft.com/category/microsoft-defender-for-endpoint/discussions/microsoftdefenderatp)

defender-endpoint/mde-plugin-wsl.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,16 +15,15 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 11/11/2024
18+
ms.date: 07/01/2025
1919
search.appverid: MET150
2020
---
2121

2222
# Microsoft Defender for Endpoint plug-in for Windows Subsystem for Linux (WSL)
2323

2424
**Applies to:**
2525

26-
- Microsoft Defender for Endpoint for servers
27-
- Microsoft Defender for Servers Plan 1 or Plan 2
26+
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2827

2928
## Overview
3029

@@ -134,7 +133,7 @@ If your host machine contains multiple proxy settings, the plug-in selects the p
134133

135134
3. Network & Internet proxy settings.
136135

137-
For example, if your host machine has both `Winhttp proxy` and `Network & Internet proxy`, the plug-in selects `Winhttp proxy` as the proxy configuration.
136+
For example, if your host machine has both `Winhttp proxy` and `Network & Internet proxy`, the plug-in selects `Winhttp proxy` as the proxy configuration.
138137

139138
> [!NOTE]
140139
> The `DefenderProxyServer` registry key is no longer supported. Follow the steps described earlier in this article to configure proxy in plug-in.
@@ -294,7 +293,7 @@ Check the following things:
294293
- If your machine has a proxy setup, run the command `healthCheck --extendedProxy`. This will provide information on which proxy(s) is set on your machine and whether these configurations are invalid for WSL defender.
295294

296295
![Extend HealthCheck Proxy doc](media/mde-plugin-wsl/extend-healthcheck-proxy-doc.png)
297-
296+
298297
- If the steps mentioned above do not fix the problem, include the following configuration settings in the `.wslconfig` located in your `%UserProfile%` and restart WSL. Details about settings can be found in [WSL Settings](/windows/wsl/wsl-config#main-wsl-settings).
299298

300299
**In Windows 11**

0 commit comments

Comments
 (0)