Skip to content

Commit db5b550

Browse files
authored
Merge branch 'main' into WI499501-traffic-log-config-note-update
2 parents 2fb2532 + 2dfc46f commit db5b550

File tree

10 files changed

+652
-96
lines changed

10 files changed

+652
-96
lines changed

defender-endpoint/api/post-ti-indicator.md

Lines changed: 14 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,6 @@ appliesto:
2525

2626
[!INCLUDE [Microsoft Defender XDR rebranding](../../includes/microsoft-defender.md)]
2727

28-
29-
30-
31-
3228
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
3329

3430
[!include[Improve request performance](../../includes/improve-request-performance.md)]
@@ -71,20 +67,20 @@ Content-Type|string|application/json. **Required**.
7167

7268
In the request body, supply a JSON object with the following parameters:
7369

74-
Parameter|Type|Description
75-
:---|:---|:---
76-
indicatorValue|String|Identity of the [Indicator](ti-indicator.md) entity. **Required**
77-
indicatorType|Enum|Type of the indicator. Possible values are: `FileSha1`, `FileMd5`, `CertificateThumbprint`, `FileSha256`, `IpAddress`, `DomainName`, and `Url`. **Required**
78-
action|Enum|The action that is taken if the indicator is discovered in the organization. Possible values are: `Alert`, `Warn`, `Block`, `Audit`, `BlockAndRemediate`, `AlertAndBlock`, and `Allowed`. **Required**. The `GenerateAlert` parameter must be set to `TRUE` when creating an action with `Audit`.
79-
application|String|The application associated with the indicator. This field only works for new indicators. It doesn't update the value on an existing indicator. **Optional**
80-
title|String|Indicator alert title. **Required**
81-
description|String|Description of the indicator. **Required**
82-
expirationTime|DateTimeOffset|The expiration time of the indicator. **Optional**
83-
severity|Enum|The severity of the indicator. Possible values are: `Informational`, `Low`, `Medium`, and `High`. **Optional**
84-
recommendedActions|String|TI indicator alert recommended actions. **Optional**
85-
rbacGroupNames|String|Comma-separated list of RBAC group names the indicator would be applied to. **Optional**
86-
educateUrl|String|Custom notification/support URL. Supported for Block and Warn action types for URL indicators. **Optional**
87-
generateAlert|Enum|**True** if alert generation is required, **False** if this indicator shouldn't generate an alert.
70+
|Parameter|Type|Description|
71+
|:---|:---|:---|
72+
|indicatorValue|String|Identity of the [Indicator](ti-indicator.md) entity. **Required**|
73+
|indicatorType|Enum|Type of the indicator. Possible values are: `FileSha1`, `FileMd5`, `CertificateThumbprint`, `FileSha256`, `IpAddress`, `DomainName`, and `Url`. **Required**|
74+
|action|Enum|The action that is taken if the indicator is discovered in the organization. Possible values are: `Alert`, `Warn`, `Block`, `Audit`, `BlockAndRemediate`, `AlertAndBlock`, and `Allowed`. **Required**. The `GenerateAlert` parameter must be set to `TRUE` when creating an action with `Audit`.|
75+
|application|String|A user-friendly name for the content blocked by the indicator. If specified, this text will be shown in the blocking notification in place of the blocked filename or domain. This field only works for new indicators; it doesn't update the value on an existing indicator. **Optional**|
76+
|title|String|Indicator alert title. **Required**|
77+
|description|String|Description of the indicator. **Required**|
78+
|expirationTime|DateTimeOffset|The expiration time of the indicator. **Optional**|
79+
|severity|Enum|The severity of the indicator. Possible values are: `Informational`, `Low`, `Medium`, and `High`. **Optional**|
80+
|recommendedActions|String|TI indicator alert recommended actions. **Optional**|
81+
|rbacGroupNames|String|Comma-separated list of RBAC group names the indicator would be applied to. **Optional**|
82+
|educateUrl|String|Custom notification/support URL. Supported for Block and Warn action types for URL indicators. **Optional**|
83+
|generateAlert|Enum|**True** if alert generation is required, **False** if this indicator shouldn't generate an alert.|
8884
## Response
8985

9086
- If successful, this method returns 200 - OK response code and the created / updated [Indicator](ti-indicator.md) entity in the response body.

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ For rules with the "Rule State" specified:
197197
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands) | | N | Y |
198198
|[Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| | N | N |
199199
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | | Y| Y (in block mode) |
200-
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| | N | N |
200+
|[Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| | N | Y (in block mode) |
201201
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers) | | N | N |
202202
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | | N | Y |
203203
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | | Y | Y (in block mode) |

defender-endpoint/configure-network-connections-microsoft-defender-antivirus.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,6 @@ The following table lists solutions:
109109
|Solution|Description|
110110
|:---|:---|
111111
| Solution (Preferred) | Configure the system-wide WinHttp proxy that allows the CRL check.|
112-
| Solution (Preferred 2) | 1. Go to **Computer Configuration** > **Windows Settings** > **Security Settings** > **Public Key Policies** > **Certificate Path Validation Settings**.<br/>2. Select the **Network Retrieval** tab, and then select **Define these policy settings**.<br/>3. Clear the **Automatically update certificates in the Microsoft Root Certificate Program (recommended)** check box.<br/><br/> Here are some useful resources: <br/> - [Configure Trusted Roots and Disallowed Certificates](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn265983(v=ws.11))<br/>- [Improving application Start up time: GeneratePublisherEvidence setting in Machine.config](/archive/blogs/amolravande/improving-application-start-up-time-generatepublisherevidence-setting-in-machine-config)|
113112
| Work-around solution (Alternative) <br/> *This is not a best practice since you're no longer checking for revoked certificates or certificate pinning.*| Disable CRL check only for SPYNET. <br/> Configuring this registry SSLOption disables CRL check only for SPYNET reporting. It won't impact other services.<br/><br/> Go to **HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet**, and then set `SSLOptions (dword)` to `2` (hex). <br/>For reference, here are possible values for the DWORD: <br/> - `0 – disable pinning and revocation checks` <br/> - `1 – disable pinning` <br/> - `2 – disable revocation checks only` <br/> - `3 – enable revocation checks and pinning (default)` |
114113

115114
## Attempt to download a fake malware file from Microsoft

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 09/18/2025
6+
ms.date: 10/20/2025
77
audience: ITPro
88
ms.topic: reference
9-
author: KesemSharabi
10-
ms.author: kesharab
9+
author: limwainstein
10+
ms.author: lwainstein
1111
ms.subservice: ngp
1212
search.appverid: met150
1313
appliesto:
@@ -74,6 +74,21 @@ Updates contain:
7474
- Serviceability improvements
7575
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
7676

77+
### September-2025 (Platform: 4.18.25090.3009 | Engine: 1.1.25090.3001)
78+
79+
- Security intelligence update version: **1.439.345.0**
80+
- Release date: **September 8, 2025 (Engine) / September 21, 2025 (Platform)**
81+
- Platform: **4.18.25090.3009**
82+
- Engine: **1.1.25090.3001**
83+
- Support phase: **Security and Critical Updates**
84+
85+
#### What's new
86+
87+
- **Improved service startup behavior**: The core service now only restarts when necessary, for example, during a successful platform update. This change allows the organization to avoid unnecessary restarts when the service is already running correctly.
88+
- **Improved stability for RPC services**: Added input validation across multiple RPC endpoints to prevent crashes caused by malformed data, which addresses a reported security vulnerability.
89+
- **Fixed threat exclusion handling**: Resolved an issue where severity-based exclusions could cause the engine to misidentify threats, potentially skipping high severity detections.
90+
- **Restored performance optimization for network file access**: Fixed a regression that caused slowdowns during file operations, like robocopy to network shares. The fix included reintroducing the logic to skip unnecessary checks on non-local files when Controlled Folder Access is enabled.
91+
7792
### August-2025 (Platform: 4.18.25080.5 | Engine: 1.1.25080.5)
7893

7994
- Security intelligence update version: **1.437.1.0**
@@ -98,13 +113,10 @@ Improved Defender update reliability by allowing non-admin processes to trigger
98113

99114
- Enhanced Passive Mode Scanning Behavior
100115
When Microsoft Defender is in Passive mode, an Antivirus scan will not occur after a signature update , unless specifically set in the policy setting DisableScanOnUpdate.
101-
102116
- Improved Tamper Protection Handling
103117
Optimized the configuration process for Tamper Protection in multi-threaded environments to ensure more reliable behavior.
104-
105118
- Digital Signature Verification Performance Boost
106119
Enhanced the efficiency of digital signature verification to improve overall system performance.
107-
108120
- Refined ASR Rule Exclusion Processing
109121
Refined exclusion processing and resolved false positives for the Attack Surface Reduction (ASR) rule: Block Office applications from injecting code into other processes.
110122

defender-endpoint/web-threat-protection.md

Lines changed: 6 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -27,47 +27,29 @@ appliesto:
2727

2828

2929

30-
Web threat protection is part of [Web protection](web-protection-overview.md) in Defender for Endpoint. It uses [network protection](network-protection.md) to secure your devices against web threats. By integrating with Microsoft Edge and popular third-party browsers like Chrome and Firefox, web threat protection stops web threats without a web proxy and can protect devices while they're away or on premises. Web threat protection stops access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, and sites that you are blocked because they're in your [custom indicator list](indicators-overview.md).
30+
Web threat protection is part of [Web protection](web-protection-overview.md) in Defender for Endpoint. It uses [network protection](network-protection.md) to secure your devices against web threats. By integrating with Microsoft Edge and popular third-party browsers like Chrome and Firefox, web threat protection stops web threats without a web proxy and can protect devices while they're away or on premises. Web threat protection stops access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, and sites that you've blocked because they're in your [custom indicator list](indicators-overview.md).
3131

3232
> [!NOTE]
3333
> It might take up to two hours for devices to receive new custom indicators.
3434
3535
## Prerequisites
3636

37-
Web protection uses network protection to provide web browsing security on Microsoft Edge and non-Microsoft web browsers.
37+
Web threat protection uses network protection to provide web browsing security in Edge (excepting Windows devices), non-Microsoft web browsers and nonbrowser processes. On Windows devices, web threat protection in Edge uses Microsoft Defender SmartScreen and network protection isn't required to be enabled.
38+
39+
To turn on Microsoft Defender SmartScreen in Edge: [Configure Microsoft Defender SmartScreen](/deployedge/microsoft-edge-policies#smartscreenenabled).
3840

3941
To turn on network protection on your devices:
4042

4143
- Edit the Defender for Endpoint security baseline under **Web & Network Protection** to enable network protection before deploying or redeploying it. [Learn about reviewing and assigning the Defender for Endpoint security baseline](configure-machines-security-baseline.md#review-and-assign-the-microsoft-defender-for-endpoint-security-baseline)
4244
- Turn network protection on using Intune device configuration, SCCM, Group Policy, or your MDM solution. [Read more about enabling network protection](enable-network-protection.md)
4345

4446
> [!NOTE]
45-
> If you set network protection to **Audit only**, blocking will be unavailable. Also, you will be able to detect and log attempts to access malicious and unwanted websites on Microsoft Edge only.
47+
> If you set network protection to **Audit only**, blocking is unavailable. Also, you are able to detect and log attempts to access malicious and unwanted websites on Microsoft Edge only.
4648
4749
## Configure web threat protection
4850

49-
The following procedure describes how to configure web threat protection using the Microsoft Intune admin center.
50-
51-
1. Go to the Microsoft Intune admin center ([https://intune.microsoft.com](https://intune.microsoft.com)), and sign in.
52-
53-
2. Choose **Endpoint security** \> **Attack surface reduction**, and then choose **+ Create policy**.
54-
55-
3. Select a platform, such as **Windows 10 and later**, select the **Web protection** profile, and then choose **Create**.
56-
57-
4. On the **Basics** tab, specify a name and description, and then choose **Next**.
58-
59-
5. On the **Configuration settings** tab, expand **Web Protection**, specify your settings, and then choose **Next**.
60-
61-
- Set **Enable network protection** to **Enabled** so web protection is turned on. Alternately, you can set network protection to **Audit mode** to see how it works in your environment. In audit mode, network protection doesn't prevent users from visiting sites or domains, but it does track detections as events.
62-
- To protect users from potential phishing scams and malicious software, turn **Require SmartScreen for Microsoft Edge Legacy** to **Yes**.
63-
- To prevent users from bypassing warnings about potentially malicious sites, set **Block malicious site access** to **Yes**.
64-
- To prevent users from bypassing the warnings and downloading unverified files, set **Block unverified file download** to **Yes**.
65-
66-
6. On the **Scope tags** tab, if your organization is using scope tags, choose **+ Select scope tags**, and then choose **Next**. (If you aren't using scope tags, choose **Next**.) To learn more about scope tags, see [Use role-based access control (RBAC) and scope tags for distributed IT](/mem/intune/fundamentals/scope-tags).
67-
68-
7. On the **Assignments** tab, specify the users and devices to receive the web protection policy, and then choose **Next**.
51+
The legacy **Web protection** policy in Intune has been deprecated and web threat protection will be enabled if the prerequisites are met.
6952

70-
8. On the **Review + create** tab, review your policy settings, and then choose **Create**.
7153

7254
## Related articles
7355

defender-for-cloud-apps/discovery-linux-podman.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Before you start:
4141
1. Copy the command displayed and modify it as needed based on the container service you're using. For example:
4242

4343
```bash
44-
(echo <key>) | podman run --privileged --name PodmanRun -p 601:601/tcp -p 21:21 -p 20000-20099:20000-20099 -e "PUBLICIP='10.0.2.15'" -e "PROXY=" -e "SYSLOG=true" -e "CONSOLE= <tenant>.us3.portal.cloudappsecurity.com" -e "COLLECTOR=PodmanTest" --security-opt apparmor:unconfined --cap-add=SYS_ADMIN --restart unless-stopped -a stdin -i mcr.microsoft.com/mcas/logcollector starter
44+
(echo <key>) | podman run --privileged --name PodmanTest -p 601:601/tcp -p 21:21 -p 20000-20099:20000-20099 -e "PUBLICIP='10.0.2.15'" -e "PROXY=" -e "SYSLOG=true" -e "CONSOLE= <tenant>.us3.portal.cloudappsecurity.com" -e "COLLECTOR=PodmanTest" --security-opt apparmor:unconfined --cap-add=SYS_ADMIN --restart unless-stopped -a stdin -i mcr.microsoft.com/mcas/logcollector starter
4545
```
4646

4747
1. Run the modified command on your machine to deploy the container. When successful, the logs show pulling an image from mcr.microsoft.com and continuing to create blobs for the container.

defender-for-cloud-apps/protect-atlassian.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
8585

8686
![Sign in to the Atlassian Admin portal.](media/atlassian-sign-in.png)
8787

88-
1. Go to **Settings -> API keys** and then **Create API key**. (Atlassian documentation for creating API keys can also be found [here](https://support.atlassian.com/organization-administration/docs/manage-an-organization-with-the-admin-apis/)).
88+
1. Go to **Settings -> API keys** and then **Create API key** without scopes. (Atlassian documentation for creating API keys can also be found [here](https://support.atlassian.com/organization-administration/docs/manage-an-organization-with-the-admin-apis/)).
8989

9090
![Atlassian API keys.](media/atlassian-api-keys.png)
9191

0 commit comments

Comments
 (0)