Skip to content

Commit de862be

Browse files
committed
Merge branch 'docs-editor/validate-antimalware-1744984849' of https://github.com/joshgingras/defender-docs-pr into pr/joshgingras/3517
2 parents 503540e + f1f4b0f commit de862be

22 files changed

+84
-108
lines changed

defender-endpoint/linux-whatsnew.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: List of major changes for Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
55
ms.author: ewalsh
66
author: emmwalshh
7-
ms.reviewer: kumasumit, gopkr
7+
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 04/08/2025
9+
ms.date: 04/18/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,9 +43,9 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46-
### April-2025 Build: 101.25022.0001 | Release version: 30.125022.0001.0
46+
### April-2025 Build: 101.25022.0002 | Release version: 30.125022.0001.0
4747

48-
|Build: |**101.25022.0001** |
48+
|Build: |**101.25022.0002** |
4949
|-------------------|----------------------|
5050
|Released: |**April 07, 2025** |
5151
|Published: |**April 07, 2025** |

defender-endpoint/validate-antimalware.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: AV detection test for verifying device's onboarding and reporting services
2+
title: Antivirus detection test for verifying device's onboarding and reporting services
33
description: AV detection test to verify the device's proper onboarding and reporting to the service.
44
ms.service: defender-endpoint
55
ms.subservice: reference
@@ -15,10 +15,10 @@ ms.collection:
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 03/04/2025
18+
ms.date: 04/18/2025
1919
---
2020

21-
# AV detection test for verifying device's onboarding and reporting services
21+
# Antivirus detection test for verifying device's onboarding and reporting services
2222

2323
**Applies to:**
2424

@@ -34,10 +34,8 @@ Scenario requirements and setup
3434
- Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2
3535

3636
- Linux
37-
3837
- macOS
39-
40-
- Microsoft Defender real-time protection is enabled
38+
- [Real-time protection](/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus) is enabled
4139

4240
## EICAR test file to simulate malware
4341

defender-xdr/alert-classification-malicious-exchange-connectors.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Alert classification for malicious exchange connectors
3-
description: Alert grading recipients from malicious exchange connectors activity and protect their network from malicious attack.
2+
title: Alert classification for malicious Exchange connectors
3+
description: Learn how to classify alerts on malicious Exchange connectors activity and protect your network from attacks.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -17,7 +17,7 @@ ms.topic: how-to
1717
search.appverid:
1818
- MOE150
1919
- MET150
20-
ms.date: 03/11/2024
20+
ms.date: 04/18/2025
2121
appliesto:
2222
- Microsoft Defender XDR
2323
#customer intent: As a SOC analyst, I want to know how to investigate and classify alerts for malicious Exchange connectors so that I can take the necessary actions to remediate the attack and protect my network.
@@ -27,7 +27,7 @@ appliesto:
2727

2828
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2929

30-
Threat actors use compromised exchange connectors for sending out spam and phishing emails in bulk to unsuspecting recipients by masquerading legitimate emails. Since the connector is compromised, the emails would usually be trusted by the recipients. These kinds of phishing emails are common vectors for phishing campaigns, and business email compromise (BEC) scenario. Hence, such emails need to be monitored heavily due to the likelihood of successful recipients' compromises being high.
30+
Threat actors use compromised Microsoft Exchange connectors for sending out spam and phishing emails in bulk to unsuspecting recipients by masquerading legitimate emails. Since the connector is compromised, the emails would usually be trusted by the recipients. These kinds of phishing emails are common vectors for phishing campaigns, and business email compromise (BEC) scenario. Hence, such emails need to be monitored heavily due to the likelihood of successful recipients' compromises being high.
3131

3232
This playbook helps in investigating instances where malicious connectors are setup/deployed by malicious actors. Accordingly, they take necessary steps to remediate the attack and mitigate the security risks arising from it. The playbook helps in classifying the alerts as either true positive (TP) or false positive (FP). If alerts are TP, the playbook lists necessary recommended actions for remediating the attack. This playbook is available for security teams who review, handle/manage, and grade the alerts.
3333

@@ -44,15 +44,15 @@ Connectors are used to route mail traffic between remote email systems and Offic
4444

4545
### Malicious Exchange connectors
4646

47-
Attackers may compromise an existing exchange connector or compromise an admin, and set up a new connector by sending phish or spam/bulk emails.
47+
Attackers may compromise an existing Exchange connector or compromise an admin, and set up a new connector by sending phish or spam/bulk emails.
4848

4949
The typical indicators of a malicious connector can be found when looking at email traffic and its headers. For example, when email traffic is observed from a connector node with a mismatch in P1 (header sender) and P2 (envelope sender) sender addresses along with no information on Sender's AccountObjectId.
5050

5151
This alert tries to identify such instances of mail flow, wherein the mail sending activity seems suspicious adding to that relevant information on sender is unavailable.
5252

5353
## Playbook workflow
5454

55-
You must follow the sequence to identify malicious exchange connectors:
55+
You must follow the sequence to identify malicious Exchange connectors:
5656

5757
- Identify which accounts are sending emails:
5858
- Do accounts appear to be compromised?
@@ -69,7 +69,7 @@ You must follow the sequence to identify malicious exchange connectors:
6969
This section describes the steps to investigate an alert and remediate the security risk due to this incident.
7070

7171
- Determine whether the connector demonstrates bad (malicious) behavior.
72-
- Look for events indicating unusual mail traffic and identify, whether any new exchange connector was added recently.
72+
- Look for events indicating unusual mail traffic and identify, whether any new and recently added Exchange connector.
7373
- For mail traffic observed, determine if the email accounts are compromised by inspecting whether the accounts are responsible for unusual mail traffic.
7474
- Look for mail content containing malicious artifacts (bad links/attachments).
7575
- Look for domains that are not part of your environment.

defender-xdr/alert-classification-password-spray-attack.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
1717
search.appverid:
1818
- MOE150
1919
- met150
20-
ms.date: 02/11/2024
20+
ms.date: 04/18/2025
2121
appliesto:
2222
- Microsoft Defender XDR
2323
#customer intent: As a SOC analyst, I want to know how to investigate and classify alerts for password spray attacks so that I can take the necessary actions to remediate the attack and protect my network.

defender-xdr/alert-classification-playbooks.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- autoir
1919
- admindeeplinkDEFENDER
2020
ms.reviewer: evaldm, isco
21-
ms.date: 02/11/2024
21+
ms.date: 04/18/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
#customer intent: As a SOC analyst, I want to know how to review and classify alerts by using alert classification playbooks so that I can take the necessary actions to remediate the attack and protect my network.
@@ -89,6 +89,7 @@ See these playbooks for steps to more quickly classify alerts for the following
8989
- [Suspicious inbox forwarding rules](alert-grading-playbook-inbox-forwarding-rules.md)
9090
- [Suspicious IP addresses related to password spray activity](alert-classification-suspicious-ip-password-spray.md)
9191
- [Password spray attacks](alert-classification-password-spray-attack.md)
92+
- [Malicious Exchange connectors](alert-classification-malicious-exchange-connectors.md)
9293

9394
See [Investigate alerts](investigate-alerts.md) for information on how to examine alerts with the Microsoft Defender portal.
9495
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

defender-xdr/alert-classification-suspicious-ip-password-spray.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Alert classification for suspicious IP address related to password spraying activity
3-
description: Alert classification for suspicious IP address related to password spraying activity to review the alerts and take recommended actions to remediate the attack and protect your network.
3+
description: Investigate and review alerts related to suspicious IP address related to password spraying activity and take recommended actions to protect your network.
44
ms.service: defender-xdr
55
f1.keywords:
66
- NOCSH
@@ -17,7 +17,7 @@ ms.topic: how-to
1717
search.appverid:
1818
- MOE150
1919
- met150
20-
ms.date: 02/11/2024
20+
ms.date: 04/18/2025
2121
appliesto:
2222
- Microsoft Defender XDR
2323
#customer intent: As a SOC analyst, I want to know how to investigate and classify alerts for suspicious IP addresses related to password spray attacks that I can take the necessary actions to remediate the attack and protect my network.

defender-xdr/alert-grading-playbook-email-forwarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
1717
search.appverid:
1818
- MOE150
1919
- met150
20-
ms.date: 04/03/2024
20+
ms.date: 04/18/2025
2121
appliesto:
2222
- Microsoft Defender XDR
2323
#customer intent: As a SOC analyst, I want to know how to review and classify alerts about suspicious email forwarding activity so that I can take the necessary actions to remediate the attack and protect my network.

defender-xdr/alert-grading-playbook-inbox-forwarding-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
1717
search.appverid:
1818
- MOE150
1919
- met150
20-
ms.date: 07/26/2024
20+
ms.date: 04/18/2025
2121
appliesto:
2222
- Microsoft Defender XDR
2323
#customer intent: As a SOC analyst, I want to know how to review and classify suspicious inbox forwarding rules alerts so that I can take the necessary actions to remediate the attack and protect my network.

defender-xdr/alert-grading-playbook-inbox-manipulation-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.topic: how-to
1717
search.appverid:
1818
- MOE150
1919
- met150
20-
ms.date: 04/05/2023
20+
ms.date: 04/18/2025
2121
appliesto:
2222
- Microsoft Defender XDR
2323
#customer intent: As a SOC analyst, I want to know how to review and classify suspicious inbox manipulation rules alerts so that I can take the necessary actions to remediate the attack and protect my network.

defender-xdr/api-access.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,17 +18,15 @@ search.appverid:
1818
- MOE150
1919
- MET150
2020
ms.custom: api
21-
ms.date: 02/08/2024
21+
ms.date: 04/15/2025
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Access the Microsoft Defender XDR APIs
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
30-
- Microsoft Defender XDR
31-
3230
> [!NOTE]
3331
> **Try our new APIs using MS Graph security API**. Find out more at: [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview).
3432

0 commit comments

Comments
 (0)