Skip to content

Commit e34a939

Browse files
committed
Merge branch 'patch-1' of https://github.com/v-rakegurram-MSFT/defender-docs-pr into pr/5085
2 parents 31ccacf + 29bd007 commit e34a939

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+477
-190
lines changed

defender-endpoint/indicators-overview.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -159,10 +159,9 @@ The IoC API schema and the threat IDs in Advanced Hunting are updated to align w
159159

160160
Microsoft Store apps cannot be blocked by Microsoft Defender because they're signed by Microsoft.
161161

162-
Customers might experience issues with alerts for IoCs. The following scenarios are situations where alerts aren't created or are created with inaccurate information. Each issue is investigated by our engineering team.
162+
Customers might experience issues with alerts for IoCs. The following scenarios are situations where alerts aren't created or are created with inaccurate information.
163163

164-
- **Block indicators**: Generic alerts with informational severity only are created. Custom alerts (that is, custom title and severity) aren't fired in these cases.
165-
- **Warn indicators**: Generic alerts and custom alerts are possible in this scenario; however, the results aren't deterministic due to an issue with the alert detection logic. In some cases, customers might see a generic alert, whereas a custom alert might show in other cases.
164+
- **Block and Warn indicators**: Generic alerts with informational severity only are created. Custom alerts (that is, custom title and severity) aren't fired in these cases.
166165
- **Allow**: No alerts are generated (by design).
167166
- **Audit**: Alerts are generated based on the severity provided by the customer (by design).
168167
- In some cases, alerts coming from EDR detections might take precedence over alerts stemming from antivirus blocks, in which case an information alert is generated.

defender-endpoint/linux-preferences.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -446,17 +446,18 @@ Configure filesystems to be unmonitored/excluded from real-time protection (RTP)
446446
> [!NOTE]
447447
> Configured filesystem is unmonitored only if it's present in Microsoft's list of permitted unmonitored filesystems.
448448
449-
By default, NFS and Fuse are unmonitored from RTP, Quick, and Full scans. However, they can still be scanned by a custom scan. For example, to remove NFS from the list of unmonitored filesystems list, update the managed config file as shown below. This will automatically add NFS to the list of monitored filesystems for RTP.
449+
By default, `cifs`, `fuse`, `nfs`, `nfs4` and `smb` are unmonitored from RTP, Quick, and Full scans. However, they can still be scanned by a custom scan. For example, to remove `nfs` and `nfs4` from the list of unmonitored filesystems list, update the managed config file as shown below. This will add `nfs`/`nfs4` to the list of monitored filesystems for RTP.
450+
Currently monitoring `nfs4`, `cifs` and `smb` filesystems is in preview mode for RTP mode.
450451

451452
```JSON
452453
{
453454
"antivirusEngine":{
454-
"unmonitoredFilesystems": ["Fuse"]
455+
"unmonitoredFilesystems": ["cifs","fuse","smb"]
455456
}
456457
}
457458
```
458459

459-
To remove both NFS and Fuse from unmonitored list of filesystems, use the following snippet:
460+
To remove all entries from unmonitored list of filesystems, use the following snippet:
460461

461462
```JSON
462463
{
@@ -1126,4 +1127,4 @@ To verify that your `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json` is wor
11261127

11271128
Once you've built the configuration profile for your enterprise, you can deploy it through the management tool that your enterprise is using. Defender for Endpoint on Linux reads the managed configuration from `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json`.
11281129

1129-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
1130+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/linux-whatsnew.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,24 @@ This article is updated frequently to let you know what's new in the latest rele
4646
4747
## Releases for Defender for Endpoint on Linux
4848

49+
### September-2025 Build: 101.25082.0003 | Release version: 30.125082.0003.0
50+
51+
|Build: |**101.25082.0003** |
52+
|-------------------|----------------------|
53+
|Released: |**September 25, 2025**|
54+
|Published: |**September 25, 2025**|
55+
|Expiry: |**Jun 04, 2026**|
56+
|Release version: |**30.125082.0003.0**|
57+
|Engine version: |**1.1.25070.4000**|
58+
|Signature version: |**1.435.242.0**|
59+
60+
What's new
61+
- Vulnerability detection for Langflow, an open-source Python framework for building AI workflows and agents, has been enhanced with dynamic detection using advanced telemetry and Python package scanning. This includes the detection of CVE-2025-3248 with a CVSS score of 9.8, ensuring comprehensive vulnerability coverage.
62+
63+
- Client Analyzer is now bundled directly within the MDE package, eliminating the need for separate downloads. Both the binary and Python versions are included by default and can be found at /opt/microsoft/mdatp/tools/client_analyzer/. This ensures consistent availability across environments and streamlines troubleshooting for customers by making diagnostic tools readily accessible out-of-the-box.
64+
65+
- Other quality and stability fixes.
66+
4967
### September-2025 Build: 101.25072.0003 | Release version: 30.125072.0003.0
5068

5169
|Build: |**101.25072.0003** |
@@ -77,7 +95,6 @@ What's new
7795
- The `mdatp threat quarantine add` command now requires superuser (root) privileges.
7896
- Custom definition path can now be updated without stopping Defender for Endpoint. Previously, this required stopping the service, but with this release onwards, updates to the definition path can be made dynamically, improving operational efficiency and reducing downtime.
7997
- Running Defender for Endpoint on Linux alongside Fapolicyd is now supported on RHEL and Fedora-based distributions, enabling both antivirus (real-time protection) and EDR functionality to operate without conflict. For other fanotify-based tools, MDE can still be used safely by setting the antivirus enforcement level to passive, helping avoid system instability.
80-
- Both the binary and Python versions of Client Analyzer are now included in the local package. There is no longer a need to download it separately, as it comes bundled by default. You can find it at the location `/opt/microsoft/mdatp/conf/client_analyzer/`.
8198
- Other stability enhancements and bug fixes.
8299

83100
### July-2025 Build: 101.25052.0007 | Release version: 30.125052.0007.0

defender-endpoint/mac-install-manually.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,10 @@ Before you get started, see [the main Microsoft Defender for Endpoint on macOS p
4444

4545
> [!IMPORTANT]
4646
> Manual installation of Microsoft Defender for Endpoint on macOS requires changes to the Privacy & Security Settings on macOS. Please consult Apple's documentation for details.
47-
> [Change Privacy & Security settings on MacOS Sonoma 14](https://support.apple.com/guide/mac-help/change-privacy-security-settings-on-mac-mchl211c911f/14.0/mac/14.0)
48-
> [Change Privacy & Security settings on MacOS Sequoia 15](https://support.apple.com/guide/mac-help/change-privacy-security-settings-on-mac-mchl211c911f/15.0/mac/15.0)
49-
>
47+
> - [Change Privacy & Security settings on MacOS Sonoma 14](https://support.apple.com/guide/mac-help/change-privacy-security-settings-on-mac-mchl211c911f/14.0/mac/14.0)
48+
> - [Change Privacy & Security settings on MacOS Sequoia 15](https://support.apple.com/guide/mac-help/change-privacy-security-settings-on-mac-mchl211c911f/15.0/mac/15.0)
49+
> - [Change Privacy & Security settings on MacOS Tahoe 26](https://support.apple.com/guide/mac-help/change-privacy-security-settings-on-mac-mchl211c911f/mac)
50+
5051
## Download installation and onboarding packages
5152

5253
Download the installation and onboarding packages from Microsoft Defender portal.

defender-endpoint/mac-whatsnew.md

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -59,14 +59,6 @@ To get the latest features, including preview capabilities (such as endpoint det
5959

6060
If an end user encounters a prompt for Defender for Endpoint on macOS processes such as `wdavdaemon_enterprise` or `Microsoft Defender Helper`, the end user can safely choose the **Deny** option. This selection doesn't affect Defender for Endpoint's functionality. Enterprises can also add *Microsoft Defender* to allow [incoming connections](https://support.apple.com/en-ca/guide/deployment/dep8d306275f/web). This issue is fixed in macOS Sequoia 15.2.
6161

62-
## Tahoe support
63-
64-
- Microsoft Defender for Endpoint supports version 26.0 or newer.
65-
66-
## Sequoia support
67-
68-
- Microsoft Defender for Endpoint supports version 15.0.1 or newer.
69-
7062
## macOS Deprecation
7163

7264
- Microsoft Defender for Endpoint no longer supports macOS 11 (Big Sur), 12 (Monterey) and 13 (Ventura)

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 29 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -3,70 +3,45 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 07/23/2025
6+
ms.date: 09/18/2025
77
audience: ITPro
88
ms.topic: reference
9-
author: batamig
10-
ms.author: bagol
11-
ms.custom: nextgen
12-
ms.reviewer: pahuijbr, tudobril, yongrhee
13-
manager: bagol
9+
author: KesemSharabi
10+
ms.author: kesharab
1411
ms.subservice: ngp
15-
ms.collection:
16-
- m365-security
17-
- tier2
18-
- mde-ngp
1912
search.appverid: met150
13+
appliesto:
14+
- Microsoft Defender for Endpoint Plan 1
15+
- Microsoft Defender for Endpoint Plan 2
2016
---
2117

2218
# Microsoft Defender Antivirus security intelligence and product updates
2319

24-
**Applies to:**
20+
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices are protected against new malware and attack techniques. Update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). You can find the lates engine, platform, and signature date in [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates)
2521

26-
- [Microsoft Defender for Endpoint Plans 1 and 2](microsoft-defender-endpoint.md)
27-
- Microsoft Defender Antivirus
28-
29-
**Platforms**
30-
31-
- Windows
32-
33-
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques. Update your antivirus protection, even if Microsoft Defender Antivirus is running in [passive mode](microsoft-defender-antivirus-compatibility.md). This article includes information about the two types of updates for keeping Microsoft Defender Antivirus current:
22+
This article is aimed at **Windows** devices, and includes information about the following two types of updates:
3423

3524
- [Security intelligence updates](#security-intelligence-updates)
36-
- [Product updates](#product-updates)
37-
38-
This article also includes:
39-
40-
- [Microsoft Defender Antivirus platform support](#microsoft-defender-antivirus-platform-and-engine-support)
41-
- [How to roll back an update](#how-to-roll-back-an-update) (if necessary)
42-
- [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)
43-
- [Updates for Deployment Image Servicing and Management (DISM)](#updates-for-deployment-image-servicing-and-management-dism)
44-
45-
To see the most current engine, platform, and signature date, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
4625

47-
[!INCLUDE [MDE automated setup guide](../includes/security-analyzer-setup-guide.md)]
26+
- [Product updates](#product-updates)
4827

4928
## Security intelligence updates
5029

51-
Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) (also called the *Microsoft Advanced Protection Service*, or MAPS) and periodically downloads dynamic security intelligence updates to provide more protection. These dynamic updates don't take the place of regular security intelligence updates via security intelligence update KB2267602.
30+
Microsoft Defender Antivirus uses [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md), also known as *Microsoft Advanced Protection Service*, or *MAPS*. Defender Antivirus periodically downloads dynamic security [intelligence updates](https://www.microsoft.com/en-us/wdsi/defenderupdates). These updates don't replace regular security intelligence updates. Engine updates are included with security intelligence updates and are released monthly.
5231

53-
> [!NOTE]
54-
> Updates are released under the following KBs:
55-
>
56-
> - Microsoft Defender Antivirus: KB2267602
57-
> - System Center Endpoint Protection: KB2461484
32+
Updates are released under the following KBs:
5833

59-
Cloud-delivered protection is always on and requires an active connection to the Internet to function. Security intelligence updates occur on a scheduled cadence (configurable via policy). For more information, see [Use Microsoft cloud-provided protection in Microsoft Defender Antivirus](cloud-protection-microsoft-defender-antivirus.md).
34+
- Microsoft Defender Antivirus: KB2267602
6035

61-
For a list of recent security intelligence updates, see [Security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware](https://www.microsoft.com/en-us/wdsi/defenderupdates).
36+
- System Center Endpoint Protection: KB2461484
6237

63-
Engine updates are included with security intelligence updates and are released on a monthly cadence.
38+
[Cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) is always on and requires an active connection to the internet to function. Security intelligence updates occur on a scheduled cadence which you can configure using a policy.
6439

6540
## Product updates
6641

6742
Microsoft Defender Antivirus requires monthly updates (KB4052623) known as *platform updates*.
6843

69-
You can manage the distribution of updates through one of the following methods:
44+
You can manage the distribution of updates using one of the following methods:
7045

7146
- [Windows Server Update Service (WSUS)](/mem/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus)
7247
- [Microsoft Configuration Manager](/configmgr/sum/understand/software-updates-introduction)
@@ -99,6 +74,17 @@ Updates contain:
9974
- Serviceability improvements
10075
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
10176

77+
### August-2025 (Platform: 4.18.25080.5 | Engine: 1.1.25080.5)
78+
79+
- Security intelligence update version: **1.437.1.0**
80+
- Release date: **September 16, 2025 (Engine) / September 17, 2025 (Platform)**
81+
- Platform: **4.18.25080.5**
82+
- Engine: **1.1.25080.5**
83+
- Support phase: **Security and Critical Updates**
84+
85+
#### What's new
86+
87+
Improved Defender update reliability by allowing non-admin processes to trigger shared signature updates, reducing unnecessary privilege requirements.
10288

10389
### July-2025 (Platform: 4.18.25070.5 | Engine: 1.1.25070.4)
10490

@@ -181,17 +167,17 @@ Refined exclusion processing and resolved false positives for the Attack Surface
181167

182168
### Previous version updates: Technical upgrade support only
183169

184-
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
170+
After a new package version is released, support for the previous two versions is reduced to technical upgrade support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
185171

186172
## Microsoft Defender Antivirus platform and engine support
187173

188174
Platform and engine updates are provided on a monthly cadence. To be fully supported, keep current with the latest platform and engine updates. Our support structure is dynamic, evolving into two phases depending on the availability of the latest platform and engine version:
189175

190176
- **Security and Critical Updates servicing phase** - When running the latest platform and engine version, you're eligible to receive both Security and Critical updates to the anti-malware platform.
191177

192-
- **Technical Support (Only) phase** - After a new platform and engine version is released, support for older versions (N-2) reduce to [technical support only](msda-updates-previous-versions-technical-upgrade-support.md). Platform and engine versions older than N-2 are no longer supported. Technical support continues to be provided for upgrades from the Windows 10 release version (see [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)) to the latest platform version.
178+
- **Technical Upgrade Support (Only) phase** - After a new platform and engine version is released, support for older versions (N-2) reduce to [technical upgrade support only](msda-updates-previous-versions-technical-upgrade-support.md). Platform and engine versions older than N-2 are no longer supported. Technical upgrade support continues to be provided for upgrades from the Windows 10 release version (see [Platform version included with Windows 10 releases](#platform-version-included-with-windows-10-releases)) to the latest platform version.
193179

194-
During the technical support (only) phase, commercially reasonable support incidents are provided through Microsoft Customer Service & Support and Microsoft's managed support offerings (such as Premier Support). If a support incident requires escalation to development for further guidance, requires a nonsecurity update, or requires a security update, customers are asked to upgrade to the latest platform version or an intermediate update (*).
180+
During the technical upgrade support (only) phase, commercially reasonable support incidents are provided through Microsoft Customer Service & Support and Microsoft's managed support offerings (such as Premier Support). If a support incident requires escalation to development for further guidance, requires a nonsecurity update, or requires a security update, customers are asked to upgrade to the latest platform version or an intermediate update (*).
195181

196182
> [!NOTE]
197183
> If you're manually deploying Microsoft Defender Antivirus Platform Update, or if you're using a script or a non-Microsoft management product to deploy Microsoft Defender Antivirus Platform Update, make sure that version `4.18.2001.10` is installed from the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=4.18.2001.10) before the latest version of Platform Update (N-2) is installed.

defender-endpoint/microsoft-defender-passive-mode.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,6 @@ Some of the key benefits of Defender Antivirus in passive mode are:
2626

2727
* **EDR Block mode** - Post-breach protection by detecting and remediating threats missed by the active antimalware solution
2828

29-
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.
30-
3129
* **Security intelligence updates** - Microsoft Defender Antivirus continues to receive updates to stay aware of the latest threats.
3230

3331
* **Data Loss Prevention (DLP)** - Endpoint DLP functionalities operate normally, ensuring sensitive data is safeguarded.

0 commit comments

Comments
 (0)