Skip to content

Commit eb29962

Browse files
Merge pull request #4158 from MicrosoftDocs/main
[AutoPublish] main to live - 06/06 13:31 PDT | 06/07 02:01 IST
2 parents 22f5ce3 + 8cdb760 commit eb29962

File tree

7 files changed

+223
-17
lines changed

7 files changed

+223
-17
lines changed

defender-endpoint/linux-exclusions.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Provide and validate exclusions for Microsoft Defender for Endpoint
44
ms.service: defender-endpoint
55
ms.author: ewalsh
66
author: emmwalshh
7-
ms.reviewer: gopkr, ardeshmukh
7+
ms.reviewer: ratujdange, ardeshmukh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 03/28/2025
18+
ms.date: 06/06/2025
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -32,7 +32,7 @@ ms.date: 03/28/2025
3232
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
3333

3434
> [!IMPORTANT]
35-
> The antivirus exclusions described in this article apply to only antivirus capabilities and not to endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Global exclusions described in this section apply to antivirus **and** endpoint detection and response capabilities, thus stopping all associated antivirus protection, EDR alerts, and detections. Global exclusions are currently in public preview, and are available in Defender for Endpoint version `101.23092.0012` or later, in the Insiders Slow and Production rings. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
35+
> The antivirus exclusions described in this article apply to only antivirus capabilities, and not to endpoint detection and response (EDR). Files that you exclude by using the antivirus exclusions described in this article can still result in EDR alerts and other detections. Global exclusions described in this section apply to antivirus and EDR capabilities, thus stopping all associated antivirus protection, EDR alerts, and detections. Global exclusions are available in production for Defender for Endpoint on Linux, version `101.23092.0012` or later. For EDR-only exclusions, [contact support](/microsoft-365/admin/get-help-support).
3636
3737
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux.
3838

@@ -87,7 +87,7 @@ Wildcard|Description|Examples|
8787
8888
## How to configure the list of exclusions
8989

90-
You can configure exclusions using a management Json configuration, Defender for Endpoint security settings management, or the command line.
90+
You can configure exclusions using a management JSON configuration, Defender for Endpoint security settings management, or the command line.
9191

9292
### Using the management console
9393

@@ -141,7 +141,6 @@ In enterprise environments, exclusions can also be managed through a configurati
141141
### Using Defender for Endpoint security settings management
142142

143143
> [!NOTE]
144-
> This method is currently in private Preview. To enable this feature, please reach out to [email protected].
145144
> Make sure to review the prerequisites: [Defender for Endpoint security settings management prerequisites](/mem/intune/protect/mde-security-integration#prerequisites)
146145
147146
You can use the Microsoft Intune admin center or the Microsoft Defender portal to manage exclusions as endpoint security policies and assign those policies to Microsoft Entra ID groups. If you're using this method for the first time, make sure to complete the following steps:

defender-endpoint/linux-whatsnew.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 06/03/2025
9+
ms.date: 06/06/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,6 +43,20 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### June-2025 Build: 101.25042.0002 | Release version: 30.125042.0002.0
47+
48+
|Build: |**101.25042.0002** |
49+
|-------------------|----------------------|
50+
|Released: |**June 4, 2025** |
51+
|Published: |**June 4, 2025** |
52+
|Release version: |**30.125042.0002.0** |
53+
|Engine version: |**1.1.25020.4000** |
54+
|Signature version: |**1.427.370.0** |
55+
56+
What's new
57+
58+
- Removed external dependency of uuid-runtime from MDE package
59+
4660
### May-2025 Build: 101.25032.0010 | Release version: 30.125032.0010.0
4761

4862
|Build: |**101.25032.0010** |
@@ -61,7 +75,6 @@ What's new
6175

6276
- Added detection mechanism for CVE-2025-31324 affecting the "Visual Composer" component of the SAP NetWeaver application server.
6377

64-
- Updated Engine Version 1.1.25020.3000/Sigs Version 1.421.1866.0
6578

6679
### April-2025 Build: 101.25022.0002 | Release version: 30.125022.0001.0
6780

defender-endpoint/mac-health-status.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ audience: ITPro
1010
ms.service: defender-endpoint
1111
ms.subservice: macos
1212
ms.topic: troubleshooting-general
13-
ms.date: 04/16/2025
13+
ms.date: 06/06/2025
1414
ms.collection:
1515
- m365-security
1616
- tier3
@@ -78,6 +78,8 @@ mdatp health --details edr
7878

7979
mdatp health --details definitions
8080

81+
mdatp health --details features
82+
8183
mdatp health --details help
8284

8385
```

defender-endpoint/web-content-filtering.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: ericlaw
88
ms.localizationpriority: medium
9-
ms.date: 02/18/2025
9+
ms.date: 06/06/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -30,7 +30,6 @@ search.appverid: met150
3030
> [!TIP]
3131
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630)
3232
33-
3433
## What is web content filtering?
3534

3635
Web content filtering is part of the [Web protection](web-protection-overview.md) capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.
@@ -104,7 +103,7 @@ Policies can be deployed to block any of the following parent or child categorie
104103
| **Uncategorized** | - **Newly registered domains**: Sites that are newly registered in the past 30 days and haven't yet been moved to another category.<br/><br/>- **Parked domains**: Sites that have no content or are parked for later use. |
105104

106105
> [!NOTE]
107-
> Uncategorized contains only newly registered domains and parked domains, and does not include all other sites outside of these categories.
106+
> Uncategorized contains only newly registered domains and parked domains, and does not include all other sites outside of these categories. *Remote proxy sites* are categorized as *Illegal Software*. This classification is based on their inherent ability to route traffic to any destination, which can include access to unwanted, malicious, or illegal content. As with any other blocked site, an organization can choose to use an "allow" indicator to allow access to a site that would otherwise be blocked based on its Web Content Filtering category.
108107
109108
### Create a policy
110109

@@ -151,11 +150,11 @@ To define a custom indicator, follow these steps:
151150

152151
### Dispute categories
153152

154-
If you encounter a domain that has been incorrectly categorized, you can dispute the category directly from the Microsoft Defender portal.
153+
If you encounter a domain that has been incorrectly categorized, you can dispute the category directly in the Microsoft Defender portal.
155154

156155
To dispute the category of a domain, navigate to **Reports** \> **Web protection** \> **Web content filtering categories details** \> **Domains**. On the domains tab of the Web Content Filtering reports, find the ellipsis beside each of the domains. Hover over the ellipsis and then select **Dispute Category**.
157156

158-
A panel opens where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select **Submit**. Our team will review the request within one business day. For manual unblocking, create a [custom allow indicator](indicator-ip-domain.md) .
157+
A panel opens where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select **Submit**. Our team will review the request within one business day. For manual unblocking, create a [custom allow indicator](indicator-ip-domain.md).
159158

160159
## Web content filtering cards and details
161160

@@ -169,7 +168,7 @@ In the first 30 days of using this feature, your organization might not have eno
169168

170169
:::image type="content" source="media/web-activity-by-category600.png" alt-text="The web activity by category card" lightbox="media/web-activity-by-category600.png":::
171170

172-
### Web content filtering summary card
171+
### Web content filtering summary card
173172

174173
This card displays the distribution of blocked access attempts across the different parent web content categories. Select one of the colored bars to view more information about a specific parent web category.
175174

@@ -188,9 +187,7 @@ You can access the **Report details** for each card by selecting a table row or
188187
:::image type="content" source="media/web-protection-report-details.png" alt-text="The web protection report details" lightbox="media/web-protection-report-details.png":::
189188

190189
- **Web categories**: Lists the web content categories that have had access attempts in your organization. Select a specific category to open a summary flyout.
191-
192190
- **Domains**: Lists the web domains that have been accessed or blocked in your organization.
193-
194191
- **Device groups**: Lists all the device groups that have generated web activity in your organization
195192

196193
Use the time range filter at the top left of the page to select a time period. You can also filter the information or customize the columns. Select a row to open a flyout pane with even more information about the selected item.

defender-office-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -490,6 +490,8 @@
490490
href: mdo-data-retention.md
491491
- name: Privacy in Defender for Office 365
492492
href: mdo-privacy.md
493+
- name: Defender for Office 365 API Vendor Ecosystem integration guide
494+
href: mdo-api-vendor-ecosystem.md
493495
- name: External email senders - Microsoft 365 resources
494496
items:
495497
- name: Microsoft 365 services for external email senders

0 commit comments

Comments
 (0)