Skip to content

Commit ec35cfd

Browse files
Merge pull request #4863 from MicrosoftDocs/main
[AutoPublish] main to live - 08/28 10:30 PDT | 08/28 23:00 IST
2 parents 9137e5c + c55e6ef commit ec35cfd

File tree

2 files changed

+19
-1
lines changed

2 files changed

+19
-1
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,22 @@ This feature enables organizations to configure offline updates for security int
7474

7575
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md) and [Behavior Monitoring GA announcement blog](https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/behavior-monitoring-is-now-generally-available-for-microsoft-defender-for-endpoi/4415697)
7676

77+
### Sep-2025 (Build: 101.25072.0011 | Release version: 20.125072.11.0)
78+
79+
| Build: | **101.25072.0011** |
80+
|--------------------|-----------------------|
81+
| Release version: | **20.125072.11.0** |
82+
| Engine version: | **1.1.25060.3000** |
83+
| Signature version: | **1.429.309.0** |
84+
85+
##### What's new
86+
87+
- Enhanced malware detection timing and archive scanning improvements
88+
- Improved diagnostic capabilities and error reporting
89+
- Performance and diagnostic improvements for endpoint Data Loss Prevention (DLP)
90+
91+
- Bug fixes
92+
7793
### Aug-2025 (Build: 101.25062.0006 | Release version: 20.125062.6.0)
7894

7995
| Build: | **101.25062.0006** |

defender-office-365/threat-explorer-real-time-detections-about.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: chrisda
77
manager: orspodek
88
audience: ITPro
99
ms.topic: concept-article
10-
ms.date: 06/19/2025
10+
ms.date: 08/28/2025
1111
ms.localizationpriority: medium
1212
ms.collection:
1313
- m365-security
@@ -82,6 +82,8 @@ To use Explorer or Real-time detections, you need to be assigned permissions. Yo
8282
> End-user spam notifications and system generated messages aren't available in Threat Explorer. These types of messages are available if there's a mail flow rule (also known as a transport rule) to override.
8383
>
8484
> Audit log entries are generated when admins preview or download email messages. You can search the admin audit log by user for **AdminMailAccess** activity. For instructions, see [Audit New Search](/purview/audit-new-search).
85+
>
86+
> Email delivered to moderated mailboxes or moderated distribution groups is visible in Threat Explorer. But moderator actions (for example, approve or reject messages) and messages released by a moderator to members of a distribution group aren't logged and aren't shown in Threat Explorer.
8587
8688
To use Threat Explorer or Real-time detections, you need to be assigned a license for Defender for Office 365 (included in your subscription or an add-on license).
8789

0 commit comments

Comments
 (0)