Skip to content

Commit ecb32d8

Browse files
authored
Merge branch 'public' into release-notes
2 parents 47e865b + b45efb7 commit ecb32d8

15 files changed

+70
-56
lines changed

defender-endpoint/mac-whatsnew.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -40,12 +40,12 @@ For more information on Microsoft Defender for Endpoint on other operating syste
4040
> [!NOTE]
4141
> - Apple fixed an issue on macOS [Ventura upgrade](https://developer.apple.com/documentation/macos-release-notes/macos-13_1-release-notes), and [Sonoma upgrade](https://developer.apple.com/forums/thread/737824#773449022) with the latest OS update. The issue impacts Microsoft Defender for Endpoint security extensions, and might result in losing Full Disk Access Authorization, impacting its ability to function properly.
4242
> - In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device controls ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS less than 14.3.1.
43-
> - In both macOS Sonoma and Sequoia builds, Network Protection capabilities may be impacted due to changes in Apple's internal networking structure resulting in crashes of the network extension (NetExt). This will result in intermittent network connectivity issues for end users. We are recommending that customers who have Network Protection enabled in their organization refrain from upgrading to Sonoma / Seqouia builds at this time.
43+
> - In macOS Sequoia, Network Protection capabilities may be impacted due to changes in Apple's internal networking structure resulting in crashes of the network extension (NetExt). This will result in intermittent network connectivity issues for end users. We are recommending that customers who have Network Protection enabled in their organization refrain from upgrading to Sequoia builds at this time.
4444
4545

4646
**Sequoia support**
4747

48-
Microsoft Defender supports macOS Sequoia (15) in the current Defender release.
48+
Microsoft Defender is working with Apple on a network stack change that is impacting Network Protection's Network Filter with macOS Sequoia (15).
4949

5050
**macOS Deprecation**
5151

@@ -89,7 +89,7 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
8989

9090
##### What's new
9191

92-
- [[device control](mac-device-control-overview.md)] Secure Digital cards are not recognized on newer macOS
92+
- [[device control](mac-device-control-overview.md)] Secure Digital cards aren't recognized on newer macOS
9393
- Bug and performance fixes
9494

9595
### May-2024 (Build: 101.24042.0008 | Release version: 20.124042.8.0)
@@ -1026,7 +1026,7 @@ Live Response for macOS is now available for all Mac devices onboarded to Defend
10261026
> macOS 10.15 (Catalina) contains new security and privacy enhancements. Beginning with this version, by default, applications are not able to access certain locations on disk (such as Documents, Downloads, Desktop, etc.) without explicit consent. In the absence of this consent, Microsoft Defender for Endpoint is not able to fully protect your device.
10271027
> > The mechanism for granting this consent depends on how you deployed Microsoft Defender for Endpoint:
10281028
> - For manual deployments, see the updated instructions in the [Manual deployment topic](mac-install-manually.md#allow-full-disk-access).
1029-
- For managed deployments, see the updated instructions in the [JAMF-based deployment](mac-install-with-jamf.md) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics.
1029+
- For managed deployments, see the updated instructions in the [JAMF-based deployment](mac-install-with-jamf.md) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) articles.
10301030

10311031
- Performance improvements & bug fixes
10321032

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 16 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -3,11 +3,11 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 08/12/2024
6+
ms.date: 09/19/2024
77
audience: ITPro
88
ms.topic: reference
9-
author: siosulli
10-
ms.author: siosulli
9+
author: denisebmsft
10+
ms.author: deniseb
1111
ms.custom: nextgen
1212
ms.reviewer: pahuijbr, tudobril, yongrhee
1313
manager: deniseb
@@ -151,21 +151,6 @@ All our updates contain:
151151
- Fixed an issue where an Outlook exclusion for the ASR rule [Block Office applications from injecting code into other processes](/defender-endpoint/attack-surface-reduction-rules-reference#block-office-applications-from-injecting-code-into-other-processes) was not honored.
152152
- Fixed a race condition during the startup of [endpoint data loss prevention](/purview/endpoint-dlp-getting-started) such that, in certain environments, some system files could be corrupted.
153153

154-
### May-2024 (Engine: 1.1.24050.5 | Platform: 4.18.24050.7)
155-
156-
- Security intelligence update version: **1.413.1.0**
157-
- Release date: **May 30, 2024** (Engine) / **June 4, 2024** (Platform)
158-
- Engine: **1.1.24050.5**
159-
- Platform: **4.18.24050.7**
160-
- Support phase: **Security and Critical Updates**
161-
162-
#### What's new
163-
164-
- Improved performance when running configuration queries.
165-
- Optimized how scans are prioritized.
166-
- Fixed a crash caused by a race condition with a device control driver.
167-
- Added Event Viewer Logging for scan start event where the scan originates from PowerShell.
168-
169154
### Previous version updates: Technical upgrade support only
170155

171156
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).
@@ -228,14 +213,13 @@ Updates are released for x86, x64, and ARM64 Windows architecture.
228213

229214
For more information, see [Microsoft Defender update for Windows operating system installation images](https://support.microsoft.com/help/4568292/defender-update-for-windows-operating-system-installation-images).
230215

231-
After a new package version is released, support for the previous two versions is reduced to technical support only. To view a list of previous versions, see [Previous DISM updates (no longer supported)](msda-updates-previous-versions-technical-upgrade-support.md#previous-dism-updates-no-longer-supported).
216+
After a new package version is released, support for the previous two versions is reduced to technical support only. To view a list of previous versions, see [Previous DISM updates](msda-updates-previous-versions-technical-upgrade-support.md#previous-dism-updates-no-longer-supported).
232217

233-
### 1.415.295.0
218+
### 1.417.472.0
234219

235-
- Defender package version: `1.415.295.0`
236-
- Security intelligence version: `1.415.295.0`
237-
- Engine version: `1.24070.1`
238-
- Platform version: `4.18.24070.5`
220+
- Defender package version: `1.417.472.0`
221+
- Security intelligence version: `1.417.472.0`
222+
- Engine version: `1.24080.9`
239223

240224
#### Fixes
241225

@@ -245,10 +229,10 @@ After a new package version is released, support for the previous two versions i
245229

246230
- None
247231

248-
### 1.415.235.0
232+
### 1.415.295.0
249233

250-
- Defender package version: `1.415.235.0`
251-
- Security intelligence version: `1.415.235.0`
234+
- Defender package version: `1.415.295.0`
235+
- Security intelligence version: `1.415.295.0`
252236
- Engine version: `1.24070.1`
253237
- Platform version: `4.18.24070.5`
254238

@@ -260,12 +244,12 @@ After a new package version is released, support for the previous two versions i
260244

261245
- None
262246

263-
### 1.411.111.0
247+
### 1.415.235.0
264248

265-
- Defender package version: `1.411.111.0`
266-
- Security intelligence version: `1.411.111.0`
267-
- Engine version: `1.24050.2`
268-
- Platform version: `4.18.24050.7`
249+
- Defender package version: `1.415.235.0`
250+
- Security intelligence version: `1.415.235.0`
251+
- Engine version: `1.24070.1`
252+
- Platform version: `4.18.24070.5`
269253

270254
#### Fixes
271255

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 09/17/2024
18+
ms.date: 09/19/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Mac
@@ -71,12 +71,12 @@ There are several methods and deployment tools that you can use to install and c
7171

7272
The three most recent major releases of macOS are supported.
7373

74-
- 15 (Sequoia)
75-
7674
- 14 (Sonoma)
7775

7876
- 13 (Ventura)
7977

78+
- 12 (Monterey)
79+
8080
> [!IMPORTANT]
8181
> On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).
8282

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 33 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Microsoft Defender Antivirus updates - Previous versions for technical upgrade support
33
description: Understand the type of technical support offered for previous versions of Microsoft Defender Antivirus
44
ms.service: defender-endpoint
5-
ms.author: siosulli
6-
author: siosulli
5+
ms.author: deniseb
6+
author: denisebmsft
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 08/12/2024
9+
ms.date: 09/19/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,21 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### May-2024 (Engine: 1.1.24050.5 | Platform: 4.18.24050.7)
33+
34+
- Security intelligence update version: **1.413.1.0**
35+
- Release date: **May 30, 2024** (Engine) / **June 4, 2024** (Platform)
36+
- Engine: **1.1.24050.5**
37+
- Platform: **4.18.24050.7**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Improved performance when running configuration queries.
43+
- Optimized how scans are prioritized.
44+
- Fixed a crash caused by a race condition with a device control driver.
45+
- Added Event Viewer Logging for scan start event where the scan originates from PowerShell.
46+
3247
### April-2024 (Engine: 1.1.24040.1 | Platform: 4.18.24040.4)
3348

3449
- Security intelligence update version: **1.411.7.0**
@@ -1106,6 +1121,21 @@ Microsoft regularly releases [security intelligence updates and product updates
11061121

11071122
The versions listed in this section are no longer supported. To view current versions, see [Updates for Deployment Image Servicing and Management (DISM)](microsoft-defender-antivirus-updates.md#updates-for-deployment-image-servicing-and-management-dism).
11081123

1124+
### 1.411.111.0
1125+
1126+
- Defender package version: `1.411.111.0`
1127+
- Security intelligence version: `1.411.111.0`
1128+
- Engine version: `1.24050.2`
1129+
- Platform version: `4.18.24050.7`
1130+
1131+
#### Fixes
1132+
1133+
- None
1134+
1135+
#### Additional information
1136+
1137+
- None
1138+
11091139
### 1.411.9.0
11101140

11111141
- Defender package version: `1.411.9.0`

defender-office-365/attack-simulation-training-insights.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -459,7 +459,7 @@ How user activity signals are captured is described in the following table.
459459
|Opened Attachment|A user opened the attachment.|The signal comes from the client (for example, Outlook or Word).|
460460
|Read Message|The user read the simulation message.|Message read signals might experience issues in the following scenarios: <ul><li>The user reported the message as phishing in Outlook without leaving the reading pane, and **Mark items as read when viewed in the Reading Pane** wasn't configured (default).</li><li>The user reported the unread message as phishing in Outlook, the message was deleted, and **Mark messages as read when deleted** wasn't configured (default).</li></ul>|
461461
|Out of Office|Determines whether the user is out of office.|Currently calculated by the Automatic replies setting from Outlook.|
462-
|Compromised User|The user was compromised. The compromise signal varies based on the social engineering technique.|<ul><li>**Credential Harvest**: The user entered their credentials on the login page (credentials aren't stored by Microsoft).¹</li><li>**Malware Attachment**: The user opened the payload attachment and selected **Enable Editing** in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653).</li><li>**Link in Attachment**: The user opened the attachment and clicked on the payload link.</li><li>**Link to Malware**: The user clicked on the payload link and entered their credentials.</li><li>**Drive by URL**: The user clicked on the payload link (entering credentials isn't required).¹</li><li>**OAuth Consent Grant**: The user clicked on the payload link and accepted the prompt to share permissions.¹</li></ul>|
462+
|Compromised User|The user was compromised. The compromise signal varies based on the social engineering technique.|<ul><li>**Credential Harvest**: The user entered their credentials on the login page (credentials aren't stored by Microsoft).¹</li><li>**Malware Attachment**: The user opened the payload attachment and selected **Enable Editing** in [Protected View](https://support.microsoft.com/office/d6f09ac7-e6b9-4495-8e43-2bbcdbcb6653).</li><li>**Link in Attachment**: The user opened the attachment and entered their credentials after clicking on the payload link.</li><li>**Link to Malware**: The user clicked on the payload link and entered their credentials.</li><li>**Drive by URL**: The user clicked on the payload link (entering credentials isn't required).¹</li><li>**OAuth Consent Grant**: The user clicked on the payload link and accepted the prompt to share permissions.¹</li></ul>|
463463
|Clicked Message Link|The user clicked on the payload link in the simulation message.|The URL in the simulation is unique for each user, which allows individual user activity tracking. Third-party filtering services or email forwarding can lead to false positives. For more information, see [I see clicks or compromise events from users who insist they didn't click the link in the simulation message](attack-simulation-training-faq.md#i-see-clicks-or-compromise-events-from-users-who-insist-they-didnt-click-the-link-in-the-simulation-message).|
464464
|Forwarded Message|The user forwarded the message.||
465465
|Replied to Message|The user replied to the message.||

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ For more information on what's new with other Microsoft Defender security produc
4949

5050
- **Tenant Allow/Block List in Microsoft 365 GCC, GCC High, DoD, and Office 365 operated by 21Vianet environments**: The [Tenant Allow/Block List](tenant-allow-block-list-about.md) is now available these environments. They are on parity with the WW commercial experiences.
5151

52-
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions and existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md). The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
52+
- **45 days after last used date**: The value **Remove allow entry after** \> **45 days after last used date** is now the default on new allow entries from submissions. The existing allow entries in the [Tenant Allow/Block List](tenant-allow-block-list-about.md) can also be modified to include the value **Remove allow entry after** \> **45 days after last used date**. The allow entry is triggered and the **LastUsedDate** property is updated when the entity is encountered and identified as malicious during mail flow or at time of click. After the filtering system determines that the entity is clean, the allow entry is automatically removed after 45 days. By default, allow entries for spoofed senders never expire.
5353

5454
- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.
5555

0 commit comments

Comments
 (0)