Skip to content

Commit f6ca37a

Browse files
authored
Merge branch 'main' into poliveria-custom-functions-11202025
2 parents 9bee1c7 + ac57cc4 commit f6ca37a

23 files changed

+89
-86
lines changed

defender-endpoint/api/run-live-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Runs a sequence of live response commands on a device
6969

7070
- 25 concurrently running sessions (requests exceeding the throttling limit receives a "429 - Too many requests" response).
7171

72-
- If the machine isn't available, the session is queued for up to three days.
72+
- If the machine isn't available, the session is queued for up to 2 hours.
7373

7474
- RunScript command time-outs after 10 minutes.
7575

defender-endpoint/autoir-investigation-results.md

Lines changed: 4 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -20,22 +20,18 @@ ms.custom:
2020
- autoir
2121
- admindeeplinkDEFENDER
2222
ms.reviewer: evaldm, isco
23-
ms.date: 04/04/2025
23+
ms.date: 11/30/2025
2424
appliesto:
2525
- Microsoft Defender for Endpoint Plan 2
2626

2727
---
2828
# View the details and results of an automated investigation
2929

30-
3130
With Microsoft Defender for Endpoint, when an [automated investigation](automated-investigations.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the necessary permissions, you can view those details in an investigation details view. The investigation details view provides you with up-to-date status and the ability to approve any pending actions.
3231

33-
## (NEW!) Unified investigation page
34-
35-
The investigation page is updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about).
32+
## Unified investigation page
3633

37-
> [!TIP]
38-
> To learn more about what's changing, see [(NEW!) Unified investigation page](/microsoft-365/security/mtp/mtp-autoir-results).
34+
The unified investigation page includes information across your devices, email, and collaboration content. It defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). For more information, see [Details and results of an automated investigation](/defender-xdr/m365d-autoir-results).
3935

4036
## Open the investigation details view
4137

@@ -69,9 +65,7 @@ Use an incident details page to view detailed information about an incident, inc
6965

7066
## Investigation details
7167

72-
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. The investigation details view resembles the following image:
73-
74-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
68+
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. In the investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
7569

7670
> [!NOTE]
7771
> - The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription doesn't include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.

defender-endpoint/configure-endpoints-gp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
3636

3737
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
3838

39-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
39+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
4040

4141
1. Select the operating system.
4242

@@ -179,7 +179,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
179179
180180
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
181181

182-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
182+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Offboarding**.
183183

184184
1. Select the operating system.
185185

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -345,6 +345,10 @@ Example:
345345
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
346346
> The rule ID shouldn't have any leading or trailing spaces.
347347
348+
> [!NOTE]
349+
> Microsoft rebranded Windows Defender Antivirus to Microsoft Defender Antivirus beginning with Windows 10 version 20H1.
350+
> Group Policy paths on earlier Windows versions may still reference Windows Defender Antivirus, while newer builds show Microsoft Defender Antivirus. Both names refer to the same policy location.
351+
348352
### PowerShell
349353

350354
> [!WARNING]

defender-endpoint/linux-install-with-defender-deployment-tool.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -95,21 +95,21 @@ The Defender deployment tool enforces the following set of prerequisites checks,
9595

9696
:::image type="content" source="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png" alt-text="Screenshot showing the help command output." lightbox="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png":::
9797

98-
The following table provides examples of commands for useful scenarios.
99-
100-
| **Scenario** | **Command** |
101-
|:-------------|:------------|
102-
| Check for unmet non-blocking prerequisites | `sudo ./defender_deployment_tool.sh --pre-req-non-blocking` |
103-
| Run the connectivity test | `sudo ./defender_deployment_tool.sh --connectivity-test` |
104-
| Deploy to a custom location | `sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/` |
105-
| Deploy from the insider-slow channel | `sudo ./defender_deployment_tool.sh --channel insiders-slow` |
106-
| Deploy using a proxy | `sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>` |
107-
| Deploy a specific agent version | `sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod` |
108-
| Upgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004` |
109-
| Downgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004` |
110-
| Uninstall Defender | `sudo ./defender_deployment_tool.sh --remove` |
111-
| Only onboard if Defender is already installed | `sudo ./defender_deployment_tool.sh --only-onboard` |
112-
| Offboard Defender | `sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)* |
98+
The following table provides examples of commands for useful scenarios.
99+
100+
| **Scenario** | **Command** |
101+
|:-------------|:------------|
102+
| Check for unmet non-blocking prerequisites | `sudo ./defender_deployment_tool.sh --pre-req-non-blocking` |
103+
| Run the connectivity test | `sudo ./defender_deployment_tool.sh --connectivity-test` |
104+
| Deploy to a custom location | `sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/` |
105+
| Deploy from the insider-slow channel | `sudo ./defender_deployment_tool.sh --channel insiders-slow` |
106+
| Deploy using a proxy | `sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>` |
107+
| Deploy a specific agent version | `sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod` |
108+
| Upgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004` |
109+
| Downgrade to a specific agent version | `sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004` |
110+
| Uninstall Defender | `sudo ./defender_deployment_tool.sh --remove` |
111+
| Only onboard if Defender is already installed | `sudo ./defender_deployment_tool.sh --only-onboard` |
112+
| Offboard Defender | `sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)* |
113113

114114
## Verify deployment status
115115

@@ -204,11 +204,11 @@ Defender for Endpoint on Linux can be deployed from one of the following channel
204204
- insiders-slow
205205
- prod (production)
206206

207-
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices in insiders-fast are the first to receive updates and new features, followed later by insiders-slow and lastly by prod.
207+
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices in insiders-fast are the first to receive updates and new features, followed later by insiders-slow and lastly by prod.
208208

209209
By default, the deployment tool configures your device to use the prod channel. You can use the configuration options described in this document to deploy from a different channel.
210210

211-
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either insiders-fast or insiders-slow. If you've already deployed Defender for Endpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustrated in the following example, where the channel is changed from insiders-fast to prod:
211+
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either insiders-fast or insiders-slow. If you've already deployed Defender for Endpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustrated in the following example, where the channel is changed from insiders-fast to prod:
212212

213213
1. Remove the insiders-fast channel version of Defender for Endpoint on Linux..
214214

@@ -225,7 +225,7 @@ To preview new features and provide early feedback, it's recommended that you co
225225
1. Install Microsoft Defender for Endpoint on Linux using the production channel.
226226

227227
```bash
228-
sudo ./defender_deployment_tool.sh --install --channel prod
228+
sudo ./defender_deployment_tool.sh --channel prod
229229
```
230230

231231
## Related content
-4.86 KB
Binary file not shown.
-851 Bytes
Binary file not shown.

defender-endpoint/onboarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If you're onboarding devices in the Microsoft Defender portal, follow these step
3737

3838
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
3939

40-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
4141

4242
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
4343

defender-endpoint/preferences-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ appliesto:
2323
# Configure general Defender for Endpoint settings
2424

2525

26-
Use the **Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
26+
Use the **System > Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
2727

2828
## In this section
2929

defender-endpoint/time-settings.md

Lines changed: 7 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
title: Microsoft Defender XDR time zone settings
3-
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings and view license information.
3+
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings.
44
ms.service: defender-endpoint
5-
ms.author: bagol
6-
author: batamig
5+
ms.author: painbar
6+
author: paulinbar
77
ms.localizationpriority: medium
88
manager: bagol
99
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: article
1414
ms.subservice: reference
1515
search.appverid: met150
16-
ms.date: 05/05/2025
16+
ms.date: 11/30/2025
1717
appliesto:
1818
- Microsoft Defender for Endpoint Plan 1
1919
- Microsoft Defender for Endpoint Plan 2
@@ -22,9 +22,7 @@ appliesto:
2222
# Microsoft Defender XDR time zone settings
2323

2424

25-
This article describes time zone settings and options. You can use **Time zone** menu to configure the time zone and view license information.
26-
27-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-1" lightbox="media/atp-time-zone.png":::
25+
This article describes how to configure time zone settings and options.
2826

2927
> [!NOTE]
3028
> Changing the time zone setting in the [Microsoft Defender portal](https://security.microsoft.com) only affects how times are displayed. It doesn't affect the actual scheduling of operations, such as antivirus scans, which continue to follow the local system time or UTC settings, depending on how they're configured.
@@ -33,10 +31,6 @@ This article describes time zone settings and options. You can use **Time zone**
3331

3432
The aspect of time is important in the assessment and analysis of perceived and actual cyberattacks. Cyberforensic investigations often rely on time stamps to piece together the sequence of events. It's important that your system reflects the correct time zone settings. Defender for Endpoint can display either Coordinated Universal Time (UTC) or local time.
3533

36-
Your current time zone setting is shown in the **Timezone** menu in the Microsoft Defender portal.
37-
38-
:::image type="content" source="media/atp-time-zone-menu.png" alt-text="The Time zone settings-2" lightbox="media/atp-time-zone-menu.png":::
39-
4034
### UTC time zone
4135

4236
Defender for Endpoint uses UTC time by default. Keeping this time zone displays all system timestamps (alerts, events, and others) in UTC for all users. This configuration can help security analysts working in different locations across the globe to use the same time stamps while investigating events.
@@ -55,13 +49,9 @@ The Defender for Endpoint time zone is set by default to UTC. Setting the time z
5549

5650
To set the time zone:
5751

58-
1. Select the **Time zone** menu.
59-
60-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-3" lightbox="media/atp-time-zone.png":::
61-
62-
2. Select the **Timezone UTC** indicator.
52+
1. In the Microsoft Defender portal, go to **System** > **Settings** > **Microsoft Defender portal** > **Time zone**.
6353

64-
3. Select **Timezone UTC** or your local time zone, for example `-7:00`.
54+
1. In the **Time zone** drop down menu, select either UTC or your local time zone.
6555

6656
### Regional settings
6757

0 commit comments

Comments
 (0)