You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/autoir-investigation-results.md
+4-10Lines changed: 4 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,22 +20,18 @@ ms.custom:
20
20
- autoir
21
21
- admindeeplinkDEFENDER
22
22
ms.reviewer: evaldm, isco
23
-
ms.date: 04/04/2025
23
+
ms.date: 11/30/2025
24
24
appliesto:
25
25
- Microsoft Defender for Endpoint Plan 2
26
26
27
27
---
28
28
# View the details and results of an automated investigation
29
29
30
-
31
30
With Microsoft Defender for Endpoint, when an [automated investigation](automated-investigations.md) runs, details about that investigation are available both during and after the automated investigation process. If you have the necessary permissions, you can view those details in an investigation details view. The investigation details view provides you with up-to-date status and the ability to approve any pending actions.
32
31
33
-
## (NEW!) Unified investigation page
34
-
35
-
The investigation page is updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about).
32
+
## Unified investigation page
36
33
37
-
> [!TIP]
38
-
> To learn more about what's changing, see [(NEW!) Unified investigation page](/microsoft-365/security/mtp/mtp-autoir-results).
34
+
The unified investigation page includes information across your devices, email, and collaboration content. It defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about). For more information, see [Details and results of an automated investigation](/defender-xdr/m365d-autoir-results).
39
35
40
36
## Open the investigation details view
41
37
@@ -69,9 +65,7 @@ Use an incident details page to view detailed information about an incident, inc
69
65
70
66
## Investigation details
71
67
72
-
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. The investigation details view resembles the following image:
73
-
74
-
In the Investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
68
+
Use the investigation details view to see past, current, and pending activity pertaining to an investigation. In the investigation details view, you can see information on the **Investigation graph**, **Alerts**, **Devices**, **Identities**, **Key findings**, **Entities**, **Log**, and **Pending actions** tabs, described in the following table.
75
69
76
70
> [!NOTE]
77
71
> - The specific tabs you see in an investigation details page depends on what your subscription includes. For example, if your subscription doesn't include Microsoft Defender for Office 365 Plan 2, you won't see a **Mailboxes** tab.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-endpoints-gp.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Check out [Identify Defender for Endpoint architecture and deployment method](de
36
36
37
37
1. Open the GP configuration package file (`WindowsDefenderATPOnboardingPackage.zip`) that you downloaded from the service onboarding wizard. You can also get the package from the [Microsoft Defender portal](https://security.microsoft.com):
38
38
39
-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Onboarding**.
39
+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Onboarding**.
40
40
41
41
1. Select the operating system.
42
42
@@ -179,7 +179,7 @@ For security reasons, the package used to Offboard devices will expire 7 days af
179
179
180
180
1. Get the offboarding package from the [Microsoft Defender portal](https://security.microsoft.com):
181
181
182
-
1. In the navigation pane, select **Settings** > **Endpoints** > **Device management** > **Offboarding**.
182
+
1. In the navigation pane, select **System** > **Settings** > **Endpoints** > **Device management** > **Offboarding**.
Copy file name to clipboardExpand all lines: defender-endpoint/enable-attack-surface-reduction.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -345,6 +345,10 @@ Example:
345
345
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
346
346
> The rule ID shouldn't have any leading or trailing spaces.
347
347
348
+
> [!NOTE]
349
+
> Microsoft rebranded Windows Defender Antivirus to Microsoft Defender Antivirus beginning with Windows 10 version 20H1.
350
+
> Group Policy paths on earlier Windows versions may still reference Windows Defender Antivirus, while newer builds show Microsoft Defender Antivirus. Both names refer to the same policy location.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-install-with-defender-deployment-tool.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,21 +95,21 @@ The Defender deployment tool enforces the following set of prerequisites checks,
95
95
96
96
:::image type="content" source="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png" alt-text="Screenshot showing the help command output." lightbox="./media/linux-install-with-defender-deployment-tool/deployment-tool-help.png":::
97
97
98
-
The following table provides examples of commands for useful scenarios.
99
-
100
-
|**Scenario**|**Command**|
101
-
|:-------------|:------------|
102
-
| Check for unmet non-blocking prerequisites |`sudo ./defender_deployment_tool.sh --pre-req-non-blocking`|
103
-
| Run the connectivity test |`sudo ./defender_deployment_tool.sh --connectivity-test`|
104
-
| Deploy to a custom location |`sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/`|
105
-
| Deploy from the insider-slow channel |`sudo ./defender_deployment_tool.sh --channel insiders-slow`|
106
-
| Deploy using a proxy |`sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>`|
107
-
| Deploy a specific agent version |`sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod`|
108
-
| Upgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004`|
109
-
| Downgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004`|
| Only onboard if Defender is already installed |`sudo ./defender_deployment_tool.sh --only-onboard`|
112
-
| Offboard Defender |`sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)*|
98
+
The following table provides examples of commands for useful scenarios.
99
+
100
+
|**Scenario**|**Command**|
101
+
|:-------------|:------------|
102
+
| Check for unmet non-blocking prerequisites |`sudo ./defender_deployment_tool.sh --pre-req-non-blocking`|
103
+
| Run the connectivity test |`sudo ./defender_deployment_tool.sh --connectivity-test`|
104
+
| Deploy to a custom location |`sudo ./defender_deployment_tool.sh --install-path /usr/microsoft/`|
105
+
| Deploy from the insider-slow channel |`sudo ./defender_deployment_tool.sh --channel insiders-slow`|
106
+
| Deploy using a proxy |`sudo ./defender_deployment_tool.sh --http-proxy <http://username:password@proxy_host:proxy_port>`|
107
+
| Deploy a specific agent version |`sudo ./defender_deployment_tool.sh --mdatp 101.25042.0003 --channel prod`|
108
+
| Upgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --upgrade --mdatp 101.24082.0004`|
109
+
| Downgrade to a specific agent version |`sudo ./defender_deployment_tool.sh --downgrade --mdatp 101.24082.0004`|
| Only onboard if Defender is already installed |`sudo ./defender_deployment_tool.sh --only-onboard`|
112
+
| Offboard Defender |`sudo ./defender_deployment_tool.sh --offboard MicrosoftDefenderATPOffboardingLinuxServer.py`<br>*(Note: The latest offboarding file can be downloaded from the Microsoft Defender portal)*|
113
113
114
114
## Verify deployment status
115
115
@@ -204,11 +204,11 @@ Defender for Endpoint on Linux can be deployed from one of the following channel
204
204
- insiders-slow
205
205
- prod (production)
206
206
207
-
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices ininsiders-fastare the first to receive updates and new features, followed later byinsiders-slowand lastly byprod.
207
+
Each of these channels corresponds to a Linux software repository. The channel determines the type and frequency of updates that are offered to your device. Devices ininsiders-fastare the first to receive updates and new features, followed later byinsiders-slowand lastly byprod.
208
208
209
209
By default, the deployment tool configures your device to use the prod channel. You can use the configuration options described in this document to deploy from a different channel.
210
210
211
-
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use eitherinsiders-fast or insiders-slow. If you've already deployed Defender forEndpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustratedin the following example, where the channel is changed from insiders-fast to prod:
211
+
To preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use eitherinsiders-fast or insiders-slow. If you've already deployed Defender forEndpoint on Linux from a channel and want to switch to a different channel (from prod to insiders-fast, for example), you must first remove the current channel, then delete the current channel repo, and then finally install Defender from the new channel, as illustratedin the following example, where the channel is changed from insiders-fast to prod:
212
212
213
213
1. Remove the insiders-fast channel version of Defender for Endpoint on Linux..
214
214
@@ -225,7 +225,7 @@ To preview new features and provide early feedback, it's recommended that you co
225
225
1. Install Microsoft Defender for Endpoint on Linux using the production channel.
Copy file name to clipboardExpand all lines: defender-endpoint/onboarding.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,7 +37,7 @@ If you're onboarding devices in the Microsoft Defender portal, follow these step
37
37
38
38
1. Make sure to review the [Minimum requirements for Defender for Endpoint](minimum-requirements.md).
39
39
40
-
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
40
+
2. In the [Microsoft Defender portal](https://security.microsoft.com), go to **System** > **Settings** > **Endpoints**, and then, under **Device management**, select **Onboarding**.
41
41
42
42
:::image type="content" source="media/mde-device-onboarding-ui.png" alt-text="Screenshot showing device onboarding in the Microsoft Defender portal for Defender for Endpoint.":::
Copy file name to clipboardExpand all lines: defender-endpoint/preferences-setup.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ appliesto:
23
23
# Configure general Defender for Endpoint settings
24
24
25
25
26
-
Use the **Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
26
+
Use the **System > Settings > Endpoints** menu to modify general settings, advanced features, enable the preview experience, email notifications, and the custom threat intelligence feature.
Copy file name to clipboardExpand all lines: defender-endpoint/time-settings.md
+7-17Lines changed: 7 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,9 @@
1
1
---
2
2
title: Microsoft Defender XDR time zone settings
3
-
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings and view license information.
3
+
description: Use the info contained here to configure the Microsoft Defender XDR time zone settings.
4
4
ms.service: defender-endpoint
5
-
ms.author: bagol
6
-
author: batamig
5
+
ms.author: painbar
6
+
author: paulinbar
7
7
ms.localizationpriority: medium
8
8
manager: bagol
9
9
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
13
13
ms.topic: article
14
14
ms.subservice: reference
15
15
search.appverid: met150
16
-
ms.date: 05/05/2025
16
+
ms.date: 11/30/2025
17
17
appliesto:
18
18
- Microsoft Defender for Endpoint Plan 1
19
19
- Microsoft Defender for Endpoint Plan 2
@@ -22,9 +22,7 @@ appliesto:
22
22
# Microsoft Defender XDR time zone settings
23
23
24
24
25
-
This article describes time zone settings and options. You can use **Time zone** menu to configure the time zone and view license information.
26
-
27
-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-1" lightbox="media/atp-time-zone.png":::
25
+
This article describes how to configure time zone settings and options.
28
26
29
27
> [!NOTE]
30
28
> Changing the time zone setting in the [Microsoft Defender portal](https://security.microsoft.com) only affects how times are displayed. It doesn't affect the actual scheduling of operations, such as antivirus scans, which continue to follow the local system time or UTC settings, depending on how they're configured.
@@ -33,10 +31,6 @@ This article describes time zone settings and options. You can use **Time zone**
33
31
34
32
The aspect of time is important in the assessment and analysis of perceived and actual cyberattacks. Cyberforensic investigations often rely on time stamps to piece together the sequence of events. It's important that your system reflects the correct time zone settings. Defender for Endpoint can display either Coordinated Universal Time (UTC) or local time.
35
33
36
-
Your current time zone setting is shown in the **Timezone** menu in the Microsoft Defender portal.
37
-
38
-
:::image type="content" source="media/atp-time-zone-menu.png" alt-text="The Time zone settings-2" lightbox="media/atp-time-zone-menu.png":::
39
-
40
34
### UTC time zone
41
35
42
36
Defender for Endpoint uses UTC time by default. Keeping this time zone displays all system timestamps (alerts, events, and others) in UTC for all users. This configuration can help security analysts working in different locations across the globe to use the same time stamps while investigating events.
@@ -55,13 +49,9 @@ The Defender for Endpoint time zone is set by default to UTC. Setting the time z
55
49
56
50
To set the time zone:
57
51
58
-
1. Select the **Time zone** menu.
59
-
60
-
:::image type="content" source="media/atp-time-zone.png" alt-text="The Time zone settings-3" lightbox="media/atp-time-zone.png":::
61
-
62
-
2. Select the **Timezone UTC** indicator.
52
+
1. In the Microsoft Defender portal, go to **System** > **Settings** > **Microsoft Defender portal** > **Time zone**.
63
53
64
-
3. Select **Timezone UTC** or your local time zone, for example `-7:00`.
54
+
1. In the **Time zone**drop down menu, select either UTC or your local time zone.
0 commit comments