Skip to content

Commit f73e250

Browse files
authored
Merge pull request #2407 from MicrosoftDocs/main
Published main to live, Friday 10:30 AM PST, 01/10
2 parents aae382e + bcd6b43 commit f73e250

22 files changed

+631
-1053
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -511,8 +511,8 @@
511511
href: troubleshoot-collect-support-log.md
512512
- name: Troubleshoot Microsoft Defender Antivirus settings
513513
href: troubleshoot-settings.md
514-
- name: Troubleshoot Microsoft Defender Antivirus service startup problems
515-
href: troubleshoot-service-startup-problems.md
514+
- name: Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated
515+
href: troubleshoot-security-intelligence-not-updated.md
516516
- name: Troubleshooting Security Intelligence Updates from Microsoft Update source
517517
href: security-intelligence-update-tshoot.md
518518
displayName: Troubleshooting Security Intelligence Updates from Microsoft Update source

defender-endpoint/live-response.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/10/2025
1818
---
1919

2020
# Investigate entities on devices using live response
@@ -229,9 +229,9 @@ Here are some examples:
229229

230230
Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
231231

232-
Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
232+
Live response allows PowerShell and Bash scripts to run; however, you must first put the files into the library before you can run them.
233233

234-
You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
234+
You can have a collection of PowerShell and Bash scripts that can run on devices that you initiate live response sessions with.
235235

236236
#### To upload a file in the library
237237

@@ -311,7 +311,7 @@ Live response supports table and JSON format output types. For each command, the
311311
312312
## Supported output pipes
313313

314-
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
314+
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: `[command] > [filename].txt`.
315315

316316
Example:
317317

42.2 KB
Loading
114 KB
Loading

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 10/17/2024
7+
ms.date: 01/10/2025
88
ms.topic: conceptual
99
author: emmwalshh
1010
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132132

133133
- Endpoints must be onboarded to Defender for Endpoint.
134134

135+
- Windows Security Center Service must be enabled.
136+
137+
> [!WARNING]
138+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140+
135141
> [!IMPORTANT]
136142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).

defender-endpoint/run-analyzer-macos-linux.md

Lines changed: 18 additions & 431 deletions
Large diffs are not rendered by default.

defender-endpoint/troubleshoot-av-performance-issues-with-procmon.md

Lines changed: 42 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: yonghree
77
manager: deniseb
88
ms.service: defender-endpoint
99
ms.topic: troubleshooting-general
10-
ms.date: 01/06/2025
10+
ms.date: 01/10/2025
1111
ms.subservice: ngp
1212
ms.localizationpriority: medium
1313
ms.collection:
@@ -21,6 +21,12 @@ ai-usage: human-only
2121

2222
# Troubleshoot Microsoft Defender Antivirus performance issues with Process Monitor
2323

24+
> [!TIP]
25+
> First, review common reasons for performance issues, such as high CPU usage. See **[Troubleshoot performance issues related to Microsoft Defender Antivirus real-time protection (rtp) or scans (scheduled or on-demand](/defender-endpoint/troubleshoot-performance-issues)**.
26+
> Then, run the **[Microsoft Defender Antivirus Performance Analyzer](/defender-endpoint/tune-performance-defender-antivirus)**This tool will help identify the cause of high CPU usage in Microsoft Defender Antivirus, whether it's the Antimalware Service Executable, the Microsoft Defender Antivirus service, or MsMpEng.exe.
27+
>If the Microsoft Defender Antivirus Performance Analyzer doesn't identify the root cause of the high CPU utilization, proceed with running **[Processor Monitor](/defender-endpoint/troubleshoot-av-performance-issues-with-procmon)**.
28+
>The final tool in your toolkit to run is [Windows Performance Recorder UI (WPRUI) or Windows Performance Recorded (WPR command-line)](/defender-endpoint/troubleshoot-av-performance-issues-with-wprui).
29+
2430
## Capture process logs using Process Monitor
2531

2632
Process Monitor (ProcMon) is an advanced monitoring tool that provides real-time data on processes. It can be used to capture performance issues, such as high CPU usage, and to monitor application compatibility scenarios as they occur.
@@ -33,9 +39,9 @@ There are two ways to capture a Process Monitor (ProcMon) trace:
3339

3440
### Using the MDE Client Analyzer
3541

36-
1. Download the [MDE Client Analyzer ](/defender-endpoint/download-client-analyzer).
42+
1. Download the [MDE Client Analyzer](/defender-endpoint/download-client-analyzer).
3743

38-
1. Run the MDE Client Analyzer using [Live Response or locally ](/defender-endpoint/run-analyzer-windows).
44+
1. Run the MDE Client Analyzer using [Live Response or locally](/defender-endpoint/run-analyzer-windows).
3945

4046
> [!TIP]
4147
> Before starting the trace, please make sure that the issue is reproducible. Additionally, close any applications that do not contribute to the reproduction of the issue.
@@ -50,84 +56,70 @@ There are two ways to capture a Process Monitor (ProcMon) trace:
5056

5157
1. Download [Process Monitor v3.89](/sysinternals/downloads/procmon) to a folder like `C:\temp`.
5258

53-
1. To remove the file's mark of the web:
59+
2. To remove the file's mark of the web:
5460

5561
1. Right-click **ProcessMonitor.zip** and select **Properties**.
56-
62+
5763
1. Under the *General* tab, look for *Security*.
58-
64+
5965
1. Check the box beside **Unblock**.
60-
66+
6167
1. Select **Apply**.
62-
68+
6369
![Screenshot showing the Remove MOTW page.](media/procmon-motw.png)
6470

65-
1. Unzip the file in `C:\temp` so that the folder path is `C:\temp\ProcessMonitor`.
71+
3. Unzip the file in `C:\temp` so that the folder path is `C:\temp\ProcessMonitor`.
6672

67-
1. Copy **ProcMon.exe** to the Windows client or Windows server you're troubleshooting.
73+
4. Copy **ProcMon.exe** to the Windows client or Windows server you're troubleshooting.
6874

69-
> [!TIP]
75+
> [!TIP]
7076
> Before running ProcMon, make sure all other applications not related to the high CPU usage issue are closed. Taking this step helps to minimize the number of processes to check.
7177
72-
1. You can launch ProcMon in two ways.
78+
5. You can launch ProcMon in two ways.
7379

7480
1. Right-click **ProcMon.exe** and select **Run as administrator**.
75-
76-
Since logging starts automatically, stop the capture by selecting the magnifying glass icon or pressing **Ctrl+E**.
77-
81+
82+
- Since logging starts automatically, stop the capture by selecting the magnifying glass icon or pressing **Ctrl+E**.
83+
7884
![Screenshot showing the magnifying glass icon.](media/procmon-magglass.png)
79-
80-
To confirm the capture has stopped, look for a red X on the magnifying glass icon.
81-
85+
86+
2. To confirm the capture has stopped, look for a red X on the magnifying glass icon.
87+
8288
![Screenshot showing a red slash.](media/procmon-magglass-stop.png)
83-
84-
Next, to clear the earlier capture, select the eraser icon.
85-
86-
![Screenshot showing the clear icon](media/procmon-eraser-clear.png)
87-
88-
Or use the keyboard shortcut **Ctrl+X**.
89-
90-
1. Run the **command line** as admin, then from the Process Monitor path, run:
91-
89+
![Screenshot showing the clear icon.](media/procmon-eraser-clear.png)
90+
91+
3. Run the **command line** as admin, then from the Process Monitor path, run:
92+
9293
![Screenshot showing the cmd procmon.](media/cmd-procmon.png)
93-
94-
ConsoleEdit development language
95-
96-
97-
```
98-
Procmon.exe /AcceptEula /Noconnect /Profiling
99-
```
100-
94+
10195
> [!TIP]
10296
> Make the ProcMon window as small as possible when capturing data so you can easily start and stop the trace.
103-
104-
![Screenshot showing the page with Procmon minimized.](media/procmon-minimize.png)
105-
106-
1. After completing step 6, set filters by selecting **OK**. You can filter the results after the capture is complete.
97+
> ![Screenshot showing the page with Procmon minimized.](media/procmon-minimize.png)
98+
99+
6. After completing step 6, set filters by selecting **OK**. You can filter the results after the capture is complete.
107100

108101
![Screenshot showing the page where System Exclude is chosen as the Filter out Process Name.](media/procmon-filter-options.png)
109102

110-
1. To start the capture, select the magnifying glass icon again.
103+
7. To start the capture, select the magnifying glass icon again.
111104

112-
1. Reproduce the problem.
105+
8. Reproduce the problem.
113106

114-
> [!TIP]
107+
> [!TIP]
115108
> Wait for the problem to be reproduced, then note the timestamp when the trace begins.
116109
117-
1. After capturing two to four minutes of process activity during high CPU usage, stop the capture by clicking the magnifying glass icon.
110+
9. After capturing two to four minutes of process activity during high CPU usage, stop the capture by clicking the magnifying glass icon.
118111

119-
1. To save the capture with a unique name in the `.pml` format, go to **File** then click **Save...**. Ensure you select the radio buttons **All events** and **Native Process Monitor Format (PML)**.
112+
10. To save the capture with a unique name in the `.pml` format, go to **File** then click **Save...**. Ensure you select the radio buttons **All events** and **Native Process Monitor Format (PML)**.
120113

121-
![Screenshot showing the save settings page](media/procmon-savesettings1.png)
114+
![Screenshot showing the save settings page.](media/procmon-savesettings1.png)
122115

123-
1. For better tracking, change the default path from `C:\temp\ProcessMonitor\LogFile.PML` to `C:\temp\ProcessMonitor\%ComputerName%_LogFile_MMDDYEAR_Repro_of_issue.PML` where:
116+
11. For better tracking, change the default path from `C:\temp\ProcessMonitor\LogFile.PML` to `C:\temp\ProcessMonitor\%ComputerName%_LogFile_MMDDYEAR_Repro_of_issue.PML` where:
124117

125118
- `%ComputerName%` is the device name
126119
- `MMDDYEAR` is the month, day, and year
127120
- `Repro_of_issue` is the name of the issue you're trying to reproduce
128-
129-
> [!TIP]
130-
> If you have a working system, you might want to get a sample log to compare.
131121

132-
1. Zip the `.pml` file and submit it to Microsoft Support.
122+
> [!TIP]
123+
> If you have a working system, you might want to get a sample log to compare.
133124
125+
12. Zip the `.pml` file and submit it to Microsoft Support.
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
---
2+
title: Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated
3+
description: Learn how to troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated.
4+
author: emmwalshh
5+
ms.author: ewalsh
6+
manager: ewalsh
7+
ms.date: 01/10/2025
8+
ms.topic: troubleshooting
9+
ms.service: defender-endpoint
10+
ms.subservice: ngp
11+
ms.localizationpriority: medium
12+
ms.collection: # Useful for querying on a set of strategic or high-priority content.
13+
ms.custom:
14+
- partner-contribution
15+
ms.reviewer: ewalsh
16+
search.appverid: MET150
17+
f1.keywords: NOCSH
18+
audience: ITPro
19+
---
20+
21+
# Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated
22+
23+
**Applies to:**
24+
25+
- [Microsoft Defender XDR](/defender-xdr)
26+
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
27+
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
28+
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
29+
- Microsoft Defender Antivirus
30+
31+
## Symptom
32+
33+
When you update Microsoft Defender Antivirus security intelligence, you might see the error **Protection definition update failed**.
34+
35+
:::image type="content" source="media/protection-definition-update-failed.png" alt-text="Screenshot of Protection definition update failed.":::
36+
37+
These error codes might also appear:
38+
39+
- 0x8024402c
40+
- 0x80240022
41+
- 0X80004002
42+
- 0x80070422
43+
- 0x80072efd
44+
- 0x80070005
45+
- 0x80072f78
46+
- 0x80072ee2
47+
- 0x8007001B
48+
49+
The following screenshot shows the error **Signature Update failed**.
50+
51+
:::image type="content" source="media/signature-update-failed.png" alt-text="Screenshot showing signature update failed." lightbox="media/signature-update-failed.png":::
52+
53+
## Solution
54+
55+
1. Check the URLs required for the Security intelligence updates. You can get them via the firewall and/or proxy. See [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
56+
57+
1. Ensure that Microsoft Defender Antivirus (MDAV) is your primary antivirus. If you have a third-party antivirus that uses the Windows Security Center (WSC) API, it will disable MDAV. When MDAV is disabled, updates can't occur.
58+
59+
1. Given that MDAV is the primary antivirus and the services are running:
60+
61+
1. Check if updating Security Intelligence works when you manually download from [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware?](https://www.microsoft.com/wdsi/defenderupdates)
62+
63+
1. If so, try updating through the Microsoft Malware Protection Center (MMPC).
64+
65+
Run the following PowerShell command as an administrator.
66+
67+
```powershell
68+
& "${env:ProgramFiles}\Windows Defender\MpCmdRun.exe" -SignatureUpdate -MMPC
69+
```
70+
71+
1. If this command works, the issue might be that the Security intelligence [Fallback order](manage-protection-updates-microsoft-defender-antivirus.md#fallback-order) is set to a WSUS server without **Security intelligence** approved updates. Alternatively, the UNC share might be stale, or the Windows Update service might have issues.
72+
73+
1. To check the WSUS server that the machine goes to, review `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\WUServer (REG_SZ)`. Once you find the WUServer, check if that WSUS server has the MDAV security intelligence [(KB2267602 for MDAV and KB2461484 for SCEP)](microsoft-defender-antivirus-updates.md#security-intelligence-updates) approved.
74+
1. To check the UNC share, review [Manage how and where Microsoft Defender Antivirus receives updates](manage-protection-updates-microsoft-defender-antivirus.md#create-a-unc-share-for-security-intelligence-and-platform-updates).
75+
1. To check the status of the Windows Update service, review [Guidance for troubleshooting Windows Update issues](/troubleshoot/windows-client/installing-updates-features-roles/troubleshoot-windows-update-issues) and [Troubleshoot problems updating Windows](https://support.microsoft.com/windows/troubleshoot-problems-updating-windows-188c2b0f-10a7-d72f-65b8-32d177eb136c).

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 12/17/2024
11+
ms.date: 01/10/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,6 +39,10 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42+
## January 2025
43+
44+
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for iOS and Android version 4.2446 or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
45+
4246
## December 2024
4347

4448
- [Considerations for integrating non-Microsoft security services with Microsoft 365](mdo-integrate-security-service.md): Considerations and recommendations for deploying a defense-in-depth email security strategy using third-party security services.

defender-office-365/how-policies-and-protections-are-combined.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.
1818
ms.service: defender-office-365
1919
search.appverid: met150
20-
ms.date: 09/16/2024
20+
ms.date: 01/10/2025
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -186,8 +186,8 @@ Tenant allows and blocks are able to override some filtering stack verdicts as d
186186
|Not spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
187187

188188
- [Allow entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#allow-entries-in-the-tenant-allowblock-list): There are two types of allow entries:
189-
- Message level allow entries act on the entire message, regardless of the entities in the message. Allow entries for email address and domains are message level allow entries.
190-
- Entity level allow entries act on the filtering verdict of entities. Allow entries for URLs, spoofed senders, and files are entity level allow entries. To override malware and high confidence phishing verdicts, you need to use entity level allow entries, which you can create by submission only due to [Secure by default in Microsoft 365](secure-by-default.md).
189+
- **Message level** allow entries act on the entire message, regardless of the entities in the message. Allow entries for email address and domains are message level allow entries. These allow entries override bulk and spam verdicts, and high confidence phishing verdicts from machine learning models.
190+
- **Entity level** allow entries act on the filtering verdict of entities. Allow entries for URLs, spoofed senders, and files are entity level allow entries. To override malware and high confidence phishing verdicts, you need to use entity level allow entries, which you can create by submission only due to [Secure by default in Microsoft 365](secure-by-default.md).
191191

192192
|Filtering stack verdict|Email address/domain|
193193
|---|---|

0 commit comments

Comments
 (0)