Skip to content

Commit f9a5fc8

Browse files
Merge pull request #2816 from MicrosoftDocs/main
Publish main to live, 02/18/25, 3:30 PM PT
2 parents 011efb1 + 02e65e1 commit f9a5fc8

35 files changed

+103
-49
lines changed

defender-endpoint/linux-exclusions.md

Lines changed: 48 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/31/2025
18+
ms.date: 02/18/2025
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -52,7 +52,7 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
5252
5353
| Exclusion Category | Exclusion Scope | Description |
5454
| --- | --- | --- |
55-
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus (AV) scans and on-demand scans.|
55+
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus scans and on-demand scans.|
5656
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)* | Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
5757

5858
> [!IMPORTANT]
@@ -63,12 +63,12 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
6363

6464
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
6565

66-
Exclusion|Definition|Examples
67-
---|---|---
68-
File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`
69-
File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
70-
Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
71-
Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
66+
|Exclusion|Definition|Examples|
67+
|---|---|---|
68+
|File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test` |
69+
|File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log` |
70+
| Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/` |
71+
| Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t` |
7272

7373
> [!IMPORTANT]
7474
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
@@ -89,6 +89,8 @@ Wildcard|Description|Examples|
8989
9090
## How to configure the list of exclusions
9191

92+
You can configure exclusions using a management console, Defender for Endpoint security settings management, or the command line.
93+
9294
### Using the management console
9395

9496
To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.
@@ -140,6 +142,43 @@ To configure exclusions from Puppet, Ansible, or another management console, ple
140142

141143
For more information, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
142144

145+
### Using Defender for Endpoint security settings management
146+
147+
As a security administrator, you can configure Defender for Endpoint exclusions using the Microsoft Defender portal. This method is referred to as Defender for Endpoint security settings management. If you're using this method for the first time, make sure to complete the following procedures:
148+
149+
#### 1. Configure your tenant to support security settings management
150+
151+
1. In the [Microsoft Defender portal](https://security.microsoft.com), navigate to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**, and then select the Linux platform.
152+
153+
2. Tag devices with the `MDE-Management` tag. Most devices enroll and receive the policy within minutes, although some might take up to 24 hours. For more information, see [Learn how to use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune](/mem/intune/protect/mde-security-integration).
154+
155+
#### 2. Create a Microsoft Entra group
156+
157+
Create a dynamic Microsoft Entra group that uses the operating system type to ensure that all devices onboarded to Defender for Endpoint receive policies. Using a dynamic group allows devices managed by Defender for Endpoint to be automatically added to the group, eliminating the need for admins to create new policies manually. For more information, see the following articles:
158+
159+
- [Create Microsoft Entra Groups](/mem/intune/protect/mde-security-integration#create-microsoft-entra-groups)
160+
- [Microsoft Entra groups overview](/entra/fundamentals/concept-learn-about-groups)
161+
162+
#### 3. Create an endpoint security policy
163+
164+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Configuration management** > **Endpoint security policies**, and then select **Create new Policy**.
165+
166+
2. For Platform, select **Linux**.
167+
168+
3. Select the required exclusion template (**Microsoft defender global exclusion (AV+EDR) for global exclusions and Microsoft defender antivirus exclusions for antivirus exclusions**), and then select **Create policy**.
169+
170+
4. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
171+
172+
5. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
173+
174+
6. When you're done configuring settings, select **Next**.
175+
176+
7. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
177+
178+
8. On the **Review + create** page, when you're done, select **Save**. The new profile is displayed in the list when you select the policy type for the profile you created.
179+
180+
For more information refer: [Manage endpoint security policies in Microsoft Defender for Endpoint](/defender-endpoint/manage-security-policies#create-an-endpoint-security-policy).
181+
143182
### Using the command line
144183

145184
Run the following command to see the available switches for managing exclusions:
@@ -157,7 +196,7 @@ mdatp exclusion
157196
158197
Examples:
159198

160-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
199+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)*:
161200

162201
```bash
163202
mdatp exclusion extension add --name .txt

defender-endpoint/mac-whatsnew.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,19 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
6464

6565
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
6666

67+
### Feb-2025 (Build: 101.24122.0011 | Release version: 20.124122.11.0)
68+
69+
| Build: | **101.24122.0011** |
70+
|--------------------|-----------------------|
71+
| Release version: | **20.124122.11.0** |
72+
| Engine version: | **1.1.24080.11** |
73+
| Signature version: | **1.419.351.0** |
74+
75+
##### What's new
76+
77+
- Fixed an issue with the auth prompt during new installation on macOS with multiple active users
78+
- Improved stability when using the antivirus engine in passive mode
79+
6780
### Jan-2025 (Build: 101.24122.0005 | Release version: 20.124122.5.0)
6881

6982
| Build: | **101.24122.0005** |

defender-endpoint/web-content-filtering.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Use web content filtering in Microsoft Defender for Endpoint to tra
44
ms.service: defender-endpoint
55
ms.author: deniseb
66
author: denisebmsft
7-
ms.reviewer: tdoucett
7+
ms.reviewer: ericlaw
88
ms.localizationpriority: medium
9-
ms.date: 02/10/2025
9+
ms.date: 02/18/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -59,7 +59,7 @@ Before trying out this feature, make sure you meet the requirements described in
5959
| Requirement | Description |
6060
|:---|:---|
6161
| Subscription | Your subscription must include one of the following plans:<br/>- [Windows 10/11 Enterprise E5](/windows/deployment/deploy-enterprise-licenses)<br/>- [Microsoft 365 E5](https://www.microsoft.com/microsoft-365/enterprise/e5?activetab=pivot%3aoverviewtab)<br/>- Microsoft 365 A5<br/>- Microsoft 365 E5 Security<br/>- [Microsoft 365 E3](https://www.microsoft.com/microsoft-365/enterprise/e3?activetab=pivot%3aoverviewtab)<br/>- [Microsoft Defender for Endpoint Plan 1 or Plan 2](/defender-xdr/eval-defender-endpoint-overview)<br/>- [Microsoft Defender for Business](/defender-business/mdb-overview)<br/>- [Microsoft 365 Business Premium](https://www.microsoft.com/microsoft-365/business/microsoft-365-business-premium)|
62-
| Portal access | You must have access to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>. |
62+
| Portal access | You must have access to the [Microsoft Defender portal](https://security.microsoft.com). |
6363
| Operating system | Your organization's devices must be running one of the following operating systems with the [latest antivirus/antimalware updates](microsoft-defender-antivirus-updates.md): <br/>- Windows 11<br/>- Windows 10 Anniversary Update (version 1607) or later <br/>- For information on macOS availability, see [Network Protection for macOS](network-protection-macos.md)<br/>- For information on Linux availability, see [Network Protection for Linux](network-protection-linux.md)|
6464
| Browser | Your organization's devices must be running one of the following browsers: <br/>- Microsoft Edge<br/>- Google Chrome<br/>- Mozilla FireFox<br/>- Brave<br/>- Opera<br/>- Internet Explorer|
6565
| Related protection | [Windows Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) and [network protection](network-protection.md) must be enabled on your organization's devices. |
@@ -81,7 +81,7 @@ The result is that categories 1-4 are all blocked, as illustrated in the followi
8181

8282
## Turn on web content filtering
8383

84-
1. Go to the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a> and sign in.
84+
1. Go to the [Microsoft Defender portal](https://security.microsoft.com) and sign in.
8585

8686
2. In the navigation pane, select **Settings** \> **Endpoints** \> **General** \> **Advanced Features**.
8787

@@ -110,7 +110,7 @@ Policies can be deployed to block any of the following parent or child categorie
110110

111111
To add a new policy, follow these steps:
112112

113-
1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, choose **Settings** > **Endpoints** > **Web content filtering** > **+ Add policy**.
113+
1. In the [Microsoft Defender portal](https://security.microsoft.com), choose **Settings** > **Endpoints** > **Web content filtering** > **+ Add policy**.
114114

115115
2. Specify a name.
116116

@@ -143,7 +143,7 @@ It's possible to override the blocked category in web content filtering to allow
143143

144144
To define a custom indicator, follow these steps:
145145

146-
1. In the <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender portal</a>, go to **Settings** \> **Endpoints** \> **Indicators** \> **URL/Domain** \> **Add Item**.
146+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** \> **Endpoints** \> **Indicators** \> **URL/Domain** \> **Add Item**.
147147

148148
2. Enter the domain of the site.
149149

@@ -189,7 +189,7 @@ You can access the **Report details** for each card by selecting a table row or
189189

190190
- **Web categories**: Lists the web content categories that have had access attempts in your organization. Select a specific category to open a summary flyout.
191191

192-
- **Domains**: Lists the web domains that have been accessed or blocked in your organization. Select a specific domain to view detailed information about that domain.
192+
- **Domains**: Lists the web domains that have been accessed or blocked in your organization.
193193

194194
- **Device groups**: Lists all the device groups that have generated web activity in your organization
195195

@@ -208,4 +208,5 @@ If you are using Microsoft 365 Business Premium or Microsoft Defender for Busine
208208
- [Monitor web security](web-protection-monitoring.md)
209209
- [Respond to web threats](web-protection-response.md)
210210
- [Requirements for Network Protection](web-content-filtering.md)
211+
211212
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-office-365/submissions-outlook-report-messages.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
description: Learn how to report phishing and suspicious emails in supported versions of Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
1515
ms.service: defender-office-365
1616
search.appverid: met150
17-
ms.date: 02/12/2025
17+
ms.date: 02/18/2025
1818
appliesto:
1919
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -47,7 +47,8 @@ Admins configure user reported messages to go to a specified reporting mailbox,
4747
- **Semi-Annual Channel (Preview)**: Release 2502, build 16.0.18526.20024 or later.
4848
- **Semi-Annual Channel**: Release 2502, build 16.0.18526.20024 or later.
4949
- Outlook for Mac version 16.89 (24090815) or later.
50-
- Outlook for iOS and Android version 4.2446 or later.
50+
- Outlook for iOS version 4.2508 or later.
51+
- Outlook for Android version 4.2446 or later.
5152
- The new Outlook for Windows.
5253
- Outlook on the web.
5354

defender-xdr/automatic-attack-disruption.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Automatic attack disruption uses Microsoft-based XDR response actions. Examples
6868
- [Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution. The disable user action behaves differently depending on how the user is hosted in your environment.
6969
- When the user account is hosted in Active Directory: Defender for Identity triggers the disable user action on domain controllers running the Defender for Identity agent.
7070
- When the user account is hosted in Active Directory and is synced on Microsoft Entra ID: Defender for Identity triggers the disable user action via onboarded domain controllers. Attack disruption also disables the user account on the Entra ID synced account.
71-
- When the user account is hosted in Entra ID only (cloud native account): attack disruption disable the user account on the Entra ID synced account.
71+
- When the user account is hosted in Entra ID only (cloud native account): attack disruption disables the user account on the Entra ID synced account.
7272

7373
> [!NOTE]
7474
> Disabling the user account in Microsoft Entra ID is not dependent on the deployment of Microsoft Defender for Identity.
@@ -79,18 +79,18 @@ For more information, see [remediation actions](m365d-remediation-actions.md) in
7979

8080
### Automated response actions for SAP with Microsoft Sentinel
8181

82-
If you're using the [unified security operations platform](/unified-secops-platform/microsoft-sentinel-onboard) and you deployed the Microsoft Sentinel solution for SAP applications, you can also deploy automatic attack disruption for SAP.
82+
If you [onboarded Microsoft Sentinel to the Defender portal](microsoft-sentinel-onboard.md) and deployed the Microsoft Sentinel solution for SAP applications, you can also deploy automatic attack disruption for SAP.
8383

84-
For example, deploy attack disruption for SAP to contain compromised assets by locking suspicious SAP users in case of a financial process manipulation attack.
84+
For example, deploy attack disruption for SAP to contain compromised assets by locking suspicious SAP users in case of a financial process manipulation attack.
8585

86-
After the risk is mitigated, Microsoft Defender admins can manually unlock the users that had been automatically locked by the attack disruption response. The ability to manually unlock users is available from the Microsoft Defender action center, and only for users that were locked by attack disruption.
86+
After the risk is mitigated, Microsoft Defender admins can manually unlock the users that had been automatically locked by the attack disruption response. The ability to manually unlock users is available from the Microsoft Defender action center, and only for users that were locked by attack disruption.
8787

8888
To use attack disruption for SAP, deploy a new data connector agent, or make sure that your agent is using version 90847355 or higher, and then assign and apply the required Azure and SAP roles. For more information, see:
8989

9090
- [Deploy and configure the container hosting the SAP data connector agent](/azure/sentinel/sap/deploy-data-connector-agent-container)
9191
- [Update Microsoft Sentinel's SAP data connector agent](/azure/sentinel/sap/update-sap-data-connector), especially [Update your system for automatic attack disruption](/azure/sentinel/sap/update-sap-data-connector#update-your-data-connector-agent-for-attack-disruption).
9292

93-
While you configure attack disruption in the Azure portal and your SAP system, automatic attack disruption itself surfaces only in the unified security operations platform in the Microsoft Defender portal.
93+
While you configure attack disruption in the Azure portal and your SAP system, automatic attack disruption itself surfaces only in the Microsoft Defender portal.
9494

9595
## Identify when an attack disruption happens in your environment
9696

defender-xdr/data-privacy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ Customer data stored by integrated services might also be stored in the followin
5656

5757
Microsoft Defender XDR data is retained for 180 days, and is visible across the Microsoft Defender portal during that time, except for in **Advanced hunting** queries.
5858

59-
In the Microsoft Defender portal's **Advanced hunting** page, data is accessible via queries for only 30 days, unless it's streamed through [Microsoft's unified security operations platform with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration?toc=%2Fdefender-xdr%2Ftoc.json&bc=%2Fdefender-xdr%2Fbreadcrumb%2Ftoc.json&tabs=defender-portal), where retention periods may be longer.
59+
In the Microsoft Defender portal's **Advanced hunting** page, data is accessible via queries for only 30 days, unless it's streamed through [Microsoft Sentinel with Microsoft's unified security operations platform](/azure/sentinel/microsoft-365-defender-sentinel-integration?toc=%2Fdefender-xdr%2Ftoc.json&bc=%2Fdefender-xdr%2Fbreadcrumb%2Ftoc.json&tabs=defender-portal), where retention periods may be longer.
6060

6161
Data continues to be retained and visible, even when a license is under a grace period or in suspended mode. At the end of any grace period or suspension, and no later than 180 days from a contract termination or expiration, data is deleted from Microsoft's systems and is unrecoverable.
6262

0 commit comments

Comments
 (0)