Skip to content

Commit ffa7805

Browse files
Merge pull request #4994 from MicrosoftDocs/main
[AutoPublish] main to live - 09/10 07:31 PDT | 09/10 20:01 IST
2 parents 3aa3822 + 1b510d8 commit ffa7805

File tree

4 files changed

+36
-1
lines changed

4 files changed

+36
-1
lines changed

ATPDocs/whats-new.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,18 @@ For updates about versions and features released six months ago or earlier, see
2525

2626
## September 2025
2727

28+
### New API support for unified agent
29+
We are excited to announce the availability of a new Graph-based API for managing unified agent server actions in Microsoft Defender for Identity.
30+
This capability is currently in preview and available in API Beta version.
31+
32+
This API allows customers to:
33+
34+
* Monitor the status of unified agent servers
35+
* Enable or disable the automatic activation of eligible servers
36+
* Activate or deactivate the agent on eligible servers
37+
38+
For more information, see [Managing response actions through Graph API](/graph/api/resources/security-api-overview?view=graph-rest-beta).
39+
2840
### Microsoft Defender for Identity sensor version updates
2941

3042
|Version number |Updates |

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,13 @@ This article provides information on inaccuracies that have been reported. You c
3333
3434
The following tables present the relevant vulnerability information organized by month.
3535

36+
## September 2025
37+
38+
| Inaccuracy report ID | Description | Fix date |
39+
|---|---|---|
40+
| - | Added MDVM support for Zoom vulnerability- CVE-2025-49457 | 03-September-25 |
41+
| - | Added MDVM support for 8 Tableau Server vulnerabilities- CVE-2025-52446, CVE-2025-52447, CVE-2025-52448, CVE-2025-52449, CVE-2025-52452, CVE-2025-52453, CVE-2025-52454 and CVE-2025-52455 | 09-September-25 |
42+
3643
## August 2025
3744

3845
| Inaccuracy report ID | Description | Fix date |
@@ -50,6 +57,15 @@ The following tables present the relevant vulnerability information organized by
5057
| 109858 | Fixed inaccuracy in Microsoft SQL Server Management Studio vulnerability- CVE-2025-29803 | 21-August-25 |
5158
| - | Updated CPE detection logic for Cisco Identity Services Engine | 26-August-25 |
5259
| - | Fixed inaccuracy in VMware Fusion vulnerability- CVE-2025-41236 | 26-August-25 |
60+
| 105343 | Fixed bad normalization in Elasticsearch Enterprise Search | 26-August-25 |
61+
| - | Fixed Publisher data to improve accuracy for pgAdmin | 26-August-25 |
62+
| 111784 | Added MDVM support for BambuLab Bambu Studio | 26-August-25 |
63+
| - | Fixed bad normalization in Microsoft Excel | 26-August-25 |
64+
| 110983 | Added MDVM support for Sigmatek Sigmanest | 26-August-25 |
65+
| 110984 | Added MDVM support for Sigmatek License Server | 26-August-25 |
66+
| - | Added MDVM support for Microsoft Privilege Management For Windows | 26-August-25 |
67+
| - | Improved accuracy for Dell SupportAssistOSRecovery | 26-August-25 |
68+
| - | Updated CVE-2025-55229, CVE-2025-55230 and CVE-2025-55231 with accurate vulnerability details | 28-August-25 |
5369

5470
## July 2025
5571

exposure-management/classify-critical-assets.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlanger
66
manager: ornat-spodek
77
ms.topic: overview
88
ms.service: exposure-management
9-
ms.date: 07/23/2025
9+
ms.date: 09/08/2025
1010
---
1111

1212
# Review and classify critical assets
@@ -34,6 +34,9 @@ Impact analysis and crown jewels analysis are essential methodologies for identi
3434

3535
The NIST Cybersecurity Framework (CSF) 800-53 also emphasizes guidance for asset management and criticality analysis, as outlined in ID.AM-05, which can be found at: [https://csf.tools/reference/nist-cybersecurity-framework/v2-0/id/id-am/id-am-05/](https://csf.tools/reference/nist-cybersecurity-framework/v2-0/id/id-am/id-am-05/).
3636

37+
> [!NOTE]
38+
> When multiple classification rules apply to an asset, the rule with the highest criticality level takes precedence. This classification remains in effect until the asset no longer meets the criteria for that rule, at which point it will automatically revert to the next applicable classification level.
39+
3740
## Prerequisites
3841

3942
Before you begin, ensure you meet the following requirements for working with critical assets in Microsoft Security Exposure Management.

exposure-management/predefined-classification-rules-and-levels.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,10 @@ Current asset types are:
2525

2626
> [!Note]
2727
> The critical asset out-of-the-box classification logic classifies your assets based on asset behavior accumulated from Microsoft Defender workloads and third-party integrations set up in your environment.
28+
>
29+
> When multiple classification rules apply to an asset, the rule with the highest criticality level takes precedence. This classification remains in effect until the asset no longer meets the criteria for that rule, at which point it will automatically revert to the next applicable classification level.
30+
31+
2832

2933
##### Device
3034

0 commit comments

Comments
 (0)