<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>rss.livelink.threads-in-node</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ct-p/microsoft-defender-for-endpoint</link>
    <description>rss.livelink.threads-in-node</description>
    <pubDate>Wed, 29 Apr 2026 23:41:32 GMT</pubDate>
    <dc:creator>microsoft-defender-for-endpoint</dc:creator>
    <dc:date>2026-04-29T23:41:32Z</dc:date>
    <item>
      <title>Assess Secure Boot status with Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/assess-secure-boot-status-with-microsoft-defender/ba-p/4510356</link>
      <description>&lt;H4&gt;&lt;STRONG&gt;Understanding the Secure Boot certificate challenge&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Secure Boot is a foundational security feature that validates the integrity of your device's boot process, ensuring only trusted software can run during system startup. This protection has been quietly defending enterprise devices since 2012, but the original 2011 certificates that enable this trust are approaching their expiration date.&lt;/P&gt;
&lt;P&gt;When certificates expire in June 2026, devices that haven't transitioned to the new Windows UEFI CA 2023 certificates will no longer be able to receive new security protections for the early boot process. While these devices will continue to boot, they may no longer be able to receive or enforce new protections at the earliest stages of system startup. Over time, this can weaken the device’s root of trust and expose it to classes of attacks that operate before the operating system and security controls are fully loaded:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Malicious or tampered boot components may no longer be reliably blocked if they are not signed with trusted certificates&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Devices may be unable to adopt future Secure Boot policy updates designed to mitigate newly discovered boot-level threats&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Attackers may attempt to leverage boot-level persistence techniques that operate below the visibility of traditional security controls&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;As new vulnerabilities and protections are introduced, devices that are not updated will gradually fall behind in their ability to enforce trust at boot, but the challenge isn’t just knowing that this transition needs to happen, it’s understanding which devices in your fleet have successfully completed the update and which still require attention.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Introducing Secure Boot 2023 certificate assessment&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;A new recommendation in Defender allows you to ensure that devices are updated to Secure Boot 2023 certificates and boot manager, providing a centralized, at-scale view of Secure Boot certificate readiness across your environment.&lt;/P&gt;
&lt;P&gt;This assessment automatically categorizes your devices into:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Exposed devices&lt;/STRONG&gt;: Still trusting older Secure Boot certificates without trust for newer Secure Boot certificates&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Compliant devices&lt;/STRONG&gt;: Successfully relying on the 2023 certificates and signed boot manager&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Not applicable devices&lt;/STRONG&gt;: Systems where Secure Boot is disabled or not supported&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;From the recommendation view, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Drill down into exposed devices and identify exactly which systems require attention&lt;/LI&gt;
&lt;LI&gt;Filter by OS platform and device context to prioritize remediation efforts&lt;/LI&gt;
&lt;LI&gt;Export device data to share with infrastructure and platform teams&lt;/LI&gt;
&lt;LI&gt;Track rollout progress across your organization&lt;/LI&gt;
&lt;LI&gt;Integrate findings into existing security posture workflows&lt;/LI&gt;
&lt;/UL&gt;
&lt;img&gt;[Secure Boot 2023 recommendation in MDE portal showing deployment status across the fleet]&lt;/img&gt;
&lt;H4&gt;&lt;STRONG&gt;Take action on your Secure Boot readiness&lt;BR /&gt;&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;To access this tool in the Defender portal, navigate to Exposure Management → Recommendations → Devices → Misconfigurations. Once Defender identifies exposed devices, it provides remediation guidance.&lt;/P&gt;
&lt;P&gt;For detailed deployment guidance, including enterprise rollout strategies and validation practices, see: &lt;A href="https://aka.ms/GetSecureBoot" target="_blank" rel="noopener"&gt;https://aka.ms/GetSecureBoot&lt;/A&gt;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Your action plan&lt;/STRONG&gt;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Assess your exposure&lt;/STRONG&gt;&lt;BR /&gt;Navigate to the tool to understand how many devices in your environment require updates.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Engage the right teams&lt;/STRONG&gt;&lt;BR /&gt;Secure Boot certificate deployment is typically owned by infrastructure and platform teams, so coordinate across your organization.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Prioritize high-value assets&lt;/STRONG&gt;&lt;BR /&gt;Focus remediation efforts on critical devices and sensitive environments first.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Track progress over time&lt;/STRONG&gt;&lt;BR /&gt;Monitor rollout progress and ensure coverage improves ahead of the June 2026 deadline.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Visit the comprehensive Secure Boot guidance at&amp;nbsp;&lt;A href="https://aka.ms/GetSecureBoot" target="_blank" rel="noopener"&gt;https://aka.ms/GetSecureBoot&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn more about&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/defender-vulnerability-management/tvm-microsoft-secure-score-devices?tabs=preview-customers" target="_blank" rel="noopener"&gt;Microsoft Secure Score for Devices in Microsoft Defender for Endpoint&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;To learn more about endpoint protection with Microsoft Defender, check out our&amp;nbsp;&lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;website&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To learn more about Microsoft Security solutions, visit our &lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;website.&lt;/A&gt; Bookmark the &lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;Security blog&lt;/A&gt; to keep up with our expert coverage on security matters. Follow us on LinkedIn (&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;Microsoft Security&lt;/A&gt;) and X (&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;@MSFTSecurity&lt;/A&gt;) for the latest news and updates on cybersecurity.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 27 Apr 2026 16:38:22 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/assess-secure-boot-status-with-microsoft-defender/ba-p/4510356</guid>
      <dc:creator>amitcohen</dc:creator>
      <dc:date>2026-04-27T16:38:22Z</dc:date>
    </item>
    <item>
      <title>Introducing effective settings: See security configurations enforced on your device</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-effective-settings-see-security-configurations/ba-p/4499551</link>
      <description>&lt;H4&gt;See exactly which security configurations are enforced on your device&lt;/H4&gt;
&lt;P&gt;Security teams spend significant time defining policies for Microsoft Defender security settings. But when it comes to investigations or troubleshooting, the real question is often simple: &lt;EM&gt;what is currently being enforced on this device?&lt;/EM&gt; Today, we’re excited to share that the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/investigate-machines?wt.mc_id=MVP_452337#configuration-management---effective-settings" target="_blank" rel="noopener"&gt;settings experience&lt;/A&gt; is now generally available in Defender to provide this critical visibility.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure #1: Effective settings tab on the device page&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;From intended policy to real-world enforcement&lt;/H4&gt;
&lt;P&gt;Understanding device security posture sometimes means correlating policy intent across multiple management sources, including Intune, Group Policy Object (GPO), and local admin configurations. With effective settings, administrators can see the &lt;EM&gt;effective value&lt;/EM&gt; of each security setting on a specific device—along with the configuration source—and quickly identify configuration attempts that didn’t take effect. This helps eliminate silent gaps where intended protections are not actually enforced, reducing the risk of unnoticed exposure during incidents or active attacks. And this shift from intent to reality helps teams move faster when validating posture, investigating incidents, or resolving conflicts between management tools.&lt;/P&gt;
&lt;H4&gt;A new view on the device page&lt;/H4&gt;
&lt;P&gt;The effective settings tab is available as a new tab under the &lt;STRONG&gt;configuration management&lt;/STRONG&gt; tab on the device page. From this single location, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;View the &lt;STRONG&gt;actual value&lt;/STRONG&gt; enforced for each security setting&lt;/LI&gt;
&lt;LI&gt;Identify the &lt;STRONG&gt;configuring source&lt;/STRONG&gt; responsible for that value&lt;/LI&gt;
&lt;LI&gt;See &lt;STRONG&gt;additional configuration attempts&lt;/STRONG&gt; from other sources that were evaluated but not applied&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For complex or layered scenarios such as Microsoft Defender Antivirus exclusions and Attack Surface Reduction (ASR) rules, all configured rules are shown together with their effective value, configuring source, and additional configuration attempts&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This makes it far simpler to understand why a device behaves the way it does, without jumping between consoles or guessing which policy “won.”&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure #2: Simple settings side panel&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt;Figure #3: Complex settings side panel&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;Practical use cases&lt;/H4&gt;
&lt;P&gt;Security admins and analysts can use &lt;STRONG&gt;effective settings&lt;/STRONG&gt; for use cases like:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validating enforcement&lt;/STRONG&gt; – Confirm that intended security configurations are truly applied on devices&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Troubleshooting conflicts&lt;/STRONG&gt; – Quickly spot competing policies or management sources that prevented a configuration from being enforced&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improving operational confidence&lt;/STRONG&gt; – Reduce uncertainty by relying on an authoritative, device-level view of security settings&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Platform support and what’s next&lt;/H4&gt;
&lt;P&gt;The current release focuses on &lt;STRONG&gt;Windows platform antivirus security settings&lt;/STRONG&gt;, including ASR rules and exclusions. This is just the beginning. Our roadmap includes expanding coverage across additional platforms, and a broader set of security settings configured through the Microsoft 365 Defender and Intune portals.&lt;/P&gt;
&lt;H4&gt;Getting started&lt;/H4&gt;
&lt;P&gt;If you’re using Microsoft Defender for Endpoint, head to a device page and open the &lt;STRONG&gt;configuration management → effective settings&lt;/STRONG&gt; tab to explore the experience firsthand.&lt;/P&gt;
&lt;P&gt;Supported versions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Defender for Endpoint Sense client: 10.8735.26018.1000 or later&lt;/LI&gt;
&lt;LI&gt;Microsoft Defender Antivirus platform: 4.18.25010.11 (January 2025 release) or later&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Learn more&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/investigate-machines?wt.mc_id=MVP_452337#configuration-management---effective-settings" target="_blank" rel="noopener"&gt;Learn more about investigating devices in Defender&lt;/A&gt;. To get started, navigate to a device page and open the &lt;STRONG&gt;configuration management → effective settings&lt;/STRONG&gt; tab.&lt;/LI&gt;
&lt;LI&gt;To learn more about Microsoft Defender endpoint protection, check out our&amp;nbsp;&lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;website&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To learn more about Microsoft Security solutions, visit our &lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;website.&lt;/A&gt; Bookmark the &lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;Security blog&lt;/A&gt; to keep up with our expert coverage on security matters. Follow us on LinkedIn (&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;Microsoft Security&lt;/A&gt;) and X (&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;@MSFTSecurity&lt;/A&gt;) for the latest news and updates on cybersecurity.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 09 Mar 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-effective-settings-see-security-configurations/ba-p/4499551</guid>
      <dc:creator>ArielMichaeli1</dc:creator>
      <dc:date>2026-03-09T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Transparent and customizable onboarding for modern and legacy Windows devices</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/transparent-and-customizable-onboarding-for-modern-and-legacy/ba-p/4498827</link>
      <description>&lt;P&gt;Onboarding all devices in your estate is paramount for strong security posture. In fact, Microsoft Threat Intelligence research shows that in the majority of ransomware attacks, the spreader machine was a device that was not yet onboarded. But customers often struggle to follow complex steps that differ by OS, accidentally duplicate devices because they can’t tell whether onboarding is in progress or failed, or have incorrect initial configuration settings causing system incompatibility. That’s why we’re introducing an updated onboarding experience via the Defender deployment tool for Windows that improves progress visibility and adds controls—like package naming and configurable expiry—to help administrators manage onboarding securely at scale.&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;What’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;new&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;The&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;Defender deployment tool streamlines&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;the onboarding process&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;by&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;dynamically adapt&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ing&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;to the operating system, delivering healthy endpoint security to a diverse&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;estate&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;of Windows devices.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;It&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;is the preferred automated solution&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;that works on&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;modern and legacy devices&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;and&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;removes the need for a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;separate onboarding&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;file by embed&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ding the onboarding&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;package and all related information within a downloadable&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;exe&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;that&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;can be run to onboard devices.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;This &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;updated experience&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;makes&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;onboarding more predictable and transparent, while adding administrative controls that help reduce exposure if onboarding packages are accidentally shared beyond your organization&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;A&amp;nbsp;single, runnable&amp;nbsp;.exe&amp;nbsp;for onboarding&amp;nbsp;with&amp;nbsp;the onboarding information&amp;nbsp;embedded&amp;nbsp;(no separate onboarding file&amp;nbsp;required)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Silent and non-interactive onboarding&amp;nbsp;options&amp;nbsp;to support large-scale deployments with tools like Group Policy or Configuration Manager&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Custom package identifiers&amp;nbsp;to&amp;nbsp;help track and manage onboarding packages across your organization&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Configurable onboarding package expiry (up to one year)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Customizable name identifiers and keys for increased control and visibility&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;New portal entry points and guidance to make it easier to find the right onboarding and offboarding method for Windows, including&amp;nbsp;directly from the device inventory page&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;The new, streamlined onboarding tab in the Defender portal&lt;/img&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Customize your deployment package&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This experience moves away from using scripts and loose blobs, making it more difficult for onboarding to take place at the hands of unauthorized users and significantly decreasing security issues related to blobs in the wild that don't expire. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;And&amp;nbsp;for the first time, you can set custom expiry&amp;nbsp;dates&amp;nbsp;on onboarding packages&amp;nbsp;for 1 day, 7 days, or a custom amount up to a year.&amp;nbsp;Expiry for onboarding packages protects customers from unwanted onboarding and compliance issues, limiting packages from getting misused if&amp;nbsp;they’re&amp;nbsp;found in a public place. Expiry reduces the likelihood of unauthorized package usage, together with the new portal-provided key that you must input to complete the onboarding process.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Customize your deployment package with a name and expiry date&lt;/img&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;See your onboarding telemetry in detail&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Deployment tool events are available in the device timeline and advanced hunting tabs for increased transparency into onboarding progress and errors, so you can quickly address any issues.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;On&amp;nbsp;the new deployment packages page, you can see your organization's onboarding packages&amp;nbsp;at a glance&amp;nbsp;and&amp;nbsp;click to see more package properties, increasing visibility and traceability within the onboarding process. This is&amp;nbsp;a great foundation for adding even more onboarding-related telemetry to view per device in the future. You can even&amp;nbsp;filter by&amp;nbsp;active or expired packages and hide packages you no longer&amp;nbsp;wish&amp;nbsp;to see.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;The new deployment packages page in the Defender portal&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To experience this next iteration of the Defender deployment tool for Windows, navigate to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Settings &amp;gt; Endpoints &amp;gt; Onboarding &amp;gt; Windows&lt;/STRONG&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;or jump there directly from the device inventory page. There you'll see the newly designed onboarding page in the Defender portal, complete with on/offboarding guides. Select the Defender deployment tool from the options shown.&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;New onboarding and offboarding buttons on the device inventory page&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;The Defender deployment tool is also available for Linux. We look forward continuing to share ways we're making it easier to onboard devices to Defender.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Learn more&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/defender-deployment-tool-windows" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Deploy Microsoft Defender endpoint security to Windows devices using the Defender deployment tool (preview) - Microsoft Defender for Endpoint | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/linux-install-with-defender-deployment-tool" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Deploy Microsoft Defender endpoint security to Linux devices using the Defender deployment tool (preview) - Microsoft Defender for Endpoint | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about Microsoft Defender's endpoint protection, check out&amp;nbsp;our &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about Microsoft Security solutions, visit our&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Bookmark the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;https://www.microsoft.com/security/blog/&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to keep up with our expert coverage on security matters. Follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;https://www.linkedin.com/showcase/microsoft-security/&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;https://twitter.com/@MSFTSecurity&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 03 Mar 2026 03:25:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/transparent-and-customizable-onboarding-for-modern-and-legacy/ba-p/4498827</guid>
      <dc:creator>Sinclaire_Hamilton</dc:creator>
      <dc:date>2026-03-03T03:25:40Z</dc:date>
    </item>
    <item>
      <title>Introducing library management in Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-library-management-in-microsoft-defender/ba-p/4494434</link>
      <description>&lt;P&gt;In dynamic investigation environments, preparation and agility are key. Security analysts working with live response in Microsoft Defender often rely on scripts and tools to triage, investigate, and remediate threats. Until now, these assets had to be uploaded during active sessions, limiting manageability and increasing time to action.&lt;/P&gt;
&lt;P&gt;Recognizing the need for better readiness and control, Defender now introduces a more proactive and efficient way to manage these assets: &lt;STRONG&gt;library management&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The new library management experience in Defender brings powerful enhancements to how security teams manage scripts and files used in live response. With this centralized and streamlined interface, analysts no longer need to wait for an active session to organize their investigation tools everything can now be managed proactively, directly from the portal. This enhancement in Defender’s live response tooling improves operational readiness, enhances visibility and control, and helps streamline response workflows across SOC teams.&lt;/P&gt;
&lt;H4&gt;What’s new in library management?&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Centralized script and file management – &lt;/STRONG&gt;Security teams can now upload, manage, and clean up their entire collection of Live Response scripts and files outside of an active investigation. This proactive approach allows better preparation and alignment across analysts.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Upload in advance – &lt;/STRONG&gt;Easily upload PowerShell scripts, batch files, or other response tools ahead of time, so they're immediately accessible when needed during an investigation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;View script contents in the portal – &lt;/STRONG&gt;No need to switch tools, analysts can review script contents directly within the Defender UI to validate logic and confirm functionality before execution.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Clean and organize – &lt;/STRONG&gt;Outdated or redundant scripts can be deleted with a click, keeping your library lean, relevant, and audit-friendly.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Boost analyst understanding with Copilot – &lt;/STRONG&gt;Understanding unfamiliar scripts can slow down investigations. That’s where &lt;STRONG&gt;Microsoft &lt;/STRONG&gt;&lt;STRONG&gt;Security Copilot &lt;/STRONG&gt;comes in.&lt;/P&gt;
&lt;P&gt;Copilot automatically analyzes scripts in the library and provides:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Summarized behavior descriptions&lt;/LI&gt;
&lt;LI&gt;Security-relevant insights&lt;/LI&gt;
&lt;LI&gt;Execution risk context&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This makes it easier for analysts—especially those new to a team or handling inherited tools—to assess what a script does before running it, reducing errors and increasing confidence.&lt;/P&gt;
&lt;H4&gt;Get started today&lt;/H4&gt;
&lt;P&gt;You can access the Library Management experience from the &lt;STRONG&gt;live response &lt;/STRONG&gt;&lt;STRONG&gt;page&lt;/STRONG&gt; in the Microsoft Defender portal. Start uploading your investigation tools, explore script previews, and let Copilot assist in surfacing the intent and behavior of your scripts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;</description>
      <pubDate>Tue, 17 Feb 2026 17:52:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-library-management-in-microsoft-defender/ba-p/4494434</guid>
      <dc:creator>amibarayev</dc:creator>
      <dc:date>2026-02-17T17:52:18Z</dc:date>
    </item>
    <item>
      <title>Defender for Business - No alert after process lock out ?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-business-no-alert-after-process-lock-out/m-p/4489725#M6859</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A few days ago, I have setup Defender for business server on a Windows Server 2019.&lt;/P&gt;&lt;P&gt;I can see that server in the Microsoft security portail devices list.&lt;/P&gt;&lt;P&gt;I have also tested the "suspicious" powershell command provided by Microsoft and it went all good. Powershell blocked, alert escaladed as incident in the security portal, email received, ...&lt;/P&gt;&lt;P&gt;But the next day, I tried to install a service on that server that got blocked by Virus &amp;amp; Thread Protection because it was attempting to modify a lot of files. That was a good point for Defender (it was not a real thread and was later added as exception).&lt;/P&gt;&lt;P&gt;My worry is that it was never escaladed to the security portal, I didn't received a alert email, .. The system blocked that "thread" multiple times during my attempt to deploy it and no incident were throw.&lt;BR /&gt;&lt;BR /&gt;What could be wrong ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 11:43:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-business-no-alert-after-process-lock-out/m-p/4489725#M6859</guid>
      <dc:creator>karnalta</dc:creator>
      <dc:date>2026-01-27T11:43:15Z</dc:date>
    </item>
    <item>
      <title>Save the date - January 26, 2026 - AMA: Secure your endpoints with policy and Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/save-the-date-january-26-2026-ama-secure-your-endpoints-with/m-p/4487926#M6855</link>
      <description>&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Save the date for &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoftintuneevents/ama-secure-your-endpoints-with-policy-and-microsoft-defender/4485786" target="_blank" rel="noopener" data-lia-auto-title="January 26 at 8:00 AM PT" data-lia-auto-title-active="0"&gt;January 26 at 8:00 AM PT&lt;/A&gt;! Have questions about using Microsoft Intune to enforce device compliance? Curious how to configure devices to help prevent security breaches and limit the impact of threats? Ask Microsoft Anything (AMA) about integrating Microsoft Defender for Endpoint with Microsoft Intune at Tech Community Live! &lt;BR /&gt;&lt;BR /&gt;Product teams will be answering your questions live and in chat. Get tips using policy to onboard devices, define risk level, block non-compliant devices from accessing corporate resources, and more.&lt;BR /&gt;&lt;BR /&gt;Go to&amp;nbsp;&lt;A href="https://aka.ms/AMA/SecureEndpoints" target="_blank" rel="noopener"&gt;aka.ms/AMA/SecureEndpoints&lt;/A&gt; to save the date and add this event to your calendar!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 22:13:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/save-the-date-january-26-2026-ama-secure-your-endpoints-with/m-p/4487926#M6855</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-01-20T22:13:25Z</dc:date>
    </item>
    <item>
      <title>Defender for Identity health issues</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-identity-health-issues/m-p/4487106#M6851</link>
      <description>&lt;P&gt;When will the issues/alerts from defender for identity sensors be available to view via advanced hunting instead of the Graph API and "/security/identities/healthIssues"&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2026 11:31:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-identity-health-issues/m-p/4487106#M6851</guid>
      <dc:creator>zlate81</dc:creator>
      <dc:date>2026-01-19T11:31:19Z</dc:date>
    </item>
    <item>
      <title>Using MDE (Passive Mode) with Palo Alto Cortex XDR to enable Defender for IoT (Enterprise IoT)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/using-mde-passive-mode-with-palo-alto-cortex-xdr-to-enable/m-p/4485625#M6850</link>
      <description>&lt;P&gt;Hi everyone!&lt;BR /&gt;I’m working with a customer that uses &lt;STRONG&gt;Palo Alto Cortex XDR&lt;/STRONG&gt; as their primary EDR. We want to leverage &lt;STRONG&gt;Microsoft Defender for IoT&lt;/STRONG&gt; specifically for &lt;STRONG&gt;Enterprise IoT&lt;/STRONG&gt; (not OT/ICS). I have a few questions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;MDE in Passive Mode as a sensor:&lt;/STRONG&gt;&lt;BR /&gt;Can &lt;STRONG&gt;Microsoft Defender for Endpoint (MDE)&lt;/STRONG&gt; running in &lt;STRONG&gt;Passive mode&lt;/STRONG&gt; act as a sensor to enable Enterprise IoT discovery/monitoring for Defender for IoT? Are there any &lt;STRONG&gt;feature limitations&lt;/STRONG&gt; when MDE is not the primary EDR?&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Appliance sensor in Enterprise IT:&lt;/STRONG&gt;&lt;BR /&gt;If we cannot use the MDE agent, is it &lt;STRONG&gt;supported&lt;/STRONG&gt; to deploy the &lt;STRONG&gt;Defender for IoT appliance sensor&lt;/STRONG&gt; in an &lt;STRONG&gt;enterprise IT network&lt;/STRONG&gt; (e.g., offices/campuses) to cover &lt;STRONG&gt;Enterprise IoT&lt;/STRONG&gt; use cases?&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Coexistence / Complementary sensors:&lt;/STRONG&gt;&lt;BR /&gt;Is it possible (and recommended) to run the &lt;STRONG&gt;appliance sensor alongside MDE (sensor)&lt;/STRONG&gt; to &lt;STRONG&gt;complement coverage/features&lt;/STRONG&gt;? Any guidance on &lt;STRONG&gt;architecture&lt;/STRONG&gt;, &lt;STRONG&gt;data overlap/deduplication&lt;/STRONG&gt;, or &lt;STRONG&gt;licensing implications&lt;/STRONG&gt;?&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 14 Jan 2026 13:56:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/using-mde-passive-mode-with-palo-alto-cortex-xdr-to-enable/m-p/4485625#M6850</guid>
      <dc:creator>gabpereira</dc:creator>
      <dc:date>2026-01-14T13:56:04Z</dc:date>
    </item>
    <item>
      <title>Alert tuning for Custom detection rules</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/alert-tuning-for-custom-detection-rules/m-p/4485384#M6846</link>
      <description>undefined</description>
      <pubDate>Tue, 13 Jan 2026 18:40:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/alert-tuning-for-custom-detection-rules/m-p/4485384#M6846</guid>
      <dc:creator>mikhailf</dc:creator>
      <dc:date>2026-01-13T18:40:36Z</dc:date>
    </item>
    <item>
      <title>MS Defender setting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ms-defender-setting/m-p/4484770#M6844</link>
      <description>&lt;P&gt;Hello, I have a question.&lt;/P&gt;&lt;P&gt;I'm not an English-speaking country, so please understand any shortcomings.&lt;/P&gt;&lt;P&gt;I'm trying to block or alert on specific URLs in Microsoft Defender &amp;gt; Settings &amp;gt; Endpoint &amp;gt; Rules &amp;gt; Indicators. I've completed the setup, but I'd like to customize the screen that appears on the webpage when an alert is triggered.&lt;/P&gt;&lt;P&gt;Is there a way to do this?&lt;/P&gt;&lt;P&gt;Thank you in advance for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 01:19:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ms-defender-setting/m-p/4484770#M6844</guid>
      <dc:creator>sangbin</dc:creator>
      <dc:date>2026-01-12T01:19:46Z</dc:date>
    </item>
    <item>
      <title>Grounds up</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/grounds-up/m-p/4483712#M6843</link>
      <description>&lt;P&gt;A business that respects others to help kis be business owners&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2026 10:30:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/grounds-up/m-p/4483712#M6843</guid>
      <dc:creator>ozanwilliams</dc:creator>
      <dc:date>2026-01-07T10:30:30Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (December 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-december-2025/m-p/4481588#M6842</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the December 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 5c642a16bf56cb6d98ef8b12fdc89939&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2025 07:00:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-december-2025/m-p/4481588#M6842</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-29T07:00:11Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Endpoint for Vulnerability Management and Reporting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-for-vulnerability-management-and/m-p/4477704#M6840</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We’re currently using Rapid7 for vulnerability management and reporting, but we’re actively evaluating the possibility of moving to Microsoft Defender for Endpoint going forward. We’d like to better understand how to properly leverage Defender for Endpoint for vulnerability management and reporting.&lt;/P&gt;&lt;P&gt;If this means using custom reports—such as building dashboards in Power BI—we’re definitely open to that approach. At a high level, we’re looking for guidance on best practices and the right direction to meet the following requirements:&lt;/P&gt;&lt;P&gt;Ongoing vulnerability tracking and remediation&lt;BR /&gt;Clearer reporting on vulnerability trends and areas needing improvement&lt;BR /&gt;Breakdown of vulnerabilities by severity (Critical, High, Medium, Low), grouped by aging buckets (e.g., 30, 60, 90 days)&lt;BR /&gt;Defender Secure Score reporting over time (30, 60, and 90-day views)&lt;BR /&gt;Visibility into non-compliant devices in Intune, including devices in grace period and PCs that have checked in within the last 14 days&lt;/P&gt;&lt;P&gt;Any recommendations, examples, or pointers to documentation or reporting approaches would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Dilan&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2025 21:05:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-for-vulnerability-management-and/m-p/4477704#M6840</guid>
      <dc:creator>dilanmic</dc:creator>
      <dc:date>2025-12-13T21:05:29Z</dc:date>
    </item>
    <item>
      <title>Correct firewall log names to be included in a Defender investigation package?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/correct-firewall-log-names-to-be-included-in-a-defender/m-p/4477516#M6838</link>
      <description>&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;Hi - first time poster,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;I work in a SecOps team using Defender for Endpoint. I noticed that when we collect an investigation package from a device in Defender that the firewall logs aren't being found. The advice on Microsoft Learn articles seems to be contradictory as to what firewalls should be named as:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/respond-machine-alerts" target="_blank"&gt;Take response actions on a device in Microsoft Defender for Endpoint - Microsoft Defender for Endpoint | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;SPAN class="lia-text-color-21"&gt;FirewallExecutionLog.txt and pfirewall.log&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="lia-text-color-21"&gt;The&amp;nbsp;pfirewall.log&amp;nbsp;file must exist in&amp;nbsp;%windir%\system32\logfiles\firewall\pfirewall.log, so it's included in the investigation package. For more information on creating the firewall log file, see&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/windows-firewall/configure-logging?tabs=intune" target="_blank"&gt;Configure the Windows Firewall with Advanced Security Log&lt;/A&gt;.&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;This section implies for the firewall log to be collected it has to be called "pfirewall.log" but on the linked page it is recommended to change the log file names:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;SPAN class="lia-text-color-21"&gt;For each profile (Domain, Private, and Public) change the default log file name from %windir%\system32\logfiles\firewall\pfirewall.log to:&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;%windir%\system32\logfiles\firewall\pfirewall_Domain.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;%windir%\system32\logfiles\firewall\pfirewall_Private.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;%windir%\system32\logfiles\firewall\pfirewall_Public.log&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;We have tested the changed names and they are not found by the investigation package. Which one is recommended and is the logic used in the Defender investigation package correct?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 14:57:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/correct-firewall-log-names-to-be-included-in-a-defender/m-p/4477516#M6838</guid>
      <dc:creator>BenDodson1</dc:creator>
      <dc:date>2025-12-12T14:57:54Z</dc:date>
    </item>
    <item>
      <title>Investigating Excel-Initiated Email Activity Without Sent Items Trace</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/investigating-excel-initiated-email-activity-without-sent-items/m-p/4477197#M6596</link>
      <description>&lt;P&gt;Two days ago, three emails were sent from a user’s inbox without leaving any copies in the Sent Items folder. The user did not send these emails manually—this is confirmed by the presence of the SimpleMAPI flag in Outlook.&lt;BR /&gt;What I know:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Email Characteristics:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;All three emails contained a Word attachment.&lt;BR /&gt;No body text was present.&lt;BR /&gt;The subject line matched the attachment file name.&lt;BR /&gt;Two of the emails were identical.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Recipients:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Emails were sent to colleagues who originally created the attached documents.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Attachment Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;One attachment appeared to be a temporary file (e.g., a3e6....).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;System Behavior:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;No suspicious logins detected before or after the event.&lt;BR /&gt;Emails were sent via the Outlook.exe process on the user’s machine.&lt;BR /&gt;Excel.exe was identified as the parent initiating process according to Microsoft Defender endpoint logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;In Defender's Endpoint logs&lt;/STRONG&gt; I found this under Typed Details (related to the firing of the 3 emails):&lt;/P&gt;&lt;P&gt;1. -Downloaded file: 2057_5_0_word_httpsshredder-eu.osi.office.net_main.html&lt;/P&gt;&lt;P&gt;Path: C:\Users\s***s\AppData\Local\Microsoft\Office\16.0\TapCache\2057_5_0_word_httpsshredder-eu.osi.office.net_main.html&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Downloaded file: ~$rmalEmail.dotm&lt;/P&gt;&lt;P&gt;Path: C:\Users\s***s\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotm&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I am seeking assistance to replicate this issue and accurately determine how these three emails were triggered.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 11:10:24 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/investigating-excel-initiated-email-activity-without-sent-items/m-p/4477197#M6596</guid>
      <dc:creator>8932LDG</dc:creator>
      <dc:date>2025-12-11T11:10:24Z</dc:date>
    </item>
    <item>
      <title>KQL query to report on Audit/Block status of Network Protection</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/kql-query-to-report-on-audit-block-status-of-network-protection/m-p/4476585#M6593</link>
      <description>&lt;P&gt;Anyone know how to run a query using KQL in the defender portal to return the status of Network Protection - Audit or Block mode? The following query returns the results but "IsCompliant" = 1 when Network Protection is on in either Audit or Block mode. I thought the context might help but for this SCID it is always empty.&lt;/P&gt;&lt;P&gt;DeviceTvmSecureConfigurationAssessment&lt;/P&gt;&lt;P&gt;| where ConfigurationId == "scid-96"&lt;/P&gt;&lt;P&gt;The information is available within the portal when you drill into the device - configuration management - effective settings - but this is not scalable when needing to check across a large estate. How could you query this via KQL or another way to generate on a report on overall estate health and configuration? Long term would be great to report on this in a powerBi dashboard.&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 21:32:37 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/kql-query-to-report-on-audit-block-status-of-network-protection/m-p/4476585#M6593</guid>
      <dc:creator>Warren212</dc:creator>
      <dc:date>2025-12-09T21:32:37Z</dc:date>
    </item>
    <item>
      <title>MS Defender 101.25102 update error</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ms-defender-101-25102-update-error/m-p/4476337#M6591</link>
      <description>&lt;P&gt;I have been trying to update MS Defender for several days now and without luck. I am on a iMac M3 with macOS 26.1.&lt;/P&gt;&lt;P&gt;I tried removing and reinstalling the app, but it seems that the uninstall script does not remove the app at all. Yes, I did restart the machine.&lt;/P&gt;&lt;P&gt;Does anyone have a solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 08:15:31 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ms-defender-101-25102-update-error/m-p/4476337#M6591</guid>
      <dc:creator>Utz78</dc:creator>
      <dc:date>2025-12-09T08:15:31Z</dc:date>
    </item>
    <item>
      <title>Defender for Endpoint on Linux</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-endpoint-on-linux/m-p/4476262#M6590</link>
      <description>&lt;P&gt;I'm using the Linux version of the defender agent on RHEL 8.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The intended setup is, The agents are registered to the Defender cloud. And we have enabled the InTune to Defender connector. So when you register your endpoint, it should also create a skeleton registration in Intune so it can manage the Linux policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've got that setup. However, If you need to make quick, perhaps unscheduled changes to your Linux MDATP profile. How do you do it? As it seems to be based on when the endpoint checks in with Intune. Which Intune does between 4-6 hours.&lt;/P&gt;&lt;P&gt;Some of the docs I read, said just make the change to the .json config on the client. Then Intune will reapply the update policy when it checks the agent in.&lt;/P&gt;&lt;P&gt;Ok, but if you have enabled the anti tamper feature on the agents. How do you then update the .json file? It's just going to block you from doing that&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Dec 2025 03:43:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-endpoint-on-linux/m-p/4476262#M6590</guid>
      <dc:creator>RyanLindsay</dc:creator>
      <dc:date>2025-12-09T03:43:27Z</dc:date>
    </item>
    <item>
      <title>‎Bitdefender active mode , configure MDE passive mode</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bitdefender-active-mode-configure-mde-passive-mode/m-p/4475114#M6587</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have scenario where client currently has Bitdefender in Active Mode and uses it to manage their endpoints and now plans to use Defender for Endpoint in Passive Mode for Endpoints (Windows 11/Server)&lt;/P&gt;&lt;P&gt;How to configure MDE in passive mode step by step&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have 500 devices how to onboard that on MDE step by step in co-management&lt;/P&gt;&lt;P&gt;While MDE in Passive mode any performance issue along with 3rd party antivirus solution&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2025 08:02:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bitdefender-active-mode-configure-mde-passive-mode/m-p/4475114#M6587</guid>
      <dc:creator>Saad_Farooq</dc:creator>
      <dc:date>2025-12-04T08:02:57Z</dc:date>
    </item>
    <item>
      <title>MDE use of Certificate based IoC not working</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/mde-use-of-certificate-based-ioc-not-working/m-p/4474190#M6580</link>
      <description>&lt;P&gt;I have been trying to use MDE IoC with certificates as per the following link: &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/indicator-certificates#create-an-indicator-for-certificates-from-the-settings-page" target="_blank"&gt;https://learn.microsoft.com/en-us/defender-endpoint/indicator-certificates#create-an-indicator-for-certificates-from-the-settings-page&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This is on a demo tenant with full M365 E5 licenses and vulnerability trial enabled just in case. Test devices are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;windows 11 with latest updates - domain joined and managed by Intune&lt;/LI&gt;&lt;LI&gt;MDE onboarded and active with AV&lt;/LI&gt;&lt;LI&gt;Network protection in block mode&lt;/LI&gt;&lt;LI&gt;Cloud delivered protection enabled&lt;/LI&gt;&lt;LI&gt;File hash enabled&lt;/LI&gt;&lt;LI&gt;In defender portal - settings - endpoints advanced settings - all options enabled&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I am testing with Firefox - the installer and the application .exe after installation.&lt;/P&gt;&lt;P&gt;I have extracted the leaf certificate from both these .exe's using the helpful information in the following link: &lt;A class="lia-external-url" href="https://www.linkedin.com/pulse/microsoft-defender-missing-manual-how-actually-create-adair-collins-paiye/" target="_blank"&gt;https://www.linkedin.com/pulse/microsoft-defender-missing-manual-how-actually-create-adair-collins-paiye/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Then uploaded the certs into defender portal - settings - endpoints - IoC - certificates - set to Block and remediate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue:&lt;/P&gt;&lt;P&gt;Its been 24h and nothing happens on the client devices. In the defender portal - assets - devices - device timeline - I can see the firefox processes but at no point is the installer or application blocked.&lt;/P&gt;&lt;P&gt;Have I miss understood how the feature works?&lt;/P&gt;&lt;P&gt;Has anyone else managed to get this to work?&lt;/P&gt;&lt;P&gt;Advice appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Warren&lt;/P&gt;</description>
      <pubDate>Mon, 01 Dec 2025 14:12:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/mde-use-of-certificate-based-ioc-not-working/m-p/4474190#M6580</guid>
      <dc:creator>Warren212</dc:creator>
      <dc:date>2025-12-01T14:12:03Z</dc:date>
    </item>
  </channel>
</rss>

