<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender for Endpoint topics</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bd-p/MicrosoftDefenderATP</link>
    <description>Microsoft Defender for Endpoint topics</description>
    <pubDate>Sat, 25 Apr 2026 12:01:19 GMT</pubDate>
    <dc:creator>MicrosoftDefenderATP</dc:creator>
    <dc:date>2026-04-25T12:01:19Z</dc:date>
    <item>
      <title>Defender for Business - No alert after process lock out ?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-business-no-alert-after-process-lock-out/m-p/4489725#M6859</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A few days ago, I have setup Defender for business server on a Windows Server 2019.&lt;/P&gt;&lt;P&gt;I can see that server in the Microsoft security portail devices list.&lt;/P&gt;&lt;P&gt;I have also tested the "suspicious" powershell command provided by Microsoft and it went all good. Powershell blocked, alert escaladed as incident in the security portal, email received, ...&lt;/P&gt;&lt;P&gt;But the next day, I tried to install a service on that server that got blocked by Virus &amp;amp; Thread Protection because it was attempting to modify a lot of files. That was a good point for Defender (it was not a real thread and was later added as exception).&lt;/P&gt;&lt;P&gt;My worry is that it was never escaladed to the security portal, I didn't received a alert email, .. The system blocked that "thread" multiple times during my attempt to deploy it and no incident were throw.&lt;BR /&gt;&lt;BR /&gt;What could be wrong ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 11:43:15 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-business-no-alert-after-process-lock-out/m-p/4489725#M6859</guid>
      <dc:creator>karnalta</dc:creator>
      <dc:date>2026-01-27T11:43:15Z</dc:date>
    </item>
    <item>
      <title>Save the date - January 26, 2026 - AMA: Secure your endpoints with policy and Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/save-the-date-january-26-2026-ama-secure-your-endpoints-with/m-p/4487926#M6855</link>
      <description>&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Save the date for &lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-occasion" href="https://techcommunity.microsoft.com/event/microsoftintuneevents/ama-secure-your-endpoints-with-policy-and-microsoft-defender/4485786" target="_blank" rel="noopener" data-lia-auto-title="January 26 at 8:00 AM PT" data-lia-auto-title-active="0"&gt;January 26 at 8:00 AM PT&lt;/A&gt;! Have questions about using Microsoft Intune to enforce device compliance? Curious how to configure devices to help prevent security breaches and limit the impact of threats? Ask Microsoft Anything (AMA) about integrating Microsoft Defender for Endpoint with Microsoft Intune at Tech Community Live! &lt;BR /&gt;&lt;BR /&gt;Product teams will be answering your questions live and in chat. Get tips using policy to onboard devices, define risk level, block non-compliant devices from accessing corporate resources, and more.&lt;BR /&gt;&lt;BR /&gt;Go to&amp;nbsp;&lt;A href="https://aka.ms/AMA/SecureEndpoints" target="_blank" rel="noopener"&gt;aka.ms/AMA/SecureEndpoints&lt;/A&gt; to save the date and add this event to your calendar!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jan 2026 22:13:25 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/save-the-date-january-26-2026-ama-secure-your-endpoints-with/m-p/4487926#M6855</guid>
      <dc:creator>Pearl-Angeles</dc:creator>
      <dc:date>2026-01-20T22:13:25Z</dc:date>
    </item>
    <item>
      <title>Defender for Identity health issues</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-identity-health-issues/m-p/4487106#M6851</link>
      <description>&lt;P&gt;When will the issues/alerts from defender for identity sensors be available to view via advanced hunting instead of the Graph API and "/security/identities/healthIssues"&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2026 11:31:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-identity-health-issues/m-p/4487106#M6851</guid>
      <dc:creator>zlate81</dc:creator>
      <dc:date>2026-01-19T11:31:19Z</dc:date>
    </item>
    <item>
      <title>Using MDE (Passive Mode) with Palo Alto Cortex XDR to enable Defender for IoT (Enterprise IoT)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/using-mde-passive-mode-with-palo-alto-cortex-xdr-to-enable/m-p/4485625#M6850</link>
      <description>&lt;P&gt;Hi everyone!&lt;BR /&gt;I’m working with a customer that uses &lt;STRONG&gt;Palo Alto Cortex XDR&lt;/STRONG&gt; as their primary EDR. We want to leverage &lt;STRONG&gt;Microsoft Defender for IoT&lt;/STRONG&gt; specifically for &lt;STRONG&gt;Enterprise IoT&lt;/STRONG&gt; (not OT/ICS). I have a few questions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;MDE in Passive Mode as a sensor:&lt;/STRONG&gt;&lt;BR /&gt;Can &lt;STRONG&gt;Microsoft Defender for Endpoint (MDE)&lt;/STRONG&gt; running in &lt;STRONG&gt;Passive mode&lt;/STRONG&gt; act as a sensor to enable Enterprise IoT discovery/monitoring for Defender for IoT? Are there any &lt;STRONG&gt;feature limitations&lt;/STRONG&gt; when MDE is not the primary EDR?&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Appliance sensor in Enterprise IT:&lt;/STRONG&gt;&lt;BR /&gt;If we cannot use the MDE agent, is it &lt;STRONG&gt;supported&lt;/STRONG&gt; to deploy the &lt;STRONG&gt;Defender for IoT appliance sensor&lt;/STRONG&gt; in an &lt;STRONG&gt;enterprise IT network&lt;/STRONG&gt; (e.g., offices/campuses) to cover &lt;STRONG&gt;Enterprise IoT&lt;/STRONG&gt; use cases?&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Coexistence / Complementary sensors:&lt;/STRONG&gt;&lt;BR /&gt;Is it possible (and recommended) to run the &lt;STRONG&gt;appliance sensor alongside MDE (sensor)&lt;/STRONG&gt; to &lt;STRONG&gt;complement coverage/features&lt;/STRONG&gt;? Any guidance on &lt;STRONG&gt;architecture&lt;/STRONG&gt;, &lt;STRONG&gt;data overlap/deduplication&lt;/STRONG&gt;, or &lt;STRONG&gt;licensing implications&lt;/STRONG&gt;?&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 14 Jan 2026 13:56:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/using-mde-passive-mode-with-palo-alto-cortex-xdr-to-enable/m-p/4485625#M6850</guid>
      <dc:creator>gabpereira</dc:creator>
      <dc:date>2026-01-14T13:56:04Z</dc:date>
    </item>
    <item>
      <title>Alert tuning for Custom detection rules</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/alert-tuning-for-custom-detection-rules/m-p/4485384#M6846</link>
      <description>undefined</description>
      <pubDate>Tue, 13 Jan 2026 18:40:36 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/alert-tuning-for-custom-detection-rules/m-p/4485384#M6846</guid>
      <dc:creator>mikhailf</dc:creator>
      <dc:date>2026-01-13T18:40:36Z</dc:date>
    </item>
    <item>
      <title>MS Defender setting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ms-defender-setting/m-p/4484770#M6844</link>
      <description>&lt;P&gt;Hello, I have a question.&lt;/P&gt;&lt;P&gt;I'm not an English-speaking country, so please understand any shortcomings.&lt;/P&gt;&lt;P&gt;I'm trying to block or alert on specific URLs in Microsoft Defender &amp;gt; Settings &amp;gt; Endpoint &amp;gt; Rules &amp;gt; Indicators. I've completed the setup, but I'd like to customize the screen that appears on the webpage when an alert is triggered.&lt;/P&gt;&lt;P&gt;Is there a way to do this?&lt;/P&gt;&lt;P&gt;Thank you in advance for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;img /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 01:19:46 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ms-defender-setting/m-p/4484770#M6844</guid>
      <dc:creator>sangbin</dc:creator>
      <dc:date>2026-01-12T01:19:46Z</dc:date>
    </item>
    <item>
      <title>Grounds up</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/grounds-up/m-p/4483712#M6843</link>
      <description>&lt;P&gt;A business that respects others to help kis be business owners&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2026 10:30:30 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/grounds-up/m-p/4483712#M6843</guid>
      <dc:creator>ozanwilliams</dc:creator>
      <dc:date>2026-01-07T10:30:30Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (December 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-december-2025/m-p/4481588#M6842</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the December 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 5c642a16bf56cb6d98ef8b12fdc89939&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Dec 2025 07:00:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-december-2025/m-p/4481588#M6842</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-29T07:00:11Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Endpoint for Vulnerability Management and Reporting</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-for-vulnerability-management-and/m-p/4477704#M6840</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We’re currently using Rapid7 for vulnerability management and reporting, but we’re actively evaluating the possibility of moving to Microsoft Defender for Endpoint going forward. We’d like to better understand how to properly leverage Defender for Endpoint for vulnerability management and reporting.&lt;/P&gt;&lt;P&gt;If this means using custom reports—such as building dashboards in Power BI—we’re definitely open to that approach. At a high level, we’re looking for guidance on best practices and the right direction to meet the following requirements:&lt;/P&gt;&lt;P&gt;Ongoing vulnerability tracking and remediation&lt;BR /&gt;Clearer reporting on vulnerability trends and areas needing improvement&lt;BR /&gt;Breakdown of vulnerabilities by severity (Critical, High, Medium, Low), grouped by aging buckets (e.g., 30, 60, 90 days)&lt;BR /&gt;Defender Secure Score reporting over time (30, 60, and 90-day views)&lt;BR /&gt;Visibility into non-compliant devices in Intune, including devices in grace period and PCs that have checked in within the last 14 days&lt;/P&gt;&lt;P&gt;Any recommendations, examples, or pointers to documentation or reporting approaches would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Dilan&lt;/P&gt;</description>
      <pubDate>Sat, 13 Dec 2025 21:05:29 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-for-vulnerability-management-and/m-p/4477704#M6840</guid>
      <dc:creator>dilanmic</dc:creator>
      <dc:date>2025-12-13T21:05:29Z</dc:date>
    </item>
    <item>
      <title>Correct firewall log names to be included in a Defender investigation package?</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/correct-firewall-log-names-to-be-included-in-a-defender/m-p/4477516#M6838</link>
      <description>&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;Hi - first time poster,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;I work in a SecOps team using Defender for Endpoint. I noticed that when we collect an investigation package from a device in Defender that the firewall logs aren't being found. The advice on Microsoft Learn articles seems to be contradictory as to what firewalls should be named as:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/respond-machine-alerts" target="_blank"&gt;Take response actions on a device in Microsoft Defender for Endpoint - Microsoft Defender for Endpoint | Microsoft Learn&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;SPAN class="lia-text-color-21"&gt;FirewallExecutionLog.txt and pfirewall.log&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="lia-text-color-21"&gt;The&amp;nbsp;pfirewall.log&amp;nbsp;file must exist in&amp;nbsp;%windir%\system32\logfiles\firewall\pfirewall.log, so it's included in the investigation package. For more information on creating the firewall log file, see&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/windows/security/operating-system-security/network-security/windows-firewall/configure-logging?tabs=intune" target="_blank"&gt;Configure the Windows Firewall with Advanced Security Log&lt;/A&gt;.&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;This section implies for the firewall log to be collected it has to be called "pfirewall.log" but on the linked page it is recommended to change the log file names:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;SPAN class="lia-text-color-21"&gt;For each profile (Domain, Private, and Public) change the default log file name from %windir%\system32\logfiles\firewall\pfirewall.log to:&lt;/SPAN&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;%windir%\system32\logfiles\firewall\pfirewall_Domain.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;%windir%\system32\logfiles\firewall\pfirewall_Private.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;%windir%\system32\logfiles\firewall\pfirewall_Public.log&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN class="lia-text-color-21"&gt;We have tested the changed names and they are not found by the investigation package. Which one is recommended and is the logic used in the Defender investigation package correct?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 14:57:54 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/correct-firewall-log-names-to-be-included-in-a-defender/m-p/4477516#M6838</guid>
      <dc:creator>BenDodson1</dc:creator>
      <dc:date>2025-12-12T14:57:54Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (November 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-november-2025/m-p/4472342#M6837</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the November 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 0ed5b864101c471d987b332fc8619551&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:03:13 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-november-2025/m-p/4472342#M6837</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-12T11:03:13Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (October 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-october-2025/m-p/4464404#M6836</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the October 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 01757cbb8de8dfb10b140e0e6a1dfe41&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:03:08 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-october-2025/m-p/4464404#M6836</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-12T11:03:08Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (September 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-september-2025/m-p/4457794#M6835</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the September 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 14bf7b135c8c6d61d39ba6c28991f300&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2025 07:58:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-september-2025/m-p/4457794#M6835</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-09-29T07:58:40Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (August 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-august-2025/m-p/4446445#M6834</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the August 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 6d6cf3931c4e7ad160a74d4fad19a89c&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:02:58 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-august-2025/m-p/4446445#M6834</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-12T11:02:58Z</dc:date>
    </item>
    <item>
      <title>Can't see any devices from the sensor inventory in Microsoft Defender Portal</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/can-t-see-any-devices-from-the-sensor-inventory-in-microsoft/m-p/4440762#M6833</link>
      <description>&lt;P&gt;In theory Sensor inventory feeds site security inventory directly from the sensor to Microsoft Defender Portal but any device is shown just the Defender for Endpoint discovered OT devices, is there anything missing to enable integrated sensor and Defender for Endpoint OT inventory&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Within Azure Defender for IoT device inventory from sensor is correctly shown but not in Defender Portal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 17:22:43 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/can-t-see-any-devices-from-the-sensor-inventory-in-microsoft/m-p/4440762#M6833</guid>
      <dc:creator>Edgar Sosa</dc:creator>
      <dc:date>2025-08-06T17:22:43Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (July 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-july-2025/m-p/4437170#M6832</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the July 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 8581e1e0d30133191885115d73b38cf9&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:02:49 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-july-2025/m-p/4437170#M6832</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-12T11:02:49Z</dc:date>
    </item>
    <item>
      <title>E5 Enterprise IoT</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/e5-enterprise-iot/m-p/4433271#M6831</link>
      <description>&lt;P&gt;We have Microsoft 365 E5 licenses, and all of them are properly assigned. However, Enterprise IoT is not showing up in Device Discovery. It was enabled before but disappeared. Is there any experience/suggestion how we can fix this?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:02:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/e5-enterprise-iot/m-p/4433271#M6831</guid>
      <dc:creator>fgulus</dc:creator>
      <dc:date>2025-12-12T11:02:44Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (June 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-june-2025/m-p/4428493#M6830</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the June 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: 06f35a3010697d7978bf89a13f6ae27e&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:02:38 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-june-2025/m-p/4428493#M6830</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-12T11:02:38Z</dc:date>
    </item>
    <item>
      <title>Latest Threat Intelligence (May 2025)</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-may-2025/m-p/4413270#M6829</link>
      <description>&lt;P&gt;Microsoft Defender for IoT has released the May 2025 Threat Intelligence package. The package is available for download from the &lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file).&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Threat Intelligence updates reflect the combined impact of proprietary research and threat intelligence carried out by Microsoft security teams.&amp;nbsp;Each package contains the latest CVEs (Common Vulnerabilities and Exposures), IOCs (Indicators of Compromise), and other indicators applicable to IoT/ICS/OT networks (published during the past month) researched and implemented by Microsoft Threat Intelligence Research - CPS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CVE scores are aligned with the National Vulnerability Database (NVD). Starting with the August 2023 threat intelligence updates, CVSSv3 scores are shown if they are relevant; otherwise the CVSSv2 scores are shown.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Guidance&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers are recommended to update their systems with the latest TI package in order to detect potential exposure risks and vulnerabilities in their networks and on their devices. Threat Intelligence packages are updated every month with the most up-to-date security information available, ensuring that Microsoft Defender for IoT can identify malicious actors and behaviors on devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Update your system with the latest TI package&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The package is available for download from the&amp;nbsp;&lt;A href="https://ms.portal.azure.com/#blade/Microsoft_Azure_IoT_Defender/IoTDefenderDashboard/Getting_Started" aria-label="Link Microsoft Defender for IoT portal" target="_blank"&gt;Microsoft Defender for IoT portal&lt;/A&gt;&amp;nbsp;(click Updates, then Download file), for more information, please review&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/how-to-work-with-threat-intelligence-packages" aria-label="Link Update threat intelligence data | Microsoft Docs" target="_blank"&gt;Update threat intelligence data | Microsoft Docs&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MD5 Hash: d24a971301003c37622f21b7e30a80cb&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For cloud connected sensors, Microsoft Defender for IoT can automatically update new threat intelligence packages following their release,&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/defender-for-iot/organizations/release-notes" aria-label="Link click here&amp;nbsp;" target="_blank"&gt;click here&amp;nbsp;&lt;/A&gt;for more information.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:02:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/latest-threat-intelligence-may-2025/m-p/4413270#M6829</guid>
      <dc:creator>Theo_Cohen</dc:creator>
      <dc:date>2025-12-12T11:02:32Z</dc:date>
    </item>
    <item>
      <title>Azure IoT Hub Defender Micro Agent on Yocto/STM32MP1 – No Defender Metrics in IoT Hub Portal</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/azure-iot-hub-defender-micro-agent-on-yocto-stm32mp1-no-defender/m-p/4407543#M6828</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I'm currently running the Azure IoT Defender Micro Agent on a Yocto-based image (STM32MP1), and although the logs suggest the agent is working and sending data, no Defender metrics are visible in the Azure IoT Hub portal under Defender Metrics.&lt;/P&gt;&lt;P&gt;Setup Details:&lt;BR /&gt;Platform: STM32MP1 with Yocto Linux&lt;/P&gt;&lt;P&gt;Transport: AMQP&lt;/P&gt;&lt;P&gt;IoT Hub connection: Successful&lt;/P&gt;&lt;P&gt;Cloud messages: send_confirm_callback success and device twin updates with result 200&lt;/P&gt;&lt;P&gt;Collectors enabled: SBoM, NetworkActivity, Heartbeat, LogCollector, Process, FileSystem, Peripheral, Baseline, etc.&lt;/P&gt;&lt;P&gt;Observations:&lt;BR /&gt;Logs show telemetry batching with message sizes up to 101KB.&lt;/P&gt;&lt;P&gt;Agent attempts to read common paths like /etc/crontab fail with errno=[2] (file not found), which is expected given it's an embedded system.&lt;/P&gt;&lt;P&gt;Repeated logs like Failed to stat() on=/proc/[pid]/cmdline, not sure if it's a blocker.&lt;/P&gt;&lt;P&gt;Main Issue:&lt;BR /&gt;Even though the agent appears to be collecting data and successfully sending messages, the Defender Metrics tab in the IoT Hub Portal remains empty, making it hard to verify if Defender is actively evaluating device risk or just accepting telemetry blindly.&lt;/P&gt;&lt;P&gt;Questions:&lt;BR /&gt;Does IoT Hub Defender require a full Linux environment with tools like dmidecode, /boot/grub/grub.cfg, or cron directories to process and display metrics?&lt;/P&gt;&lt;P&gt;Are there any known limitations with Yocto-based minimal images that prevent Defender metrics from showing in the IoT Hub portal?&lt;/P&gt;&lt;P&gt;Is there a way to validate if metrics are actually reaching and being processed by the Defender backend beyond the send_confirm_callback log?&lt;/P&gt;&lt;P&gt;Any insights or guidance would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:02:27 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/azure-iot-hub-defender-micro-agent-on-yocto-stm32mp1-no-defender/m-p/4407543#M6828</guid>
      <dc:creator>shreyaschandran</dc:creator>
      <dc:date>2025-12-12T11:02:27Z</dc:date>
    </item>
  </channel>
</rss>

