<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Microsoft Defender for Endpoint Blog articles</title>
    <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bg-p/MicrosoftDefenderATPBlog</link>
    <description>Microsoft Defender for Endpoint Blog articles</description>
    <pubDate>Mon, 20 Apr 2026 20:34:20 GMT</pubDate>
    <dc:creator>MicrosoftDefenderATPBlog</dc:creator>
    <dc:date>2026-04-20T20:34:20Z</dc:date>
    <item>
      <title>Introducing effective settings: See security configurations enforced on your device</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-effective-settings-see-security-configurations/ba-p/4499551</link>
      <description>&lt;H4&gt;See exactly which security configurations are enforced on your device&lt;/H4&gt;
&lt;P&gt;Security teams spend significant time defining policies for Microsoft Defender security settings. But when it comes to investigations or troubleshooting, the real question is often simple: &lt;EM&gt;what is currently being enforced on this device?&lt;/EM&gt; Today, we’re excited to share that the &lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/investigate-machines?wt.mc_id=MVP_452337#configuration-management---effective-settings" target="_blank" rel="noopener"&gt;settings experience&lt;/A&gt; is now generally available in Defender to provide this critical visibility.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure #1: Effective settings tab on the device page&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;From intended policy to real-world enforcement&lt;/H4&gt;
&lt;P&gt;Understanding device security posture sometimes means correlating policy intent across multiple management sources, including Intune, Group Policy Object (GPO), and local admin configurations. With effective settings, administrators can see the &lt;EM&gt;effective value&lt;/EM&gt; of each security setting on a specific device—along with the configuration source—and quickly identify configuration attempts that didn’t take effect. This helps eliminate silent gaps where intended protections are not actually enforced, reducing the risk of unnoticed exposure during incidents or active attacks. And this shift from intent to reality helps teams move faster when validating posture, investigating incidents, or resolving conflicts between management tools.&lt;/P&gt;
&lt;H4&gt;A new view on the device page&lt;/H4&gt;
&lt;P&gt;The effective settings tab is available as a new tab under the &lt;STRONG&gt;configuration management&lt;/STRONG&gt; tab on the device page. From this single location, you can:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;View the &lt;STRONG&gt;actual value&lt;/STRONG&gt; enforced for each security setting&lt;/LI&gt;
&lt;LI&gt;Identify the &lt;STRONG&gt;configuring source&lt;/STRONG&gt; responsible for that value&lt;/LI&gt;
&lt;LI&gt;See &lt;STRONG&gt;additional configuration attempts&lt;/STRONG&gt; from other sources that were evaluated but not applied&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For complex or layered scenarios such as Microsoft Defender Antivirus exclusions and Attack Surface Reduction (ASR) rules, all configured rules are shown together with their effective value, configuring source, and additional configuration attempts&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;This makes it far simpler to understand why a device behaves the way it does, without jumping between consoles or guessing which policy “won.”&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Figure #2: Simple settings side panel&lt;/EM&gt;&lt;/img&gt;&lt;img&gt;&lt;EM&gt;Figure #3: Complex settings side panel&lt;/EM&gt;&lt;/img&gt;
&lt;H4&gt;Practical use cases&lt;/H4&gt;
&lt;P&gt;Security admins and analysts can use &lt;STRONG&gt;effective settings&lt;/STRONG&gt; for use cases like:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Validating enforcement&lt;/STRONG&gt; – Confirm that intended security configurations are truly applied on devices&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Troubleshooting conflicts&lt;/STRONG&gt; – Quickly spot competing policies or management sources that prevented a configuration from being enforced&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Improving operational confidence&lt;/STRONG&gt; – Reduce uncertainty by relying on an authoritative, device-level view of security settings&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Platform support and what’s next&lt;/H4&gt;
&lt;P&gt;The current release focuses on &lt;STRONG&gt;Windows platform antivirus security settings&lt;/STRONG&gt;, including ASR rules and exclusions. This is just the beginning. Our roadmap includes expanding coverage across additional platforms, and a broader set of security settings configured through the Microsoft 365 Defender and Intune portals.&lt;/P&gt;
&lt;H4&gt;Getting started&lt;/H4&gt;
&lt;P&gt;If you’re using Microsoft Defender for Endpoint, head to a device page and open the &lt;STRONG&gt;configuration management → effective settings&lt;/STRONG&gt; tab to explore the experience firsthand.&lt;/P&gt;
&lt;P&gt;Supported versions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Microsoft Defender for Endpoint Sense client: 10.8735.26018.1000 or later&lt;/LI&gt;
&lt;LI&gt;Microsoft Defender Antivirus platform: 4.18.25010.11 (January 2025 release) or later&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Learn more&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/investigate-machines?wt.mc_id=MVP_452337#configuration-management---effective-settings" target="_blank" rel="noopener"&gt;Learn more about investigating devices in Defender&lt;/A&gt;. To get started, navigate to a device page and open the &lt;STRONG&gt;configuration management → effective settings&lt;/STRONG&gt; tab.&lt;/LI&gt;
&lt;LI&gt;To learn more about Microsoft Defender endpoint protection, check out our&amp;nbsp;&lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;website&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To learn more about Microsoft Security solutions, visit our &lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;website.&lt;/A&gt; Bookmark the &lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;Security blog&lt;/A&gt; to keep up with our expert coverage on security matters. Follow us on LinkedIn (&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;Microsoft Security&lt;/A&gt;) and X (&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;@MSFTSecurity&lt;/A&gt;) for the latest news and updates on cybersecurity.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 09 Mar 2026 16:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-effective-settings-see-security-configurations/ba-p/4499551</guid>
      <dc:creator>ArielMichaeli1</dc:creator>
      <dc:date>2026-03-09T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Transparent and customizable onboarding for modern and legacy Windows devices</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/transparent-and-customizable-onboarding-for-modern-and-legacy/ba-p/4498827</link>
      <description>&lt;P&gt;Onboarding all devices in your estate is paramount for strong security posture. In fact, Microsoft Threat Intelligence research shows that in the majority of ransomware attacks, the spreader machine was a device that was not yet onboarded. But customers often struggle to follow complex steps that differ by OS, accidentally duplicate devices because they can’t tell whether onboarding is in progress or failed, or have incorrect initial configuration settings causing system incompatibility. That’s why we’re introducing an updated onboarding experience via the Defender deployment tool for Windows that improves progress visibility and adds controls—like package naming and configurable expiry—to help administrators manage onboarding securely at scale.&lt;/P&gt;
&lt;H3 aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;What’s&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;new&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;The&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;Defender deployment tool streamlines&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;the onboarding process&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;by&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;dynamically adapt&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ing&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;to the operating system, delivering healthy endpoint security to a diverse&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;estate&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;of Windows devices.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;It&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;is the preferred automated solution&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;that works on&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;modern and legacy devices&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;and&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;removes the need for a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;separate onboarding&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;file by embed&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;ding the onboarding&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;package and all related information within a downloadable&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;exe&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;that&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;can be run to onboard devices.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;This &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;updated experience&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;makes&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;&amp;nbsp;onboarding more predictable and transparent, while adding administrative controls that help reduce exposure if onboarding packages are accidentally shared beyond your organization&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;A&amp;nbsp;single, runnable&amp;nbsp;.exe&amp;nbsp;for onboarding&amp;nbsp;with&amp;nbsp;the onboarding information&amp;nbsp;embedded&amp;nbsp;(no separate onboarding file&amp;nbsp;required)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Silent and non-interactive onboarding&amp;nbsp;options&amp;nbsp;to support large-scale deployments with tools like Group Policy or Configuration Manager&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Custom package identifiers&amp;nbsp;to&amp;nbsp;help track and manage onboarding packages across your organization&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Configurable onboarding package expiry (up to one year)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Customizable name identifiers and keys for increased control and visibility&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;New portal entry points and guidance to make it easier to find the right onboarding and offboarding method for Windows, including&amp;nbsp;directly from the device inventory page&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;The new, streamlined onboarding tab in the Defender portal&lt;/img&gt;
&lt;H3&gt;&lt;SPAN data-contrast="auto"&gt;Customize your deployment package&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This experience moves away from using scripts and loose blobs, making it more difficult for onboarding to take place at the hands of unauthorized users and significantly decreasing security issues related to blobs in the wild that don't expire. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;And&amp;nbsp;for the first time, you can set custom expiry&amp;nbsp;dates&amp;nbsp;on onboarding packages&amp;nbsp;for 1 day, 7 days, or a custom amount up to a year.&amp;nbsp;Expiry for onboarding packages protects customers from unwanted onboarding and compliance issues, limiting packages from getting misused if&amp;nbsp;they’re&amp;nbsp;found in a public place. Expiry reduces the likelihood of unauthorized package usage, together with the new portal-provided key that you must input to complete the onboarding process.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;Customize your deployment package with a name and expiry date&lt;/img&gt;
&lt;H3&gt;&lt;SPAN data-contrast="none"&gt;See your onboarding telemetry in detail&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Deployment tool events are available in the device timeline and advanced hunting tabs for increased transparency into onboarding progress and errors, so you can quickly address any issues.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;On&amp;nbsp;the new deployment packages page, you can see your organization's onboarding packages&amp;nbsp;at a glance&amp;nbsp;and&amp;nbsp;click to see more package properties, increasing visibility and traceability within the onboarding process. This is&amp;nbsp;a great foundation for adding even more onboarding-related telemetry to view per device in the future. You can even&amp;nbsp;filter by&amp;nbsp;active or expired packages and hide packages you no longer&amp;nbsp;wish&amp;nbsp;to see.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img&gt;The new deployment packages page in the Defender portal&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To experience this next iteration of the Defender deployment tool for Windows, navigate to&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Settings &amp;gt; Endpoints &amp;gt; Onboarding &amp;gt; Windows&lt;/STRONG&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;or jump there directly from the device inventory page. There you'll see the newly designed onboarding page in the Defender portal, complete with on/offboarding guides. Select the Defender deployment tool from the options shown.&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;New onboarding and offboarding buttons on the device inventory page&lt;/img&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;The Defender deployment tool is also available for Linux. We look forward continuing to share ways we're making it easier to onboard devices to Defender.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Learn more&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:160,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/defender-deployment-tool-windows" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Deploy Microsoft Defender endpoint security to Windows devices using the Defender deployment tool (preview) - Microsoft Defender for Endpoint | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/linux-install-with-defender-deployment-tool" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Deploy Microsoft Defender endpoint security to Linux devices using the Defender deployment tool (preview) - Microsoft Defender for Endpoint | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about Microsoft Defender's endpoint protection, check out&amp;nbsp;our &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI aria-setsize="-1" data-leveltext="" data-font="Symbol" data-listid="3" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;To learn more about Microsoft Security solutions, visit our&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Bookmark the&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;https://www.microsoft.com/security/blog/&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;to keep up with our expert coverage on security matters. Follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;https://www.linkedin.com/showcase/microsoft-security/&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;https://twitter.com/@MSFTSecurity&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559740&amp;quot;:278}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 03 Mar 2026 03:25:40 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/transparent-and-customizable-onboarding-for-modern-and-legacy/ba-p/4498827</guid>
      <dc:creator>Sinclaire_Hamilton</dc:creator>
      <dc:date>2026-03-03T03:25:40Z</dc:date>
    </item>
    <item>
      <title>Introducing library management in Microsoft Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-library-management-in-microsoft-defender/ba-p/4494434</link>
      <description>&lt;P&gt;In dynamic investigation environments, preparation and agility are key. Security analysts working with live response in Microsoft Defender often rely on scripts and tools to triage, investigate, and remediate threats. Until now, these assets had to be uploaded during active sessions, limiting manageability and increasing time to action.&lt;/P&gt;
&lt;P&gt;Recognizing the need for better readiness and control, Defender now introduces a more proactive and efficient way to manage these assets: &lt;STRONG&gt;library management&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;The new library management experience in Defender brings powerful enhancements to how security teams manage scripts and files used in live response. With this centralized and streamlined interface, analysts no longer need to wait for an active session to organize their investigation tools everything can now be managed proactively, directly from the portal. This enhancement in Defender’s live response tooling improves operational readiness, enhances visibility and control, and helps streamline response workflows across SOC teams.&lt;/P&gt;
&lt;H4&gt;What’s new in library management?&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Centralized script and file management – &lt;/STRONG&gt;Security teams can now upload, manage, and clean up their entire collection of Live Response scripts and files outside of an active investigation. This proactive approach allows better preparation and alignment across analysts.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Upload in advance – &lt;/STRONG&gt;Easily upload PowerShell scripts, batch files, or other response tools ahead of time, so they're immediately accessible when needed during an investigation.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;View script contents in the portal – &lt;/STRONG&gt;No need to switch tools, analysts can review script contents directly within the Defender UI to validate logic and confirm functionality before execution.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Clean and organize – &lt;/STRONG&gt;Outdated or redundant scripts can be deleted with a click, keeping your library lean, relevant, and audit-friendly.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Boost analyst understanding with Copilot – &lt;/STRONG&gt;Understanding unfamiliar scripts can slow down investigations. That’s where &lt;STRONG&gt;Microsoft &lt;/STRONG&gt;&lt;STRONG&gt;Security Copilot &lt;/STRONG&gt;comes in.&lt;/P&gt;
&lt;P&gt;Copilot automatically analyzes scripts in the library and provides:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Summarized behavior descriptions&lt;/LI&gt;
&lt;LI&gt;Security-relevant insights&lt;/LI&gt;
&lt;LI&gt;Execution risk context&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This makes it easier for analysts—especially those new to a team or handling inherited tools—to assess what a script does before running it, reducing errors and increasing confidence.&lt;/P&gt;
&lt;H4&gt;Get started today&lt;/H4&gt;
&lt;P&gt;You can access the Library Management experience from the &lt;STRONG&gt;live response &lt;/STRONG&gt;&lt;STRONG&gt;page&lt;/STRONG&gt; in the Microsoft Defender portal. Start uploading your investigation tools, explore script previews, and let Copilot assist in surfacing the intent and behavior of your scripts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;&lt;img /&gt;&lt;img /&gt;</description>
      <pubDate>Tue, 17 Feb 2026 17:52:18 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/introducing-library-management-in-microsoft-defender/ba-p/4494434</guid>
      <dc:creator>amibarayev</dc:creator>
      <dc:date>2026-02-17T17:52:18Z</dc:date>
    </item>
    <item>
      <title>Ignite 2025: Microsoft Defender now prevents threats on endpoints during an attack</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ignite-2025-microsoft-defender-now-prevents-threats-on-endpoints/ba-p/4470805</link>
      <description>&lt;P&gt;This year at Microsoft Ignite, Microsoft Defender is announcing exciting innovations for endpoint protection that help security teams deploy faster, gain more visibility, and proactively block attackers during active attacks:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Predictive shielding:&lt;/STRONG&gt; Defender is the first security solution to not only respond instantly during an attack but also jump ahead of attackers, predicting and preventing the next move before it happens with just-in-time hardening controls that block specific attacker techniques to protect critical assets.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Custom data collection:&lt;/STRONG&gt; &lt;SPAN data-teams="true"&gt;Defender is now the only endpoint protection solution that allows data-hungry security teams to meet specific telemetry needs by optimizing their data collection right within the Defender portal, without the need to rely on fragmented and siloed solutions.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanded Defender support for legacy Windows devices:&lt;/STRONG&gt; Better protect vulnerable legacy devices with consistent OS support of Microsoft Defender capabilities across Windows 7 &amp;amp; Windows 2008 R2 and higher.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Defender deployment tool:&lt;/STRONG&gt; Streamline the onboarding process with a lightweight tool that dynamically adapts to the operating system, delivering healthy endpoint security to a diverse estate of Windows and Linux devices.&lt;/LI&gt;
&lt;/UL&gt;
&lt;div data-video-id="https://www.youtube.com/watch?v=jDRmPoXIaL8/1763478450033" data-video-remote-vid="https://www.youtube.com/watch?v=jDRmPoXIaL8/1763478450033" class="lia-video-container lia-media-is-center lia-media-size-large"&gt;&lt;iframe src="https://cdn.embedly.com/widgets/media.html?url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DjDRmPoXIaL8&amp;amp;type=text%2Fhtml&amp;amp;schema=google&amp;amp;display_name=YouTube&amp;amp;src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FjDRmPoXIaL8" allowfullscreen="" style="max-width: 100%"&gt;&lt;/iframe&gt;&lt;span class="lia-media-caption-text"&gt;&lt;EM&gt;&lt;SPAN data-olk-copy-source="MailCompose"&gt;Video: Check out what's new in endpoint protection with Defender&lt;/SPAN&gt;&lt;/EM&gt;&lt;/div&gt;
&lt;H3&gt;Jump ahead of attackers: autonomous defense, real results&lt;/H3&gt;
&lt;P&gt;&lt;A href="http://Aka.ms/disrupt-ebook" target="_blank" rel="noopener"&gt;Automatic attack disruption&lt;/A&gt; is a capability unique to Microsoft Defender that contains attacks wherever they appear in your environment. It automatically detects and disrupts in-progress attacks with over 99% confidence, disrupting ransomware in an average of 3 minutes. In recent months, it disabled nearly half a million compromised accounts while saving over 270,000 devices.&lt;/P&gt;
&lt;P&gt;But today’s landscape is relentless: over 80% of advanced attacks are multi-stage and persistent, forcing defenders to be perfect over and over again. Even in the face of this incessant threat, the industry-wide approach of reactively responding to attacks is accepted as the best we can do. Until now.&lt;/P&gt;
&lt;P&gt;Today we are thrilled to move the bounds of endpoint protection by introducing &lt;STRONG&gt;predictive shielding&lt;/STRONG&gt;, a groundbreaking, &lt;EM&gt;proactive&lt;/EM&gt; capability of attack disruption.&lt;/P&gt;
&lt;P&gt;It acts in two steps:&lt;/P&gt;
&lt;P&gt;1. As soon as a compromised asset is contained, Defender&amp;nbsp;&lt;STRONG&gt;predicts&lt;/STRONG&gt; the attack paths and tactics the adversary will use next, in many cases narrowing down tens of thousands of possible pathways to just a few with the highest likelihood.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Image 1: Defender predicts the path and tactics an attacker will use&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;2. Then, it jumps ahead of the attacker and &lt;STRONG&gt;shields&lt;/STRONG&gt; those pathways by using just-in-time hardening methods, giving the attacker nowhere to go.&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;&lt;EM&gt;Image 2: Defender shields the path with just-in-time hardening tactics&lt;/EM&gt;&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;So how can Defender do this when no one else can? It comes down to a combination of our unique visibility, leading threat intelligence, and AI-powered innovation. Defender uses AI technology to analyze the attack as it’s happening, identifying patterns of known attackers based on Microsoft’s deep threat intelligence, and then applies that to our unique understanding of the organization’s environment based on graph insights and integration as part of the Microsoft platform. With all this context, Defender can identify common attack techniques, which assets they’re trying to get to, and how they’ll try to get there.&lt;/P&gt;
&lt;P&gt;Based on these insights, Defender deploys innovative hardening capabilities that block specific attacker tactics and turn on as the attack is underway, just before an attacker attempts to use those tactics. Today we are starting with hardening capabilities seen in sophisticated ransomware campaigns, including group policy objects (GPO), safe mode reboot for tampering, and domain account compromise.&lt;/P&gt;
&lt;P&gt;While the precision of predictive shielding allows us to block operations surgically, security teams remain in command, with full visibility and control. All collected data and predictive shielding actions are available for investigation in the Defender portal, with controls that allow security teams to turn off hardening tactics with one click.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Image 3: The Defender portal provides full visibility into predictive shielding actions, with the option to turn them off&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;Ready to see the future of autonomous defense? Join us online or in person for our&amp;nbsp;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK240" target="_blank" rel="noopener"&gt;Microsoft Ignite session on November 20&lt;SUP&gt;th&lt;/SUP&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;H3&gt;See the data you want to see, right in Defender&lt;/H3&gt;
&lt;P&gt;Security teams today are data savvy and are always looking for full visibility into their telemetry. Defender has long provided over 200 types of raw event types, each enriched with numerous properties and accessible through the threat hunting experience in the Defender portal. But each organization has unique data requirements, so many security teams use complex add-on products to collect and analyze additional data, contributing to the already overwhelming number of solutions they’re using.&lt;/P&gt;
&lt;P&gt;That’s why today we’re announcing the ability to collect and hunt across custom data right within the Defender portal. You can now easily build custom data collection rules based on your organization’s specific needs using natural language; no PhD required! We are releasing several new data types that can be collected, for example the highly requested AMSI for hunting over script content, and Kerberos for hunting auth-based and network attacks.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Image 4: Easily create custom data collection rules in the Defender portal&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;This truly integrated custom data offering is possible thanks to Microsoft’s platform approach, as the additional telemetry can be collected and analyzed via Defender and stored via Microsoft Sentinel. This expansion puts you in complete control of any customized, add-on data, including exactly which data types are collected and how long they are stored. No other security solution has fully integrated and customizable telemetry collection and analysis.&lt;/P&gt;
&lt;H3&gt;Expanded support for Windows 7 and 2008 R2&lt;/H3&gt;
&lt;P&gt;Upgrading to the latest versions of each operating system as soon as possible is critical to optimize your security, but we understand that this is simply not realistic for many organizations. Our data shows that more than 90% of enterprises continue to have at least some legacy devices in their environment. Attackers know they present gaps in even the tightest security posture. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;That’s why today we are improving Defender’s coverage with expanded support for Windows 7 and Windows 2008 R2 to help you keep your legacy systems protected. We know that many organizations have Windows 7 and 2008 R2 in their environments, and it’s a critical milestone for us to support customers in bringing a consistent endpoint protection capability set across OS versions with Microsoft Defender.&lt;/P&gt;
&lt;img&gt;&lt;EM&gt;Image &lt;/EM&gt;&lt;EM&gt;5: Operating system coverage with Microsoft Defender&lt;/EM&gt;&lt;/img&gt;
&lt;P&gt;This new release further expands Defender support to the broad set of Windows, macOS, iOs, Android, and Linux versions listed in image 5. We’re committed to meeting you where you are to help you protect the most vulnerable points in your environment, so we are always evaluating demand and will continue to expand our coverage moving forward.&lt;/P&gt;
&lt;H3&gt;Simplified deployment for Windows and Linux&lt;/H3&gt;
&lt;P&gt;Organizations are faced with the challenge of securing diverse device fleets spanning multiple operating systems, hardware configurations, and user scenarios. Historically, the more diverse your operating system estate, the more complex your onboarding process, because it often requires a combination of endpoint management solutions like Microsoft Intune, but also scripts, downloads, and multiple manual installations to ensure coverage.&lt;/P&gt;
&lt;P&gt;To help security teams onboard simply and securely, we’ve built new Defender deployment tools for Windows and Linux, which handle the entire process for you. Just download a single package and it will dynamically adapt to the operating system, take care of prerequisites, and install the latest version of Defender available as needed for older devices that don’t have it already built in. The Defender deployment tools eliminate friction, automate tricky steps, and provide predictability throughout the onboarding journey.&lt;/P&gt;
&lt;P&gt;They also have several controls built in that allow you to test for issues before onboarding and can accommodate complex scenarios like virtual desktop infrastructure. For customers of Microsoft Intune and Microsoft Defender for Cloud, the Defender deployment tools work in tandem, available to use for legacy systems or complex scenarios.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This release is the latest step in our journey to secure diverse device environments and sets the foundation for a unified and intuitive deployment experience—one that meets the demands of modern IT and security teams across organizations of all sizes.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;We hope you’ll join us online or in San Francisco for our &lt;/STRONG&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK240" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Microsoft Ignite session on November 20&lt;SUP&gt;th&lt;/SUP&gt;&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; &lt;/STRONG&gt;to learn more about these and other exciting announcements in Defender’s industry-leading endpoint protection.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Featured sessions:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/BRK240" target="_blank" rel="noopener"&gt;BRK240: Endpoint security in the AI era: What's new in Defender&lt;/A&gt;; November 20&lt;SUP&gt;th&lt;/SUP&gt; 9:45am PT&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://ignite.microsoft.com/en-US/sessions/THR747" target="_blank" rel="noopener"&gt;THR747: Disrupt ransomware attacks before harm occurs with Microsoft Defender&lt;/A&gt;; November 21&lt;SUP&gt;st&lt;/SUP&gt; 9:30am PT&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://ignite.microsoft.com/en-US/sessions/BRK241" target="_blank" rel="noopener"&gt;BRK241: Microsoft Defender: Building the agentic SOC with guest Allie Mellen&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;; November 19&lt;/SPAN&gt;&lt;SUP style="color: rgb(30, 30, 30);"&gt;th&lt;/SUP&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; 9:00am PT&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A style="font-style: normal; font-weight: 400; background-color: rgb(255, 255, 255);" href="https://ignite.microsoft.com/en-US/sessions/BRK246" target="_blank" rel="noopener"&gt;BRK246: Blueprint for building the SOC of the future&lt;/A&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt;November 19&lt;/SPAN&gt;&lt;SUP style="color: rgb(30, 30, 30);"&gt;th&lt;/SUP&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; 4:00pm PT&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Related resources:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-xdr/shield-predict-threats" target="_blank" rel="noopener"&gt;Learn more about predictive shielding&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/custom-data-collection" target="_blank" rel="noopener"&gt;Learn more about custom data collection&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/defender-endpoint/onboard-downlevel" target="_blank" rel="noopener"&gt;Learn more about Defender endpoint security for Windows 7 SP1 and Windows Server 2008 R2 SP1 devices&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/defender-endpoint/defender-deployment-tool-windows" target="_blank" rel="noopener"&gt;Deploy Microsoft Defender on Windows devices using the Defender deployment tool&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/defender-endpoint/linux-install-with-defender-deployment-tool" target="_blank" rel="noopener"&gt;Deploy Microsoft Defender on Linux devices using the Defender deployment tool&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To learn more about Defender’s endpoint protection, visit our&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;website.&lt;/A&gt;&amp;nbsp;Bookmark &lt;A href="https://techcommunity.microsoft.com/category/microsoft-defender-for-endpoint/blog/microsoftdefenderatpblog" target="_blank" rel="noopener"&gt;our blog&lt;/A&gt; to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;Microsoft Security&lt;/A&gt;) and X (&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;@MSFTSecurity&lt;/A&gt;) for the latest news and updates on cybersecurity.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 21:50:11 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/ignite-2025-microsoft-defender-now-prevents-threats-on-endpoints/ba-p/4470805</guid>
      <dc:creator>clairelevy</dc:creator>
      <dc:date>2025-11-20T21:50:11Z</dc:date>
    </item>
    <item>
      <title>End of Windows 10 Support: What Defender Customers Need to Know</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/end-of-windows-10-support-what-defender-customers-need-to-know/ba-p/4461349</link>
      <description>&lt;P&gt;As of today, October 14, 2025, Microsoft is officially ending support for Windows 10. This means that Windows 10 devices will no longer receive security or feature updates, nor technical support from Microsoft. While these devices will continue to operate, the lack of regular security updates increases vulnerability to cyber threats, including malware and viruses. Applications running on Windows 10 may also lose support as the platform stops receiving updates.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Will Defender continue to protect Windows 10 devices?&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Defender supports a range of legacy systems, including Windows 10. (&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/minimum-requirements#windows-versions-supported-by-defender-for-endpoint" target="_blank" rel="noopener"&gt;See here for a full list of supported operating systems&lt;/A&gt;.) Microsoft Defender will continue to provide detection and protection capabilities to the extent possible on Windows 10 and other legacy systems. Keep in mind that security solutions on legacy systems are inherently less secure and may not be able to receive all new features, so please review the next section for important actions you can take.&lt;/LI&gt;
&lt;LI&gt;For Windows 10 customers without Defender, Microsoft will continue to provide security intelligence updates for the built-in Microsoft Defender Antivirus protection through October 2028. Of course, Defender Antivirus alone isn't a comprehensive risk mitigation posture without Microsoft Defender detection and response deployed across your digital estate.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;What should customers do to protect their Windows 10 devices?&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Upgrade to Windows 11:&lt;/STRONG&gt;&lt;BR /&gt;Moving to Windows 11 is strongly recommended for PCs eligible to upgrade. Windows 11 delivers the latest security features, improved performance, and ongoing support at no additional cost. This is the best way to ensure your endpoints remain protected and compliant. Devices running Windows 10 will be more vulnerable, even with ongoing security intelligence updates (SIUs).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Extended security update (ESU) program:&lt;/STRONG&gt;&lt;BR /&gt;If upgrading isn’t immediately possible, Microsoft offers an ESU program for Windows 10. The ESU program provides critical and important security updates but does not include new Windows features or technical support.
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Enterprise customers&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; can purchase ESU for up to three years or receive it at no additional cost with a Windows 365 subscription.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Cloud and virtual environments:&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; Windows 10 devices accessing Windows 11 Cloud PCs via Windows 365 or Virtual Machines are entitled to ESU at no extra cost, with automatic updates.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="color: rgb(30, 30, 30);"&gt;Consumer customers&lt;/STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; have options to enroll for one year of ESU, including free enrollment methods in certain regions.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;For further guidance, check out the posts below or connect with your Microsoft account team.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2FEN-US%2Fwindows%2Fend-of-support%3Ficid%3DSSM_Search_Windows10Endofsupport_Surface_CTA2%26r%3D1&amp;amp;data=05%7C02%7Cclairelevy%40microsoft.com%7C4ee4051be7084171eaac08ddfc6de8d7%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638944271958205169%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=S0l3cqfkZruk6Vzrn%2BmBobiStEyfEKf1yCMQFPIRkQQ%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;End of support for Windows 10, Windows 8.1, and Windows 7 | Microsoft Windows&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblogs.windows.com%2Fwindowsexperience%2F2024%2F10%2F31%2Fhow-to-prepare-for-windows-10-end-of-support-by-moving-to-windows-11-today%2F&amp;amp;data=05%7C02%7Cclairelevy%40microsoft.com%7C4ee4051be7084171eaac08ddfc6de8d7%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638944271958222025%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=Prgj2vHNp%2FmoJ%2Fg9wK0SbaQg9Q5yIVUZvp51V7Z3cGo%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;How to prepare for Windows 10 end of support by moving to Windows 11 today | Windows Experience Blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Flearn.microsoft.com%2Fen-us%2Fwindows%2Fwhats-new%2Fextended-security-updates&amp;amp;data=05%7C02%7Cclairelevy%40microsoft.com%7C4ee4051be7084171eaac08ddfc6de8d7%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638944271958343460%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=p6hv5Vaa9vEVx%2FzAGP1JbiUQ7IV1IdIpATE0mVwmdxs%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;Extended Security Updates (ESU) program for Windows 10 | Microsoft Learn&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To learn more about Microsoft Security solutions, visit our&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;website.&lt;/A&gt;&amp;nbsp;Bookmark the&amp;nbsp;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;Security blog&lt;/A&gt;&amp;nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;Microsoft Security&lt;/A&gt;) and X (&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;@MSFTSecurity&lt;/A&gt;) for the latest news and updates on cybersecurity.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2025 16:26:01 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/end-of-windows-10-support-what-defender-customers-need-to-know/ba-p/4461349</guid>
      <dc:creator>clairelevy</dc:creator>
      <dc:date>2025-10-14T16:26:01Z</dc:date>
    </item>
    <item>
      <title>Multi-tenant endpoint security policies distribution is now in Public Preview</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/multi-tenant-endpoint-security-policies-distribution-is-now-in/ba-p/4439929</link>
      <description>&lt;P&gt;We’re excited to announce a key milestone in Defender’s multi-tenant management journey—Microsoft Defender for Endpoint security policies can now be distributed across multiple tenants from the Defender multi-tenant portal. This capability empowers security teams to manage policies at scale, ensuring consistency and saving valuable time.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What is content distribution?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Content distribution is a powerful Defender feature that enables scalable management of content across tenants. With this capability, you can create content distribution profiles in the multi-tenant portal that allow you to seamlessly replicate existing content—such as custom detection rules and now, endpoint security policies—from a source tenant to designated target tenants. Once distributed, the content runs on the target tenant, enabling centralized control with localized execution.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;How it works&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI&gt;Security policies are now a selectable content type when creating a distribution profile.&lt;/LI&gt;
&lt;LI&gt;Simply choose existing policies from your home tenant and add them to the distribution profile. You can also decide which Microsoft Entra group(s) will be applied as scope. Policy targeting will be based on the Entra device groups that exist in every tenant, and you select the relevant groups for each tenant.&lt;/LI&gt;
&lt;LI&gt;Upon completion, policies are automatically distributed to the selected tenants and are applied on the targeted machines.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;img /&gt;
&lt;P&gt;Distributed policies also appear in a hierarchical view, with the original policy serving as the parent. You can find the policies that were distributed from the tenant under the original policy. This appears on the endpoint security policies page within multi-tenant management.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;The&amp;nbsp;last distribution status&amp;nbsp;for the original policy reflects the overall status of its distributed copies, and the&amp;nbsp;tenants&amp;nbsp;and&amp;nbsp;tenant groups&amp;nbsp;sections indicate the recipients of the policy.&lt;/P&gt;
&lt;P&gt;At any time, you can update the policies, tenants, scope or any other settings, and sync to apply these changes.&lt;/P&gt;
&lt;P&gt;This new capability enables consistency (maintaining uniform security posture across tenants), efficiency (eliminating manual duplication and reducing operational overhead), and scalability (easily expanding coverage as the tenant landscape grows).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;FAQ&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What pre-requisites are required?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Access to more than one tenant with Microsoft Defender for Endpoint, with delegated access via Azure B2B or GDAP (CSP Partners only), using the multi-tenant management capability.&lt;/LI&gt;
&lt;LI&gt;A subscription to Microsoft 365 E5 or Office E5.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;What permissions are needed to distribute MDE security policies?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;To access endpoint security policies, users require the security administrator role in each relevant tenant.&lt;/LI&gt;
&lt;LI&gt;To distribute content using multi-tenant management content distribution, the Security settings (manage) or Security Data Basic (read) permission is required. Both roles are assigned to the Security Administrator and Security Reader Microsoft Entra built-in roles by default.&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Can I update or expand distribution profiles later?&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;Yes. You can add more content, include additional tenants, or modify scopes as needed.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For more information, see&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/unified-secops-platform/mto-distribution-profiles" target="_blank" rel="noopener"&gt;Content distribution in multitenant management&lt;/A&gt;. To get started, navigate to the&amp;nbsp;&lt;A class="lia-external-url" href="https://mto.security.microsoft.com/contentdistribution" target="_blank" rel="noopener"&gt;Content distribution page&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;To learn more about Microsoft Defender's endpoint protection, check out our &lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank"&gt;website&lt;/A&gt; and &lt;A href="https://youtu.be/BUGoxeoSffs" target="_blank"&gt;video&lt;/A&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN data-contrast="none"&gt;To learn more about Microsoft Security solutions, visit our &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; Bookmark the &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; to keep up with our expert coverage on security matters. Follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;@MSFTSecurity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 07 Aug 2025 16:17:41 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/multi-tenant-endpoint-security-policies-distribution-is-now-in/ba-p/4439929</guid>
      <dc:creator>tomasbeerthuis</dc:creator>
      <dc:date>2025-08-07T16:17:41Z</dc:date>
    </item>
    <item>
      <title>Maintain connectivity for essential services with selective network isolation</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/maintain-connectivity-for-essential-services-with-selective/ba-p/4422938</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Network isolation&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; refers to how Microsoft Defender for Endpoint restricts a compromised device’s communication within the network in order to contain threats and prevent lateral movement. But oftentimes when isolating devices, certain critical services like management tools or security solutions need to remain operational.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;That's why Defender for Endpoint has launched selective isolation exclusions, which allow you to exclude specific devices, processes, IP addresses, or services from unilateral network isolation actions. This allows essential functions (e.g., remote remediation or monitoring) to continue in the event of a breach, while limiting broader network exposure.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Isolation Modes&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;There are two modes available:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="%1." data-font="Aptos" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Full isolation&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI data-leveltext="%1." data-font="Aptos" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;In this mode, the device is completely isolated from the network, and no exceptions are allowed. All traffic is blocked, except for essential communications with the Defender agent.&lt;/LI&gt;
&lt;LI data-leveltext="%1." data-font="Aptos" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;Exclusions cannot be applied in full isolation mode. This is the most secure option, suitable for scenarios where a high level of containment is necessary.&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="%1)" data-font="" data-listid="17" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1)&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;,&amp;quot;469778510&amp;quot;:&amp;quot;numbered&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;[New] Selective isolation&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI data-leveltext="%1)" data-font="" data-listid="17" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1)&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;,&amp;quot;469778510&amp;quot;:&amp;quot;numbered&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;Selective isolation allows administrators to apply exclusions to ensure that critical tools and network communications can still function, even while maintaining the device’s isolated state.&lt;/LI&gt;
&lt;LI data-leveltext="%1)" data-font="" data-listid="17" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1)&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;,&amp;quot;469778510&amp;quot;:&amp;quot;numbered&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;⚠️&amp;nbsp;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Note:&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);"&gt; &lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Any exclusion weakens device isolation and increases security risks. To minimize risk, configure exclusions only when absolutely necessary. Regularly review and update exclusions to align with security policies.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To get started, r&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;ead the &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/isolation-exclusions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;isolation exclusions documentation&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Learn more&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To learn more about Microsoft Security solutions, visit our&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;Bookmark the&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;@MSFTSecurity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:150}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jun 2025 16:29:44 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/maintain-connectivity-for-essential-services-with-selective/ba-p/4422938</guid>
      <dc:creator>amibarayev</dc:creator>
      <dc:date>2025-06-25T16:29:44Z</dc:date>
    </item>
    <item>
      <title>Microsoft’s participation in MITRE ATT&amp;CK® Evaluations: Enterprise 2025</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-s-participation-in-mitre-att-ck-evaluations-enterprise/ba-p/4422639</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft has a long-standing&amp;nbsp;relationship with MITRE and&amp;nbsp;holds&amp;nbsp;deep respect for the&amp;nbsp;unique&amp;nbsp;role that&amp;nbsp;the organization&amp;nbsp;plays&amp;nbsp;within the&amp;nbsp;security ecosystem.&amp;nbsp;&amp;nbsp;MITRE&amp;nbsp;ATT&amp;amp;CK&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;®&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;Evaluations&amp;nbsp;have&amp;nbsp;been instrumental in helping&amp;nbsp;us&amp;nbsp;improve our products.&amp;nbsp;We are grateful for their&amp;nbsp;invaluable&amp;nbsp;contributions&amp;nbsp;in advancing security&amp;nbsp;for all.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;After extensive deliberation, Microsoft has decided to not participate in the evaluation this year. This decision allows us to focus all our resources on the Secure Future Initiative and on delivering product innovation to our customers. We look forward to continuing our collaboration with the MITRE team and wish them all the best for this year’s evaluation.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jun 2025 19:00:00 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-s-participation-in-mitre-att-ck-evaluations-enterprise/ba-p/4422639</guid>
      <dc:creator>KarthikSelvaraj</dc:creator>
      <dc:date>2025-06-13T19:00:00Z</dc:date>
    </item>
    <item>
      <title>Behavior monitoring is now generally available for Microsoft Defender for Endpoint on macOS</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/behavior-monitoring-is-now-generally-available-for-microsoft/ba-p/4415697</link>
      <description>&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Enhancing macOS security with behavior monitoring&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As attackers become more sophisticated in today’s rapidly evolving threat landscape, security strategies must continue to innovate to keep pace. For instance, static signature-based approaches to malware detection are useful but not enough. Rather, when combined with more dynamic forms of detection like behavior monitoring, your environment is better equipped to block new and evolving threats. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Behavior monitoring observes how software behaves in real-time to detect and analyze potential threats based on the behavior of the applications, daemons, and files within your system. Behavior monitoring is a cornerstone of Microsoft Defender’s cloud-based protection strategy. A wide array of our most advanced protection capabilities rely on behavior monitoring’s cloud models to not only detect but also effectively respond to complex and evolving threats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;EM&gt;Today, we’re excited to announce that behavior monitoring is now generally available on macOS, and is rolling out broadly over the course of the next few weeks.&lt;/EM&gt; Like with Windows and Linux, behavior monitoring for macOS extends Defender for Endpoint’s protection beyond static signatures to track the larger scale relationships between processes.&amp;nbsp; This capability significantly enhances the early detection of suspicious or malicious activities by spotting unusual process interactions and patterns.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;SPAN data-contrast="none"&gt;What does this mean for customers?&lt;/SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By extending this critical technology to macOS, customers will benefit from a consistent level of protection across all of their devices. Behavior monitoring introduces a rich new stream of telemetry that helps lay important groundwork for advancing innovative protections against threats targeting macOS users. In the future, it will be possible to build custom logic based on the process and file system events supported by behavior monitoring, equipping you with a more dynamic and tailored way to secure your endpoints.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Real-world example of behavior monitoring&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Let's understand the significance of this feature. The Atomic macOS Stealer (AMOS) is a sophisticated macOS malware engineered to steal sensitive information from systems. It targets a broad spectrum of data, including Keychain passwords, system information, files from desktop and documents folders, macOS user passwords, browser data (such as cookies and login credentials), and cryptocurrency wallets. To evade detection, AMOS employs obfuscation techniques like XOR encryption, making its payloads challenging to identify through static analysis alone. Due to its advanced nature, effective detection of AMOS necessitates dynamic analysis and behavior detection methods, rather than relying solely on static signature-based approaches.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Behavior monitoring alerts are displayed in the &lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender XDR portal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; &lt;SPAN data-contrast="none"&gt;alongside all other alerts, enabling effective investigation.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:2,&amp;quot;335551620&amp;quot;:2,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;The following image in the Microsoft Defender XDR portal shows that Defender detected and terminated a suspicious action using behavior monitoring on macOS.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;The following image is an alert in the Microsoft Defender XDR portal that shows that a suspicious action was blocked using behavior monitoring technology.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To experience the Mac antivirus behavior monitoring and blocking, users will need a minimum version Microsoft Defender for Endpoint, which is &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;101.25032.0006.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;Availability&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Our macOS behavior monitoring and blocking capabilities are available on the following major versions of Mac currently supported by Microsoft Defender for Endpoint:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-style: italic;" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;macOS Ventura (13)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-90,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-style: italic;" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;macOS Sonoma (14)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-90,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="font-style: italic;" data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;macOS Sequoia (15)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-90,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Behavior Monitoring is being rolled out automatically following our &lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/microsoft-defender-for-endpoint%e2%80%99s-safe-deployment-practices/4220342" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;afe &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;d&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;eployment &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;p&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ractices (SDP)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; per the schedule below.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="styles_lia-table-wrapper__h6Xo9 styles_table-responsive__MW0lN"&gt;&lt;table border="1" style="border-width: 1px;"&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Channel&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Staring Date&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;App Version&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;External&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;3/31/2025&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;gt; 101.25042.0002&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Production&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;5/19/2025&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;td&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;gt; 101.25032.0006&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-teams="true"&gt;Once fully deployed, behavior monitoring will be on by default for everyone.&lt;/SPAN&gt; You can confirm your device’s enrollment status by checking the output of &lt;SPAN class="lia-text-color-20"&gt;&lt;EM&gt;&lt;STRONG&gt;mdatp health --details&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="lia-text-color-20"&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp;features&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; in your terminal.&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;If your device is not yet enabled automatically, you can enable it manually. &lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Enabling Behavior Monitoring&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For customers that need to change the settings of behavior monitoring, you can use &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/behavior-monitor-macos#intune-deployment" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Intune&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; or a &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/behavior-monitor-macos#jamf-deployment" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;3&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-fontsize="12" data-ccp-charstyle="Hyperlink"&gt;rd&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; party MDM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for enterprises or &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/behavior-monitor-macos#manual-deployment" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;manually&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; using &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="lia-text-color-20"&gt;&lt;EM&gt;sudo mdatp config behavior-monitoring&lt;/EM&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; for a trial deployment.&amp;nbsp; Support for behavior monitoring in Defender for Endpoint’s &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/mde-security-settings-management" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ecurity &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;ettings &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;m&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;anagement&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; experience is expected this summer.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN data-contrast="auto"&gt;Additional resources for securing &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;macOS&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; with behavior monitoring&lt;/SPAN&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The following resources can help you optimize your macOS security and behavior monitoring settings:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Refer to &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/behavior-monitor-macos" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;the following article&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; for more details about configurations related to behavior monitoring.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Monitor the &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/mac-whatsnew" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;What's new in Microsoft Defender for Endpoint on Mac&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; page for upcoming announcements.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/enhancing-linux-antivirus-with-behavior-monitoring-capabilities/2226705" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Read this blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt; t&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&lt;SPAN data-contrast="auto"&gt;o learn more about how behavior monitoring works on Linux.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We welcome your feedback and look forward to hearing from you! You can submit feedback through the &lt;/SPAN&gt;&lt;A href="https://security.microsoft.com/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender XDR portal&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Learn more&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To learn more about Microsoft Security solutions, visit our &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; Bookmark the &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;@MSFTSecurity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:-630,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:60,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jun 2025 20:17:04 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/behavior-monitoring-is-now-generally-available-for-microsoft/ba-p/4415697</guid>
      <dc:creator>JoshBregman</dc:creator>
      <dc:date>2025-06-10T20:17:04Z</dc:date>
    </item>
    <item>
      <title>Manage global exclusion policies for Linux across both AV and EDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-global-exclusion-policies-for-linux-across-both-av-and/ba-p/4420127</link>
      <description>&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Create and manage global &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;exclusions for &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Linux&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;G&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;lobal exclusions for &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Microsoft Defender for Endpoint on Linux are now generally available&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;This will allow&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; security teams to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;create and&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; manage exclusion&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; that apply to&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;both &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;ntivirus&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; (AV) and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;e&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;ndpoint &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;d&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;etection and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;r&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;esponse&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; (EDR&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;)&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;—&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;helping reduce false positives, improve performance, and streamline security operations on Linux servers.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:true,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:120,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;Many organizations rely on exclusions to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;maintain&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;optimal&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; performance and ensure compatibility—especially in Linux server environments running custom applications or handling high&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; input/output&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; workloads. Until now, the absence of a unified exclusion scope across both AV and EDR made it challenging to tackle performance issues and avoid disruptions &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt; trusted software due to false positives.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:240,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;With global exclusions, organizations can now effortlessly exclude specific files, folders, and processes from both AV and EDR using a single, centralized configuration—ensuring consistent protection, improved accuracy, and better performance across their Linux workloads.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335557856&amp;quot;:16448250,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;Key benefits&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="19" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Unified scope for antivirus + endpoint detection and response&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: Apply exclusions across both antivirus and endpoint detection and response using a single exclusion scope called “Global”.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Mitigation of performance issues&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Helps address performance issues—such as high CPU and memory usage—by excluding noisy processes.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Reduced false positives:&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;Avoid flagging known and trusted files or custom applications unique to your environment. By excluding trusted files and processes—such as Tanium&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;used in endpoint management—you can avoid incorrect detections and focus on high-fidelity signals.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="20" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Centralized, scalable management:&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; Configure exclusions via security settings management using the Defender portal, Microsoft Intune, or JSON-based policies.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;How it works&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233279&amp;quot;:true,&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Global exclusions in Microsoft Defender for Endpoint for Linux are applied at the sensor level. This early-stage filtering helps eliminate noise from trusted sources before any pre-processing by antivirus or &lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;e&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;ndpoint &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;d&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;etection and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;r&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="Normal (Web)"&gt;esponse &lt;/SPAN&gt;&lt;/SPAN&gt;engines. By default, these exclusions apply to real-time protection and passive mode, but not to on-demand custom scans. Here’s the summary of how it works:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Scope&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: Applies to both real-time protection and EDR detections on Linux. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;It does not impact on-demand scans.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Supported types&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;: You can exclude files, folders and processes&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:360,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Configuration options&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240,&amp;quot;469777462&amp;quot;:[720],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI style="list-style-type: none;"&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"&gt;&lt;SPAN data-contrast="auto"&gt;Microsoft Defender portal: &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Use the built-in security settings management experience.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"&gt;Microsoft Intune&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;: Use the endpoint security blade to define and deploy exclusion policies.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="22" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:1080,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;multilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="2"&gt;JSON-based policies&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;: For advanced deployments, exclusions can be defined in managed JSON and deployed via configuration management tools.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:240,&amp;quot;469777462&amp;quot;:[1440],&amp;quot;469777927&amp;quot;:[0],&amp;quot;469777928&amp;quot;:[8]}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;&lt;SPAN data-contrast="auto"&gt;This flowchart shows when and where global exclusions are applied in the context of Microsoft Defender for Endpoint on Linux.&lt;/SPAN&gt;&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="1"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Getting started&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:360,&amp;quot;335559739&amp;quot;:80,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;For detailed guidance on how to configure, validate, and manage global exclusions&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;,&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; please refer to our documentation: &lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/linux-exclusions" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Configure and validate exclusions for Microsoft Defender for Endpoint on Linux - Microsoft Defender for Endpoint | Microsoft Learn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To start using global exclusions for Microsoft Defender for Endpoint on Linux, please upgrade to the latest version &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;101.24092.0001 &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;or above.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;</description>
      <pubDate>Thu, 05 Jun 2025 16:36:57 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-global-exclusion-policies-for-linux-across-both-av-and/ba-p/4420127</guid>
      <dc:creator>Rutuja_dange</dc:creator>
      <dc:date>2025-06-05T16:36:57Z</dc:date>
    </item>
    <item>
      <title>Discover how automatic attack disruption protects critical assets while ensuring business continuity</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/discover-how-automatic-attack-disruption-protects-critical/ba-p/4416597</link>
      <description>&lt;P aria-level="1"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;Protecting&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 1"&gt;c&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;ritical &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;a&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;sset&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 1"&gt;s&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:322,&amp;quot;335559739&amp;quot;:322}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Traditional security solutions often operate in a one-size-fits-all alert model that treats every detection equally, regardless of how important the asset is. But not all assets are equal. Critical assets are systems governing access, identity, or sensitive data. They are essential to an organization’s operations and security, for example, domain controllers, cloud connectivity gateways, key management servers, and others. If attackers compromise these assets, business continuity suffers at great scale. As these systems typically have less routine activity, any alert on them is far more significant.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Threat actors specifically target these high-value systems, meaning that even weaker signals need to be properly investigated. With short-staffed SOC teams, it has historically been a challenge to respond to these types of signals effectively. Given assets like domain controllers are the backbone to an organization’s daily operations, protecting critical infrastructure means proactively stopping adversaries &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;before&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; they inflict damage. So how do security solutions help SOC teams effectively protect critical assets while ensuring business continuity?&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To help security teams meet this challenge, Microsoft Defender developed automatic attack disruption: a built-in self-defense capability that identifies &amp;amp; disrupts multi-domain attacks in near real time to prevent further damage across the organization. We recently &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2025/04/09/how-cyberattackers-exploit-domain-controllers-using-ransomware/?msockid=1a665e69633567953e7a4b2062b1666a" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;announced&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; how we protect domain controllers against ransomware as the latest attack disruption innovation.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Behind the scenes, attack disruption uses a critical asset framework to achieve this outcome. This framework is developed from the latest threat research and tested internally within Microsoft’s security infrastructure to provide the context needed to differentiate true threats from noise for critical assets, empowering organizations to act decisively when it matters most. Using the native integration between Microsoft Defender for Endpoint and Microsoft Security Exposure Management, we can automatically identify critical assets in your environment and apply deep contextual insights based on each asset’s unique threat profile to disrupt attacks accordingly.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;This blog post dives into how this framework drives real impact, its core components, innovative methodology, and how it helps ensure that organizations are proactive and efficient in their defense strategy specifically for critical asset protection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Real world impact&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;By applying the critical asset framework, Microsoft Defender was able to disrupt attacks targeting high-value assets several days earlier in the kill chain in 40% of triggered incidents. This early intervention significantly reduces attacker dwell time, helping prevent impact and limit damage. Additionally, in another 40% of incidents, risk-based contextual insights transformed weak signals into clear, actionable disruption opportunities. These were unique incidents, false negatives in the past, that are now being surfaced and mitigated for the first time.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="3"&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;Neutralizing a human-operated attack on a global enterprise&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;’&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 3"&gt;s domain controller&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;In this scenario, a global enterprise was running multiple endpoint detection &amp;amp; response vendors in their environment, including Microsoft Defender for Endpoint. The organization was targeted by an advanced, human-operated attack on their domain controllers. Only Microsoft’s solution was able to stop the attack thanks to Defender’s early detection and disruption capabilities. The threat was neutralized before any damage could be inflicted, demonstrating the necessity of&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/automatic-attack-disruption" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;automatic attack&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt; disruption&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; in the fight against ransomware. Meanwhile, critical assets onboarded to the other vendor were impacted.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;
&lt;P&gt;Attack story showing automatic attack disruption saving domain controllers onboarded to Microsoft Defender for Endpoint whereas those onboarded to a different EDR solution were encrypted.&lt;/P&gt;
&lt;/img&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Core principles for protecting critical assets&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Now that you’ve seen how effective attack disruption is for protecting critical assets, let’s take a look at the core principles shaping our framework:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Prioritization and classification:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; By classifying assets based on their criticality and role we ensure that disruption actions are triggered precisely where they matter most. With fewer benign events on critical systems, every detection is more likely to reflect a genuine threat, enabling faster, more targeted responses that directly enhance client security and operational confidence.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Proactive, real-time defense:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Our context-driven approach enables early detection and disruption of threats, often stopping attacks days before they can cause significant harm.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;STRONG&gt;Adaptive and scalable:&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;Although our initial focus has been on domain controllers, the framework is designed to be flexible and protect a variety of other critical assets such as cloud connectivity solutions and publicly connected devices, based on each asset’s unique behavioral context.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;We take these principles and translate them into actionable detection and disruption actions tailored to protect critical assets from the sophisticated and persistent threats that they frequently face.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="2"&gt;&lt;STRONG&gt;&lt;U&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Under the hood of critical asset protection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI data-leveltext="%1." data-font="" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Asset classification:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; Our process starts by analyzing each asset’s role and criticality using Microsoft Security Exposure Management to identify and prioritize critical assets, guiding every disruption decision along the way.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="%1." data-font="" data-listid="8" data-list-defn-props="{&amp;quot;335552541&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769242&amp;quot;:[65533,0],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;%1.&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;STRONG&gt;Detector integration and management:&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;U&gt;Targeted detector selection:&lt;/U&gt;&amp;nbsp;&lt;SPAN data-contrast="auto"&gt;We have engineered a specialized set of detectors most relevant to high-value assets, g&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;uided by extensive asset-specific threat research&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;This ensures each critical asset is protected by detectors selected specifically for the threats it faces.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Automated quality evaluation:&lt;/U&gt;&lt;SPAN data-contrast="auto"&gt; Our system continuously assesses each detector’s signal-to-noise ratio and overall impact, deploying only those that meet our strict standards.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;U&gt;Integrated security platform:&lt;/U&gt;&amp;nbsp;&lt;SPAN data-contrast="none"&gt;A dedicated module orchestrates every step - from generating alerts and enriching them with context to automatically triggering the right containment or remediation action via one streamlined workflow.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Contextual disruption execution:&lt;/STRONG&gt; &lt;SPAN data-contrast="none"&gt;When a detector triggers on a critical asset, our framework immediately enriches the alert with detailed contextual telemetry. This enriched data is leveraged in several powerful ways. For example, events are correlated to accurately identify any impacted users - even when initial detections lack clear user data (such as when a malicious payload runs under the SYSTEM account via a service, where our framework traces the creator of the service). The framework also assesses remote activity to capture additional related entities, applying tailored threat lists specific to each asset type. These examples demonstrate how our context-driven approach transforms raw detections into precise, actionable intelligence that enable targeted responses like user containment and soon,&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/blog/microsoftthreatprotectionblog/automatic-attack-disruption-enhanced-containment-for-critical-assets-and-shadow-/4402157" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;IP containment for critical assets&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Where we’re heading&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As the threat landscape evolves, we continue investing in attack disruption’s ability to protect critical assets. Our roadmap includes:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Scaling through AI-driven behavioral coverage:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="auto"&gt; We’re shifting from a detector-centric approach to an AI-driven model that continuously learns from vast volumes of telemetry and behavioral patterns. We’re shifting the framework to identify and disrupt threats dynamically, improving precision, expanding coverage, and adapting faster than static rules ever could.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;Extending asset coverage:&lt;/STRONG&gt; &lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;Beyond domain controllers, upcoming iterations will include additional high-value assets such as Entra Connect Sync servers, internet-facing servers, SQLs servers, and more - providing comprehensive protection across your organization’s critical infrastructure.&lt;/SPAN&gt;&lt;SPAN style="color: rgb(30, 30, 30);" data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="6" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;STRONG&gt;Deepening integration:&lt;/STRONG&gt;&amp;nbsp;&lt;SPAN style="color: rgb(30, 30, 30);" data-contrast="auto"&gt;This innovation has been made possible through the integration between Microsoft Defender for Endpoint and Microsoft Security Exposure Management, which provides advanced asset classification. Our ongoing partnership ensures we continue to innovate and deliver tailored solutions that address unique client needs.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P aria-level="2"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;Conclusion&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The ability to protect critical assets represents a paradigm shift in cybersecurity, moving from reactive alerting to proactive, context-aware disruption that prioritizes not just alerts, but the assets themselves. By recognizing that not all assets carry the same risk, our approach ensures that protection efforts are focused where they matter most, enabling true end-to-end defense. By integrating advanced asset classification and context-driven intelligence into our security platform, we’re not only protecting critical systems like domain controllers but also empowering customers with decisive, actionable insights.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;As we continue to innovate, our commitment remains clear: to deliver intelligent, effective security solutions that safeguard your most vital assets against even the most advanced threats.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt; Learn more&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Explore these resources to stay updated on the latest automatic attack disruption capabilities and how we protect critical assets:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Learn more about &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender for Endpoint&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Read our latest security &lt;/SPAN&gt;&lt;A href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fblog%2F2025%2F04%2F09%2Fhow-cyberattackers-exploit-domain-controllers-using-ransomware%2F&amp;amp;data=05%7C02%7Ccaroll%40microsoft.com%7C7e36b39165754d5909bb08dd76d9377c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638797397551756393%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;amp;sdata=7yp1TNuwOgNibiVlJp8ADKyms8l9%2FCsKMWXoweIlKg4%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;blog &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;on how we protect against ransomware attacks using domain controllers.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Read about the &lt;/SPAN&gt;&lt;A href="https://aka.ms/containIP-HVA" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;new containment features&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;.&lt;SPAN data-contrast="none"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Learn how attack disruption safeguards your domain controllers in this &lt;/SPAN&gt;&lt;A href="https://www.youtube.com/watch?v=BUGoxeoSffs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;video&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Check out our latest &lt;/SPAN&gt;&lt;A href="https://aka.ms/disruptinfo" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;infographic&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="6" data-aria-level="1"&gt;&lt;SPAN data-contrast="none"&gt;Read about &lt;/SPAN&gt;&lt;A href="https://aka.ms/disruptdocs" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;automatic attack disruption&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To learn more about Microsoft Security solutions, visit our &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; Bookmark the &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;@MSFTSecurity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 18:40:02 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/discover-how-automatic-attack-disruption-protects-critical/ba-p/4416597</guid>
      <dc:creator>DorFenigshtein</dc:creator>
      <dc:date>2025-05-27T18:40:02Z</dc:date>
    </item>
    <item>
      <title>Defender for Endpoint successfully passes the AV-Comparatives 2025 Anti-Tampering Test</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-endpoint-successfully-passes-the-av-comparatives/ba-p/4414153</link>
      <description>&lt;P aria-level="2"&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;The rise of tampering&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; attacks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P aria-level="2"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;In cybersecurity, anti-tampering &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;protection r&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;efers to the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;defensive measur&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;es designed to prevent unauthorized modifications to security system&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;s, policies, and setting&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;s. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;When threat actors compromise an organization, they often start by tampering with security solutions&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; in an effort to&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 2"&gt;further exploit and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;achieve persistence within&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 2"&gt;the environment&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; Common tampering tactics include&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; disabling&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; or altering&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; antivirus and endpoint detection and response (EDR) tools&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;,&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; turning off real-time protection and security intelligence updates&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;editing &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;high-value &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;device and access policies, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;and creating exclusions that allow malicious activities to go undetected. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;After having tampered successfully&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;attackers gain valuable time to install malicious tools, exfiltrate data, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;move laterally, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;launch&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; ransomware&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt; attacks&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 2"&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335559738&amp;quot;:299,&amp;quot;335559739&amp;quot;:299}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;In recent years, Microsoft has observed a significant volume of attacks involving antivirus tampering. In May 2024 alone, &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender XDR detected over 176,000 incidents involving tampering with security settings, impacting more than 5,600 organizations ¹&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;. On average, during that time frame, organizations that encountered&amp;nbsp;tampering activity saw over 31 attempts. Techniques observed by Microsoft include Windows Registry modifications, use of malicious tooling such as NSudo (Defeat Defender), Defender Control, Configure Defender, ToggleDefender, custom malicious PowerShell or batch scripts, and driver tampering.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Defender for Endpoint effectively thwarts tampering attacks&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Microsoft Defender for Endpoint offers robust anti-tampering capabilities that protect against end-user and third-party security settings changes, even in the context of a privileged user.&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; These built-in controls can prevent local and non-authorized remote administrators from altering critical settings at the organizational, platform, and device levels – you can even create specific rules for high-value device types such as domain controllers. &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;This means that you are automatically protected against common tampering tactics used by attackers including the modification of registry settings, DLLs, file systems, and agents. On top of that, any attempt to create exclusions in your antivirus and EDR tools or to terminate or suspend your system processes and services will be thwarted. These settings&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt; are on-by-default for all Defender for Endpoint customers, delivering comprehensive anti-tampering protection from day one.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;We are pleased to announce that AV-Comparatives has certified Microsoft Defender for Endpoint for &lt;/SPAN&gt;&lt;A href="https://www.av-comparatives.org/tests/anti-tampering-certification-microsoft-defender-for-endpoint-p2-license/?utm_source=ZohoCampaigns&amp;amp;utm_campaign=Anti-Tampering+Test++%E2%80%93+Press&amp;amp;utm_medium=email" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;successfully thwarting all tampering attemp&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;t&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;s&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; levied during the 2025 Anti-Tampering Test.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-contrast="none"&gt;&amp;nbsp; The test involved rigorous evaluation of security solutions to defend against sophisticated attack techniques aimed at disabling or bypassing protection mechanisms. This includes attempts to &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;disable or modify Windows kernel components and disable or terminate processes in the Windows user space. &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;Even under sustained attack (&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;various tests, tools, and procedures designed to penetrate our anti-tampering controls)&lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;, Defender for Endpoint demonstrated its ability to maintain protection. This evaluation not only validates the effectiveness of our advanced tampering and defense evasion controls but also reinforces Defender for Endpoint’s position as a leader in endpoint detection and response.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN data-contrast="auto"&gt;Defender for Endpoint successfully thwarted 100% of the tampering attacks made against the categories shown above in AV-Comparatives 2025 Anti-Tampering Test&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:1,&amp;quot;335551620&amp;quot;:1,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75,&amp;quot;335559740&amp;quot;:279}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="none"&gt;Learn more&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;Explore the following resources to learn more about how Defender for Endpoint defends against tampering attacks:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Protect security settings with tamper protection&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/tamper-resiliency" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Protect your organization from the effects of tampering&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;See additional evaluation results for Defender for Endpoint, demonstrating the industry-leading effectiveness of our endpoint security solution:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559685&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2024/09/25/microsoft-is-named-a-leader-in-the-2024-gartner-magic-quadrant-for-endpoint-protection-platforms/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft is named a Leader in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2024/12/11/microsoft-defender-xdr-demonstrates-100-detection-coverage-across-all-cyberattack-stages-in-the-2024-mitre-attck-evaluations-enterprise/?msockid=3bef1be87261641b09e20845732c65d6" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&amp;amp;CK® Evaluations: Enterprise&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://www.microsoft.com/en-us/security/blog/2023/10/23/forrester-names-microsoft-a-leader-in-the-2023-endpoint-security-wave-report/?msockid=1a665e69633567953e7a4b2062b1666a" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Forrester names Microsoft a Leader in the 2023 Endpoint Security Wave™ report&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;A href="https://www.av-comparatives.org/av-comparatives-awards-2024-for-microsoft/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;AV-Comparatives awards 2024 for Microsoft&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;A href="https://www.av-comparatives.org/vendors/microsoft/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;AV-Comparatives antivirus tests &lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;performed on Microsoft Defender&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:6,&amp;quot;335551620&amp;quot;:6,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;To learn more about Microsoft Security solutions, visit our &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/en-us/security/business" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;website.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; Bookmark the &lt;/SPAN&gt;&lt;A href="https://www.microsoft.com/security/blog/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Security blog&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt; to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (&lt;/SPAN&gt;&lt;A href="https://www.linkedin.com/showcase/microsoft-security/" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Security&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) and X (&lt;/SPAN&gt;&lt;A href="https://twitter.com/@MSFTSecurity" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;@MSFTSecurity&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="none"&gt;) for the latest news and updates on cybersecurity.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:240,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;¹ &lt;/SPAN&gt;&lt;A href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/Microsoft%20Digital%20Defense%20Report%202024%20%281%29.pdf" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Microsoft Digital Defense Report 2024&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-ccp-props="{&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559737&amp;quot;:75,&amp;quot;335559738&amp;quot;:75,&amp;quot;335559739&amp;quot;:75}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 May 2025 17:21:19 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-endpoint-successfully-passes-the-av-comparatives/ba-p/4414153</guid>
      <dc:creator>amibarayev</dc:creator>
      <dc:date>2025-05-15T17:21:19Z</dc:date>
    </item>
    <item>
      <title>Sensor Disconnection Notifications with Microsoft Defender for IoT and Microsoft Sentinel 🚀</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/sensor-disconnection-notifications-with-microsoft-defender-for/ba-p/4375517</link>
      <description>&lt;H3&gt;&lt;STRONG&gt;What Does This &lt;/STRONG&gt;&lt;STRONG&gt;Playbook&lt;/STRONG&gt;&lt;STRONG&gt; Do?&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;This new &lt;STRONG&gt;automated playbook&lt;/STRONG&gt; sends real-time &lt;STRONG&gt;email notifications&lt;/STRONG&gt; whenever a sensor disconnects from the cloud. This ensures you’re immediately alerted if there’s an issue, allowing you to take quick action to investigate and resolve the problem.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Why It’s Important:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Real-Time Alerts:&lt;/STRONG&gt; Get instant notifications when a sensor goes offline.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Proactive Monitoring:&lt;/STRONG&gt; Identify the issue early, reducing downtime and improving response times.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Seamless Integration:&lt;/STRONG&gt; Works effortlessly with &lt;STRONG&gt;Microsoft Defender for IoT&lt;/STRONG&gt; and &lt;STRONG&gt;Microsoft Sentinel&lt;/STRONG&gt; for a unified security approach.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;STRONG&gt;How to Set It Up:&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Setting up this playbook is quick and easy. For step-by-step instructions, check out the&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/azure/defender-for-iot/organizations/automate-sensor-disconnection-alerts" aria-label="Link detailed setup guide here" target="_blank"&gt;detailed setup guide here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;This playbook was created in collaboration with Marian Hristov, a leading partner working with Defender for IoT.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 10:46:35 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/sensor-disconnection-notifications-with-microsoft-defender-for/ba-p/4375517</guid>
      <dc:creator>BelleKriger</dc:creator>
      <dc:date>2025-12-12T10:46:35Z</dc:date>
    </item>
    <item>
      <title>Block malicious command lines with Microsoft Defender for Endpoint</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/block-malicious-command-lines-with-microsoft-defender-for/ba-p/4373943</link>
      <description>&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;The modern &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;threat landscape &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;is rapidly evolving&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;, with new attack strategies being employed at greater frequency and volume than we have seen in the past.&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;One such tactic we have &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;recently &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;observed&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;across &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;m&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;any advanced malicious attacks is the use of harmful command lines within the attack chain to bypass file-based detections. A common technique involves using legitimate programs like &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;powershell.exe&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; or &lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;cmd.exe&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt; to execute malicious actions, such as downloading and running a payload or initiating a harmful script. Today we will discuss how Microsoft Defender for Endpoint protects against these threats by scanning and blocking malicious command lines. While this capability is already generally available, it continues to benefit from improvements to its machine learning models&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="5"&gt;&lt;SPAN data-contrast="auto"&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;Defender for Endpoint&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;uses&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;advanced &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;machine learning &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;models to&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; automatically&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; scan&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;analyze&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;,&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; and classify &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;command lines. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;Malicious command lines are blocked &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;instantly&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;within &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;the client&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;, while suspicious&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; ones are sent to the cloud for further analysis using&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; Microsoft’s &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;freshest signals&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;most&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; up-to-date threat intelligence&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;,&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;and &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;advanced detection methods&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; -&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; including the &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;CommandLineBerta&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; model&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;T&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;h&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;is&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; model &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;evaluates suspicious command lines &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;to &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;determine&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; the probability &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;that they &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;are malicious&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;. &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;If &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;they are &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;classifie&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;d&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; as malicious&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;, &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;they are blocked&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;.&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;What &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;differentiates&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; t&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;his &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;machine learning &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;model &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;from others is that it &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;can classify any command line, unlike models that are trained for specific subsets like PowerShell or &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;Windows Management Instrumentation (&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;WMI&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;)&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;command lines. As a result, it provides protection against a wide variety of malicious command lines. The&lt;/SPAN&gt; &lt;SPAN data-ccp-parastyle="heading 5"&gt;CommandLineBerta&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; model is regularly updated to stay ahead of emerging threats&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; and&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; is particularly effective against &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;LoLBin&lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt; (Living off the Land Binary) attacks, where &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;adversaries &lt;/SPAN&gt;&lt;SPAN data-ccp-parastyle="heading 5"&gt;use legitimate programs within the victim's machine to achieve their malicious goals.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;335557856&amp;quot;:16777215,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P aria-level="5"&gt;&amp;nbsp;&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Here are a few other examples of command lines blocked by CommandLineBerta:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Malicious coin&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;miners which use long command&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;lines containing wallet addresses.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Malware that uses command&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;lines to execute malicious code hosted on public websites such as Pastebin&lt;/SPAN&gt; &lt;SPAN data-contrast="auto"&gt;or Github.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Command lines that run malicious scripts like PowerShell, Wscript, VBScript etc.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Malware that tampers with security software to avoid detection.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="2" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;Malware that executes Dynamic Link Libraries (DLLs) with custom exports.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;When any malicious command line is blocked, Microsoft Defender for Endpoint surfaces an alert on the Microsoft Defender XDR portal and provides a notification of blockage on the affected device.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;With cyberattack data from over one billion protected endpoints and one of the most robust threat intelligence clouds that exists today, Microsoft is uniquely positioned to identify and respond quickly to attack strategies like malicious command lines.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;More information&lt;/SPAN&gt;&lt;SPAN data-contrast="auto"&gt;:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/adv-tech-of-mdav" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Le&lt;/SPAN&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;arn more&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; about the advanced technology at the core of Microsoft Defender Antivirus.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;Get started&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; with Microsoft Defender for Endpoint.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/whats-new-in-microsoft-defender-endpoint" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="auto"&gt;Learn about what’s &lt;/SPAN&gt;&lt;SPAN data-contrast="none"&gt;&lt;SPAN data-ccp-charstyle="Hyperlink"&gt;new&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; in Microsoft Defender for Endpoint.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 20 Feb 2025 01:12:17 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/block-malicious-command-lines-with-microsoft-defender-for/ba-p/4373943</guid>
      <dc:creator>SaadK</dc:creator>
      <dc:date>2025-02-20T01:12:17Z</dc:date>
    </item>
    <item>
      <title>Get greater visibility with aggregated reporting of endpoint telemetry signals</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/get-greater-visibility-with-aggregated-reporting-of-endpoint/ba-p/4366712</link>
      <description>&lt;P&gt;Endpoint security solutions collect large amounts of data from across your network in order to detect intruders. These signals are quickly processed to generate prompt, valuable security alerts and insights with a high signal-to-noise ratio while allowing operational continuity. During this process, certain data is typically dropped to reduce noise and optimize product performance and efficiency. This allows more complex signal logic to be applied to the significant data that is collected. With this approach, signals are continually filtered until high fidelity indicators of attack or compromise are found.&lt;/P&gt;
&lt;P&gt;Historically Microsoft Defender for Endpoint has taken this approach and opted against preserving redundant and irrelevant signals, choosing to highlight the higher fidelity signals that matter most to SOC analysts. With that said, some of you have shared that you would like the option to review all collected signals.&lt;/P&gt;
&lt;P&gt;Our goal as an endpoint security solution is to provide you with transparency and confidence, so we’re pleased to announce that aggregated reporting of system activity is now available in Defender for Endpoint in public preview. This feature ensures that essential event properties valuable to investigation and threat hunting activities are continuously collected &lt;SPAN data-teams="true"&gt;for key activities, signals, and events&lt;/SPAN&gt;. As always, we strive to keep you in control, so switching on this feature for greater visibility is optional.&lt;/P&gt;
&lt;P&gt;What you can expect:&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Summarized information for supported event types, including otherwise low efficacy telemetry that can be used for investigations and threat hunting.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;All the telemetry that you are used to seeing today.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;EM&gt;Note that since this feature improves signal visibility, your SIEM or storage solutions may incur higher storage costs if you stream Microsoft Defender for Endpoint Advanced Hunting tables (such as to Sentinel). The exact increase varies by organization.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;To enable this feature and for more information, technical details, and guidance, please visit: &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/aggregated-reporting" target="_blank" rel="noopener"&gt;Aggregated reporting in Microsoft Defender for Endpoint - Microsoft Defender for Endpoint | Microsoft Learn&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2025 22:20:06 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/get-greater-visibility-with-aggregated-reporting-of-endpoint/ba-p/4366712</guid>
      <dc:creator>SaarCohen</dc:creator>
      <dc:date>2025-01-22T22:20:06Z</dc:date>
    </item>
    <item>
      <title>Defender for Endpoint extends support to ARM-based Linux servers</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-endpoint-extends-support-to-arm-based-linux-servers/ba-p/4364066</link>
      <description>&lt;P&gt;As the demand for ARM64 servers continues to rise, we are thrilled to announce that Microsoft Defender for Endpoint now supports ARM64 based Linux servers in GA. This update marks a new milestone in our commitment to providing comprehensive endpoint security across all devices and platforms.&lt;/P&gt;
&lt;P&gt;ARM64 processors are rapidly gaining traction due to their exceptional efficiency and performance, particularly in data centres and cloud environments. Defender for Endpoint’s Linux solution is built specifically for Linux devices, so our protection is tailor-made with the particular needs and uses of Linux devices in mind.&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;What’s Included in the GA?&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;Microsoft Defender for Endpoint for ARM-based Linux servers supports all the capabilities it currently supports on x86_64 processor-based Linux Servers:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Antivirus (AV) protection&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Endpoint Detection and Response (EDR)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Vulnerability Management &lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Response Actions&lt;/STRONG&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Device Isolation&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Live Response&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AV Scan&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Configure policies via Security Settings Management&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Advanced Hunting&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;List of supported Linux distributions on ARM64:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Ubuntu 20.04 ARM64&lt;/LI&gt;
&lt;LI&gt;Ubuntu 22.04 ARM64&lt;/LI&gt;
&lt;LI&gt;Ubuntu 24.04 ARM64&lt;/LI&gt;
&lt;LI&gt;Debian 11, 12 ARM64&lt;/LI&gt;
&lt;LI&gt;Amazon Linux 2 ARM64&lt;/LI&gt;
&lt;LI&gt;Amazon Linux 2023 ARM64&lt;/LI&gt;
&lt;LI&gt;RHEL 8.x ARM64&lt;/LI&gt;
&lt;LI&gt;RHEL 9.x ARM64&lt;/LI&gt;
&lt;LI&gt;Oracle Linux 8.x ARM64&lt;/LI&gt;
&lt;LI&gt;Oracle Linux 9.x ARM64&lt;/LI&gt;
&lt;LI&gt;SUSE Linux Enterprise Server 15 (SP5, SP6) ARM64&lt;/LI&gt;
&lt;/UL&gt;
&lt;H5&gt;&lt;STRONG&gt;Get Started Today&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;To begin using Defender for Endpoint on Linux ARM64 devices, download the Defender for Endpoint agent version “&lt;STRONG&gt;101.25022.0004&lt;/STRONG&gt;” from the production&amp;nbsp;channel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can choose one of the below methods to deploy Defender for Endpoint on your ARM64 servers as per your environment needs:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Automate Deployment using Installer Script or 3&lt;SUP&gt;rd&lt;/SUP&gt; Party Tool – Ansible, Puppet.&lt;/LI&gt;
&lt;LI&gt;Automate Deployment via Microsoft Defender for Cloud for Azure, AWS, GCP VMs and &amp;nbsp;on-premise VMs using Azure Arc&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Refer to&amp;nbsp;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/defender-endpoint/mde-linux-prerequisites" target="_blank" rel="noopener"&gt;public doc&lt;/A&gt; for pre-requisites and deployment guidance.&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Feedback and Support&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;We value your feedback and encourage you to share your experiences and any issues you may encounter. For any questions or to report bugs, please reach out to Microsoft support.&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;&lt;STRONG&gt;Looking Ahead&lt;/STRONG&gt;&lt;/H5&gt;
&lt;P&gt;We plan to extend support to a few more Linux distributions like Alma, Rocky in near future.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 16:21:03 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/defender-for-endpoint-extends-support-to-arm-based-linux-servers/ba-p/4364066</guid>
      <dc:creator>Megha_Priya</dc:creator>
      <dc:date>2025-04-17T16:21:03Z</dc:date>
    </item>
    <item>
      <title>Protect your single-core Linux servers with Defender</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/protect-your-single-core-linux-servers-with-defender/ba-p/4356966</link>
      <description>&lt;P&gt;In today’s rapidly evolving digital landscape, enterprises are increasingly relying on Linux-based servers to run their critical workloads. Securing your Linux servers is paramount to safeguarding sensitive data, ensuring business continuity, and maintaining trust with your customers.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But what about balancing performance with security? Many organizations are running a diverse server infrastructure and rely on low-resource configurations due to various constraints. Optimizing security for single-core or dual-core systems without compromising performance is a key challenge. As organizations continue to innovate and diversify their server estates, the need for cybersecurity solutions that scale across both high-performance and low-resource configurations is greater than ever.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today, we’re excited to announce that Microsoft Defender can now be deployed to &lt;STRONG&gt;low-resource Linux environments, including single and dual core configurations&lt;/STRONG&gt; to meet the diverse needs of organizations.&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Intelligent performance optimization&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Microsoft Defender uses a&amp;nbsp;&lt;STRONG&gt;sensor framework &lt;/STRONG&gt;powered by &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/use-the-new-ebpf-based-sensor-for-defender-for-endpoint-on-linux/3873720" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;eBPF (extended Berkeley Packet Filter)&lt;/STRONG&gt;&lt;/A&gt; technology, when deployed on Linux servers. Unlike traditional security solutions that rely on kernel modules, eBPF allows Microsoft Defender to monitor system activities in a lightweight and non-intrusive manner, enhancing efficiency without compromising security—even in low-resource environments. Today the eBPF sensor consumes less than 1% CPU on average when installed on Linux machines.&lt;/P&gt;
&lt;P&gt;Key to our ability of maintaining system performance is our &lt;STRONG&gt;intelligent performance optimization&lt;/STRONG&gt;. It ensures that Defender stays within memory and CPU limits, by adaptively managing resource consumption and ensuring that security measures do not interfere with essential processes. Additionally, we incorporated &lt;STRONG&gt;smart data collection and preprocessing&lt;/STRONG&gt;, which helps make sure only relevant data is processed, further reducing system resource consumption.&lt;/P&gt;
&lt;P&gt;Lastly, &lt;STRONG&gt;a rich exclusion framework&lt;/STRONG&gt; allows administrators to tailor security settings and exclusions, so critical applications and processes can operate unhindered while still achieving a strong security posture.&lt;/P&gt;
&lt;P&gt;Our architecture combines eBPF, intelligent data processing, and configurable exclusions, to ensure that Microsoft Defender is an effective solution for performance-sensitive Linux workloads. It provides real-time protection with behavioral monitoring and threat detection, without sacrificing efficiency, even on low-resource configurations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;STRONG&gt;Enterprise-grade security for all platforms&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;Insights from Microsoft’s research teams show that a common reason for compromise is that organizations didn’t protect their servers as part of their endpoint security deployment and strategy. But for security to be effective, it must cover the entire endpoint estate across end user devices, mobile and IoT devices, and server workloads - on-premises and in the cloud.&lt;/P&gt;
&lt;img /&gt;
&lt;P&gt;Microsoft Defender provides AI-powered endpoint security for all platforms - including Windows and Linux servers - with industry-leading antivirus, intelligent real time protection and the most comprehensive detection, and response experience within Microsoft’s unified security operations experience. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;More information&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Start protecting your servers today with a &lt;A href="https://portal.azure.com/#view/Microsoft_Azure_Security/SecurityMenuBlade/~/EnvironmentSettings" target="_blank" rel="noopener"&gt;free trial.&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A class="lia-external-url" href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers" target="_blank" rel="noopener"&gt;Learn more&lt;/A&gt; about Defender for Servers and get started today.&lt;/LI&gt;
&lt;LI&gt;Check out our documentation to learn more about deploying &lt;A href="https://learn.microsoft.com/defender-endpoint/microsoft-defender-endpoint-linux" target="_blank"&gt;Microsoft Defender &lt;/A&gt;on Linux devices.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 12 Dec 2024 20:13:59 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/protect-your-single-core-linux-servers-with-defender/ba-p/4356966</guid>
      <dc:creator>Rutuja_dange</dc:creator>
      <dc:date>2024-12-12T20:13:59Z</dc:date>
    </item>
    <item>
      <title>The unified agent now combines protection 
across endpoints, OT devices, identities, and DLP</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/the-unified-agent-now-combines-protection-across-endpoints-ot/ba-p/4303805</link>
      <description>&lt;P&gt;Microsoft’s investments in Defender for Endpoint focus both on building industry-leading endpoint protection to stay ahead of increasingly sophisticated attackers and delivering on key fundamentals like simplified deployment and a unified platform experience. This year at Microsoft Ignite, we’re announcing innovations in both categories: a new unified agent that makes it simpler to deliver both endpoint protection and ITDR, as well as innovative and unique capabilities that help outsmart increasingly challenging attack tactics.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;One platform, one agent:&amp;nbsp;&lt;/STRONG&gt;Streamline your deployment and protection with a single agent across endpoint, OT, identity, and data loss prevention&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Expanded automatic attack disruption: &lt;/STRONG&gt;Automatic containment of compromised, critical infrastructure assets like servers, while ensuring business continuity&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Streamline deployment with a single agent across endpoints, OT devices, identities, and DLP&lt;/H4&gt;
&lt;P&gt;From a cybersecurity lens, an “agent” or “sensor” is a software component that monitors and protects critical infrastructure. Serving as one of the first lines of defense against threat actors, they continuously scan corporate resources for malicious activity or misconfigurations to ensure your organization remains secure and provide critical telemetry for security analysts. At the same time, multiple agents cause deployment and maintenance overhead for security teams.&lt;/P&gt;
&lt;P&gt;Last year at Microsoft Ignite we unveiled that we are bringing the power of Microsoft Sentinel together with Microsoft Defender XDR to deliver a&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/security/blog/2024/07/11/simplified-zero-trust-security-with-the-microsoft-entra-suite-and-unified-security-operations-platform-now-generally-available/" target="_blank" rel="noopener"&gt;unified security operations platform&lt;/A&gt;. Today, we’re excited to share that we are taking our platform approach to the next level with &lt;STRONG&gt;the only platform-level agent that unifies endpoint, identity and OT protection, and Data Loss Prevention (DLP)&lt;/STRONG&gt;. The streamlined agent simplifies how you activate and manage core capabilities within the Defender XDR experience to more easily and swiftly reap the benefits of our AI-powered protection.&lt;/P&gt;
&lt;img&gt;Image 1: The new, unified agent&lt;/img&gt;
&lt;P&gt;The single agent infrastructure is built on the market share-leading endpoint protection solution – Microsoft Defender for Endpoint. By unifying deployment and telemetry across this broad range of solutions, customers benefit in multiple ways:&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Simplified and safe deployment practices&lt;/STRONG&gt;:&lt;STRONG&gt; &lt;/STRONG&gt;Deploy once and simply enable each solution as needed, while relying on the mature &lt;A href="https://techcommunity.microsoft.com/blog/microsoftdefenderatpblog/microsoft-defender-for-endpoint%E2%80%99s-safe-deployment-practices/4220342" target="_blank" rel="noopener"&gt;safe deployment practices&lt;/A&gt; used by Defender for Endpoint and gives admins full control over sensor updates.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Microsoft’s unified security operations platform:&lt;/STRONG&gt; All agent telemetry is automatically correlated within the unified platform, enabling cross-workload investigation, hunting, and access to the ITDR dashboard with key identity insights.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Integrated identity prevention and protection&lt;/STRONG&gt;: Get a comprehensive view of all on-premises identities and identity-related information across your organization, identity-specific posture recommendations, and powerful detections, tailored to identify key identity-based threats.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Streamlined triage:&lt;/STRONG&gt; The integration of identity information into the device page enables easy mapping of a device to associate identity/owner through a direct connection to AD and Entra ID services for verification and now makes endpoints with the same device name easily distinguishable.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Automatic attack disruption&lt;/STRONG&gt;: Identity-specific insights will enable automatic attack disruption against additional, identity-related attack types, such as adversary in-the-middle campaigns.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;img&gt;GIF: Sensor activation via the unified agent&lt;/img&gt;
&lt;P&gt;Defender for Endpoint customers can now easily deploy Defender for Identity by simply enabling it from the Defender portal and immediately start defending against on-premises identity attacks. It comes pre-installed on Windows devices and has a simple deployment process for all other platforms including Linux and macOS. Starting today, this new deployment method is available for Domain Controllers running Windows Server 2019 and newer versions, with more support for older versions coming in the next months.&lt;/P&gt;
&lt;H4&gt;Contain attackers on critical infrastructure assets without disrupting business productivity&lt;/H4&gt;
&lt;P&gt;Over the last 18 months, we’ve seen a gigantic jump of 2.75x in the number of organizations targeted by ransomware attacks.&amp;nbsp; Thankfully, over the same period, and even in this tougher environment, the likelihood of Defender for Endpoint customers getting encrypted decreased by an even greater amount, 3x. A key driver in this success has been automatic attack disruption, a response capability unique to Microsoft.&lt;/P&gt;
&lt;P&gt;We’re continually investing in automatic attack disruption to stay ahead of this challenging landscape, and this year at Ignite,&amp;nbsp;&lt;STRONG&gt;we’re excited to announce&lt;/STRONG&gt; &lt;STRONG&gt;disruption of critical infrastructure assets like domain controllers and other servers that organizations run on - &lt;/STRONG&gt;an expansion of our capabilities that addresses a key challenge we’ve observed in the real world.&lt;/P&gt;
&lt;P&gt;While server protection is increasingly becoming a focus area for organizations, historically it’s been difficult to contain attackers on these assets because of their importance to business productivity. Therefore, standard security practice is often to leave servers operational when compromise is suspected in order to ensure business continuity. Instead, the approach has been to contain the compromised user account associated with the breach. This can be effective, but it leaves room for attackers to continue to pivot by coopting or creating new users, rather than fully shutting down the attack.&lt;/P&gt;
&lt;P&gt;To address this challenge, Defender for Endpoint can now fully contain attacks on critical infrastructure assets while leaving them operational, so that business activity can continue. Rather than isolating the devices altogether, we identify the malicious connections running from or to these assets and granularly block the activity itself, while otherwise keeping them running as usual.&lt;/P&gt;
&lt;P&gt;Let’s look at an example of a common attacker practice on domain controllers (DC) – servers that manage user authentication and access to network resources. When attackers gain access to a DC they often establish a remote desktop protocol (RDP) session to gain access to network resources and gain a foothold to launch further attacks. If you were to shut down the DC, all users in your organization would lose access to company resources and could no longer log in – leading to a complete loss in productivity.&lt;/P&gt;
&lt;P&gt;So instead, Defender for Endpoint now identifies attacker-established RDP sessions and automatically disables them while allowing the server itself to remain operational. This way, uncompromised users and devices in your organization can continue to log in and conduct business normally without the attacker being able to reach them.&lt;/P&gt;
&lt;img&gt;Image 2: DC contained and 5 devices protected&lt;/img&gt;
&lt;P&gt;This expansion of our automatic attack disruption capabilities gives organizations a significant leg up when defending their most critical infrastructure assets and it’s the latest example of our commitment to prioritizing the delicate balance between effective attack disruption and business productivity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We hope you’ll &lt;A class="lia-external-url" href="https://ignite.microsoft.com/en-US/sessions/BRK325?source=sessions" target="_blank" rel="noopener"&gt;join us online or in person for our Microsoft Ignite session&lt;/A&gt; to hear more about the unified agent, attack disruption on critical assets, and other ways we’re investing in delivering cutting-edge endpoint protection and simplified security management. Our work is never done, and we’re committed to continually innovating to provide best-in-class endpoint protection. To that end, continue to share your feedback and priorities, and we look forward to connecting with many of you this week.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;More information&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Join us online or in person and watch these new capabilities in action during this Microsoft Ignite session &lt;A class="lia-external-url" href="https://ignite.microsoft.com/en-US/sessions/BRK325?source=sessions" target="_blank" rel="noopener"&gt;AI-Driven Ransomware Protection at Machine Speed: Defender for Endpoint&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Want to know what other Threat Protection innovations are new at Ignite?&amp;nbsp;&lt;A class="lia-internal-link lia-internal-url lia-internal-url-content-type-blog" href="https://techcommunity.microsoft.com/category/microsoft-defender-xdr/blog/microsoftthreatprotectionblog" target="_blank" rel="noopener" data-lia-auto-title="Check out our XDR blog" data-lia-auto-title-active="0"&gt;Check out our XDR blog&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Learn how to &lt;A class="lia-external-url" href="https://go.microsoft.com/fwlink/?linkid=2297346" target="_blank" rel="noopener"&gt;deploy Defender for Identity with the unified agent&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 19 Nov 2024 17:15:53 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/the-unified-agent-now-combines-protection-across-endpoints-ot/ba-p/4303805</guid>
      <dc:creator>clairelevy</dc:creator>
      <dc:date>2024-11-19T17:15:53Z</dc:date>
    </item>
    <item>
      <title>Security settings management is available for multi-tenant environments in Microsoft Defender XDR</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/security-settings-management-is-available-for-multi-tenant/ba-p/4250996</link>
      <description>&lt;P&gt;Several months ago, we released device &lt;A href="https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/manage-security-settings-for-windows-macos-and-linux-natively-in/ba-p/3870617" target="_blank" rel="noopener"&gt;security settings management&lt;/A&gt; within Microsoft Defender XDR. This experience enables security administrators to configure Microsoft Defender for Endpoint security settings for devices on all platforms (including Windows, Linux, and Mac) without having to leave the Defender portal. The streamlined portal experience breaks down the wall between Security and IT teams by presenting a shared view for both, making it easier for security administrators to strengthen the security posture of their devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security administrators can now drive even greater efficiencies with simplified security settings management supporting multi-tenancy environments that are common to large enterprises and managed services security providers (MSSPs). The multi-tenant view in the Defender XDR portal (&lt;A href="https://learn.microsoft.com/en-us/defender-xdr/mto-overview" target="_blank" rel="noopener"&gt;Multi-tenant management in Microsoft Defender XDR - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;) provides security administrators a consolidated view of all security policies across their entire organization, including all tenants' policies, without needing to switch portals. To access this page, navigate to &lt;STRONG&gt;Endpoints &amp;gt; Configuration Management &amp;gt; &lt;/STRONG&gt;&lt;A href="https://mto.security.microsoft.com/policy-inventory" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Endpoint Security Policies&lt;/STRONG&gt;&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, security administrators can &lt;STRONG&gt;create, edit&lt;/STRONG&gt;, or &lt;STRONG&gt;delete&lt;/STRONG&gt; policies within the context of the specific tenant centrally via the unified aggregated view.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the Endpoint Security Policies page, a security administrator can &lt;STRONG&gt;search&lt;/STRONG&gt; for a specific policy for all their tenants, using the Search function.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To manage security settings for multiple tenants in the multi-tenant view in Defender XDR portal, security administrators must follow all the prerequisites to configure security settings for a single tenant for each of their tenants (for more details please see:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/mem/intune/protect/mde-security-integration?toc=%2Fdefender-endpoint%2Ftoc.json&amp;amp;bc=%2Fdefender-endpoint%2Fbreadcrumb%2Ftoc.json&amp;amp;view=o365-worldwide" target="_blank" rel="noopener"&gt;Use Intune to manage Microsoft Defender settings on devices that aren't enrolled with Intune | Microsoft Learn&lt;/A&gt;). This includes the following role-based access control requirements:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For Microsoft Defender, use the security administrator role (or custom role with security configuration management permissions scoped to all devices)&lt;/LI&gt;
&lt;LI&gt;For Microsoft Intune, use the Endpoint security manager role&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Additionally, the devices in each Defender tenant must be affiliated with the corresponding Entra tenant&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This experience does not currently support Microsoft Defender for Business tenants.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information and guidance, please visit: &lt;A href="https://learn.microsoft.com/en-us/defender-xdr/mto-endpoint-security-policy" target="_blank" rel="noopener"&gt;Endpoint security policies in multitenant management - Microsoft Defender XDR | Microsoft Learn&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2024 14:25:32 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/security-settings-management-is-available-for-multi-tenant/ba-p/4250996</guid>
      <dc:creator>maayanmazig</dc:creator>
      <dc:date>2024-09-30T14:25:32Z</dc:date>
    </item>
    <item>
      <title>Microsoft Defender for Endpoint’s Safe Deployment Practices</title>
      <link>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-s-safe-deployment-practices/ba-p/4220342</link>
      <description>&lt;P&gt;&lt;SPAN&gt;For customers it is key to understand that software vendors use safe deployment practices that help them build resilient processes that maintain productivity. This blog addresses Microsoft Defender for Endpoint’s architectural design and its approach to delivering security updates, which is grounded in Safe Deployment Practices (SDP).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.microsoft.com/en-us/security/business/endpoint-security/microsoft-defender-endpoint" target="_self"&gt;&lt;SPAN&gt;Microsoft Defender for Endpoint&lt;/SPAN&gt;&lt;/A&gt; helps protect organizations against sophisticated adversaries while optimizing for resiliency, performance, and compatibility, following &lt;A href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/" target="_blank" rel="noopener"&gt;best practices for managing security tools in Windows&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security tools running on Windows can balance security and reliability through careful product design, as described in &lt;A href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/" target="_blank" rel="noopener"&gt;this post&lt;/A&gt; by David Weston. Security vendors can use optimized sensors which operate within kernel mode for data collection and enforcement, limiting the risk of reliability issues. The remainder of the security solution, including managing updates, loading content, and user interaction, can occur isolated within user mode, where any reliability issues are less impactful. This architecture enables Defender for Endpoint to limit its reliance on kernel mode while protecting customers in real-time.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Image 1: Defender for Endpoint integration into Windows architecture&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the remainder of this blog post, we outline Microsoft’s use of safe deployment practices for Defender for Endpoint, our 1&lt;SUP&gt;st&lt;/SUP&gt; party endpoint protection solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Defender for Endpoint applies safe deployment practices to two distinct update mechanisms:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt; Software and driver updates&lt;/STRONG&gt; that are updated monthly (and potentially can update kernel-mode components).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Security intelligence and detection logic updates&lt;/STRONG&gt; that may be updated multiple times per day and apply only to user-mode components.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This blog outlines in-depth how Defender for Endpoint approaches SDP and what customers can do to manage their own roll-out process for an additional layer of control.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;1. Software and driver updates &lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Defender for Endpoint releases monthly software and driver updates that add new functionality, improve existing features, and resolve bugs. Defender for Endpoint’s kernel drivers capture system-wide signals like process execution, file creation, and network activity. These drivers are updated through Windows Update, over a gradual and staged deployment process after spending weeks in stabilization and testing. The deployment evaluation monitors key metrics like reliability, performance, battery, application compatibility, and more across hardware and software configurations.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;img /&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Image 2: Process for rolling out software and driver updates for Defender for Endpoint&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft safeguards &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;All code and content changes go through engineering release gates along with extensive validations and stability testing. After the certification and validation process, Microsoft ships the updates through multiple groups of devices known as &lt;STRONG&gt;stabilization rings&lt;/STRONG&gt;. The first stabilization ring targets Microsoft’s hundreds of thousands of employees and millions of internal devices. This helps ensure we discover and address issues first, before customers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Within each ring, we closely monitor quality signals such as product behavior and performance, false positives&lt;U&gt;,&lt;/U&gt; as well as functional and reliability issues, before proceeding to roll out the update to a broader set of devices. Customers can control the rings that are assigned to their device groups, including early access groups, to see how each update may interact with their devices and provide feedback to Microsoft before it is released.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once internal testing is successfully completed, Microsoft then releases the updates externally in a staggered manner to ensure stability. During this time, Microsoft continuously monitors the rollout. That way we can quickly respond and remotely resolve any issues by reverting or reissuing update packages.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Customer controls&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In addition to Microsoft’s safe deployment practices, organizations can also manage monthly updates with their own safe deployment policies through various controls:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/configure-updates" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Control the delivery of agent updates&lt;/STRONG&gt;&lt;/A&gt; to their devices by their device groups and the timing of updates.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply patch management software and practices&lt;/STRONG&gt; for security component updates that can also arrive in the form of monthly Latest Cumulative Updates (LCUs).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-antivirus-updates#how-to-roll-back-an-update" target="_blank" rel="noopener"&gt;&lt;U&gt;&lt;STRONG&gt;manual&lt;/STRONG&gt;&lt;/U&gt;&lt;/A&gt;&lt;STRONG&gt; or automated rollback options&lt;/STRONG&gt; to revert or reset components to a last known good state.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;2. Security intelligence and detection logic updates &lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In addition to monthly code updates, Microsoft releases &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-antivirus-updates#security-intelligence-updates" target="_blank" rel="noopener"&gt;security intelligence updates&lt;/A&gt; which are installed on devices to supplement the real-time local and cloud-based machine learning models, behavior analysis, and heuristics that enable Defender for Endpoint to neutralize the latest known cyberthreats.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Given the high frequency at which these updates need to be delivered to protect customers, it’s not possible to deploy these through the same deployment process. Therefore, Defender for Endpoint does not include kernel changes in intelligence updates. Instead, daily updates are only delivered to components that run in the user mode of the operating system. This approach helps mitigate the risk of these more frequent updates from impacting&amp;nbsp;the broader operating system and, in the unlikely event of an error, limits the risk of significant negative effects like system crashes and ensures devices can be automatically recovered.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Microsoft safegua&lt;/STRONG&gt;&lt;STRONG&gt;rds&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Similar to the process for software and driver updates, Microsoft ships security intelligence updates after extensive testing and rolls them out starting with internal devices, early access customers, and then releases them externally in a controlled, gradual manner. We continually monitor telemetry and can mitigate issues through the cloud in minutes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Customer controls &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Customers can also manage security intelligence updates with their own safe deployment policies through various controls:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Stage updates&lt;/STRONG&gt; &lt;A href="http://aka.ms/SIURing" target="_self"&gt;through corporate networks&lt;/A&gt;&amp;nbsp;or software management solutions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Apply updates at a lower frequency for critical systems.&lt;/STRONG&gt; Daily releases can be applied at a lower frequency for certain device groups, including servers critical to running your infrastructure.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Use rollback controls.&lt;/STRONG&gt; As a last resort, it's possible to revert or reset components to a last known good state using &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-antivirus-updates#how-to-roll-back-an-update" target="_self"&gt;rollback controls&lt;/A&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Microsoft has long invested in safe deployment practices and established a robust SDP model in how we deliver updates to customers of Defender for Endpoint. In addition, customers have full control over how updates are delivered and how controls are applied to their device estate. This model of shared control helps ensure security and resiliency.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Resources&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;To start a free, 90-day trial of Defender for Endpoint, sign up &lt;A href="https://signup.microsoft.com/get-started/signup?OfferId=7062f3a5-5d4a-47ad-85d6-3bd84e563f2c&amp;amp;ali=1&amp;amp;products=7062f3a5-5d4a-47ad-85d6-3bd84e563f2c&amp;amp;bac=1&amp;amp;signedinuser=chcoll%40microsoft.com" target="_blank" rel="noopener"&gt;here&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;To learn more about how you can control rollout of Defender for Endpoint’s updates and join early access groups, check out these resources for &lt;A href="https://support.microsoft.com/windows/join-the-windows-insider-program-and-manage-insider-settings-ef20bb3d-40f4-20cc-ba3c-a72c844b563c" target="_blank" rel="noopener"&gt;Windows&lt;/A&gt;, &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/mac-updates?view=o365-worldwide" target="_blank" rel="noopener"&gt;Mac&lt;/A&gt;, and &lt;A href="https://learn.microsoft.com/en-us/defender-endpoint/linux-update-mde-linux?view=o365-worldwide" target="_blank" rel="noopener"&gt;Linux&lt;/A&gt;&lt;U&gt;.&lt;/U&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2024 01:08:07 GMT</pubDate>
      <guid>https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-for-endpoint-s-safe-deployment-practices/ba-p/4220342</guid>
      <dc:creator>JasonWeber</dc:creator>
      <dc:date>2024-08-16T01:08:07Z</dc:date>
    </item>
  </channel>
</rss>

