Skip to content

Commit 38a5004

Browse files
authored
Merge pull request #21749 from MicrosoftDocs/mdav-relnotes
MDAV relnotes - platform and engine - pending PM signoff
2 parents 86ed5cc + 48a560e commit 38a5004

2 files changed

Lines changed: 69 additions & 36 deletions

File tree

microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 37 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: microsoft-365-security
55
ms.localizationpriority: high
6-
ms.date: 07/24/2023
6+
ms.date: 08/07/2023
77
audience: ITPro
88
ms.topic: reference
99
author: denisebmsft
@@ -93,9 +93,41 @@ All our updates contain
9393
- Serviceability improvements
9494
- Integration improvements (Cloud, [Microsoft 365 Defender](/microsoft-365/security/defender/microsoft-365-defender))
9595

96+
### July-2023 (Platform: 4.18.23070.1004 | Engine: 1.1.23070.1005)
97+
98+
- Security intelligence update version: **1.395.30.0**
99+
- Released: **August 9, 2023 (Engine and Platform)**
100+
- Platform: **4.18.23070.1004**
101+
- Engine: **1.1.23070.1005**
102+
- Support phase: **Security and Critical Updates**
103+
104+
### What's new
105+
106+
- Improved output for [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus) if scan results fail to retrieve
107+
- Extended management options for configuring security intelligence updates with Intune, Group Policy, and PowerShell
108+
- Extended management options for disabling IOAV scans over the network using Intune, Group Policy, and PowerShell. The new setting is `ApplyDisableNetworkScanningToIOAV` for [Set-MpPreference](/powershell/module/defender/set-mppreference).
109+
- Improved the Unified agent installation process to handle [MsMpEng.exe](troubleshooting-mode-scenarios.md#scenario-2-high-cpu-usage-due-to-windows-defender-msmpengexe) debugger extensions, if present
110+
- Fixed an issue pertaining to showing the exclusions list with PowerShell [Get-MpPreference](/powershell/module/defender/get-mppreference) on systems managed by Intune
111+
- Fixed warn notifications for two attack surface reduction (ASR) rules ([Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes) and [Block credential stealing from the Windows local security authority subsystem](attack-surface-reduction-rules-reference.md#block-credential-stealing-from-the-windows-local-security-authority-subsystem))
112+
- Fixed an issue with running `Update-MpSignature -UpdateSource:MMPC` when using a nonelevated PowerShell console (see [Update-MpSignature](/powershell/module/defender/update-mpsignature))
113+
- Fixed an issue with [ASR rules deployed via Intune](enable-attack-surface-reduction.md#intune) to display accurately in the Microsoft 365 Defender portal
114+
- Fixed [tamper protection management](prevent-changes-to-security-settings-with-tamper-protection.md) for customers who have Microsoft 365 E3 or [Defender for Endpoint Plan 1](defender-endpoint-plan-1.md)
115+
- Improved installation and uninstallation logic on Server SKUs using the modern, unified agent (see [Defender for Endpoint onboarding Windows Server](onboard-windows-server.md))
116+
- Fixed an issue where `AntivirusSignatureLastUpdated` was incorrect when executing [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus)
117+
- Addressed a deadlock caused by Microsoft Defender Antivirus in rare cases
118+
- Added `ProcessId` to ASR Warn exclusion events (see [ASR rules configuration summary card](attack-surface-reduction-rules-report.md#asr-rules-configuration-summary-card))
119+
- Fixed an issue where values specified in [ThreatSeverityDefaultAction](/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-threatseveritydefaultaction) weren't honored intermittently
120+
- Improved error reporting in the [modern, unified agent installer](configure-server-endpoints.md#new-windows-server-2012-r2-and-2016-functionality-in-the-modern-unified-solution)
121+
- Fixed the overriding logic in the ASR rule [Block all Office applications from creating child processes](attack-surface-reduction-rules-reference.md#block-all-office-applications-from-creating-child-processes) configured in warn mode
122+
- Added support for scanning Zstandard (Zstd) containers/archives
123+
124+
### Known issues
125+
126+
- None
127+
96128
### May-2023 *UPDATE* (Platform: 4.18.23050.9)
97129

98-
*Microsoft has released an additional platform update (**4.18.23050.9**) for the May 2023 release.*
130+
*Microsoft has released a platform update (**4.18.23050.9**) for the May 2023 release.*
99131

100132
- Security intelligence update version: **1.393.1315.0**
101133
- Released: **July 24, 2023 (Platform only)**
@@ -118,7 +150,7 @@ All our updates contain
118150
#### What's new
119151

120152
- Fixed an issue with [ASR rules deployed via Intune](/mem/intune/protect/endpoint-security-asr-policy) to display accurately in the Microsoft 365 Defender portal
121-
- Fixed a performance issue when building and validating Defender cache
153+
- Fixed a performance issue when building and validating the Microsoft Defender Antivirus cache
122154
- Improved performance by removing redundant exclusion checks
123155

124156
#### Known Issues
@@ -127,7 +159,7 @@ All our updates contain
127159

128160
### May-2023 *UPDATE* (Platform: 4.18.23050.5 | Engine: 1.1.23050.2)
129161

130-
*Microsoft has released a platform update (**4.18.23050.5**) for the May 2023 release. Note that an [additional update](#may-2023-update-platform-418230509) has been released.*
162+
*Microsoft released a platform update (**4.18.23050.5**) for the May 2023 release, followed by [an additional update](#may-2023-update-platform-418230509).*
131163

132164
- Security intelligence update version: **1.391.860.0**
133165
- Released: **June 12, 2023**
@@ -164,44 +196,14 @@ All our updates contain
164196
- Fixed sense offboarding on Windows Server 2016 when [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md) is enabled
165197
- Fixed inconsistent results of caching files with the internal Defender file cache
166198
- Augmented attack surface reduction (ASR) telemetry with more data related to an ASR detection
167-
- Removed Image File Execution Options (IFEO) debugger value during installation which can be used to prevent service starts
199+
- Removed Image File Execution Options (IFEO) debugger value during installation, which can be used to prevent service starts
168200
- Fixed memory leaked in ASR logic
169201
- Improved validation guard-rail for Malicious Software Removal Tool (MSRT) releases
170202

171203
#### Known Issues
172204

173205
- Potential issue that could lead to resolution of incorrect service endpoint
174206

175-
### April-2023 (Platform: 4.18.2304.8 | Engine: 1.1.20300.3)
176-
177-
- Security intelligence update version: **1.387.2997.0**
178-
- Release date: **May 2, 2023 (Engine) / May 2, 2023 (Platform)**
179-
- Platform: **4.18.2304.8**
180-
- Engine: **1.1.20300.3**
181-
- Support phase: **Security and Critical Updates**
182-
183-
#### What's new
184-
185-
- **Beginning in May 2023, the Platform and Engine version schema have a new format**. Here's what the new version format looks like:
186-
- Platform: `4.18.23050.1`
187-
- Engine: `1.1.23050.63000`
188-
- Fixed memory leak in behavior monitoring
189-
- Improved resiliency of signature loading and platform updates
190-
- Quarantine and restore support for [WMI](use-wmi-microsoft-defender-antivirus.md)
191-
- Fixed attack surface reduction (ASR) rule output with [Get-MpPreference](/powershell/module/defender/get-mppreference)
192-
- Fixed MSERT to only use release engine version
193-
- Improved the enforcement of exclusions
194-
- Added support for enabling real-time protection and signature updates during OOBE
195-
- Fixed localization for Defender events
196-
- Deprecated real-time signature delivery setting
197-
- Updated missing setting (ValidateMapsConnection) in [MpCmdRun.exe](command-line-arguments-microsoft-defender-antivirus.md)
198-
- Fixed abandoned threats in the Windows Security app
199-
- Fixed a service-hang issue that caused invalid outputs to display in [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus)
200-
201-
#### Known issues
202-
203-
- None
204-
205207
### Previous version updates: Technical upgrade support only
206208

207209
After a new package version is released, support for the previous two versions is reduced to technical support only. For more information about previous versions, see [Microsoft Defender Antivirus updates: Previous versions for technical upgrade support](msda-updates-previous-versions-technical-upgrade-support.md).

microsoft-365/security/defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr, mkaminska, v-vutrieu
9-
ms.date: 07/06/2023
9+
ms.date: 08/07/2023
1010
manager: dansimp
1111
audience: ITPro
1212
ms.collection:
@@ -26,6 +26,37 @@ search.appverid: met150
2626

2727
Microsoft regularly releases [security intelligence updates and product updates for Microsoft Defender Antivirus](microsoft-defender-antivirus-updates.md). It's important to keep Microsoft Defender Antivirus up to date. When a new package version is released, support for the previous two versions is reduced to technical support only. Versions that are older than the previous two versions are listed in this article and are provided for technical upgrade support only.
2828

29+
## April-2023 (Platform: 4.18.2304.8 | Engine: 1.1.20300.3)
30+
31+
- Security intelligence update version: **1.387.2997.0**
32+
- Release date: **May 2, 2023 (Engine) / May 2, 2023 (Platform)**
33+
- Platform: **4.18.2304.8**
34+
- Engine: **1.1.20300.3**
35+
- Support phase: **Technical upgrade support (only)**
36+
37+
### What's new
38+
39+
- **Beginning in May 2023, the Platform and Engine version schema have a new format**. Here's what the new version format looks like:
40+
- Platform: `4.18.23050.1`
41+
- Engine: `1.1.23050.63000`
42+
- Fixed memory leak in behavior monitoring
43+
- Improved resiliency of signature loading and platform updates
44+
- Quarantine and restore support for [WMI](use-wmi-microsoft-defender-antivirus.md)
45+
- Fixed attack surface reduction (ASR) rule output with [Get-MpPreference](/powershell/module/defender/get-mppreference)
46+
- Fixed MSERT to only use release engine version
47+
- Improved the enforcement of exclusions
48+
- Added support for enabling real-time protection and signature updates during OOBE
49+
- Fixed localization for Defender events
50+
- Deprecated real-time signature delivery setting
51+
- Updated missing setting (ValidateMapsConnection) in [MpCmdRun.exe](command-line-arguments-microsoft-defender-antivirus.md)
52+
- Fixed abandoned threats in the Windows Security app
53+
- Fixed a service-hang issue that caused invalid outputs to display in [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus)
54+
55+
### Known issues
56+
57+
- None
58+
59+
2960
## March-2023 (Platform: 4.18.2303.8 | Engine: 1.1.20200.4)
3061

3162
- Security intelligence update version: **1.387.695.0**

0 commit comments

Comments
 (0)