defender for office 365 presentation

Understanding Defender for Office 365 Plans — Which is Right for Your Organization?

Bart de Leeuw

Bart de Leeuw

Defender for Office 365 is designed to enhance the security of email traffic and collaboration tools including Microsoft Teams and OneDrive. It offers two distinct plans: Plan 1 and Plan 2. This article explores the differences between these plans, focusing particularly on the comprehensive capabilities of Defender for Office 365 Plan 2.

Microsoft Defender for Office 365 Plan 1:

  • Anti-Phishing: Policies that raise protection against phishing e-mails.
  • Anti-Spam: Policies that raise protection against spam e-mails.
  • Anti-Malware: Policies that raise protection against malware such as the possibility of blocking specific filetypes.
  • Safe Links: Defender for Office 365 scans URLs and rewrites malicious URLs to redirect to a safe page.
  • Safe Attachments: Malicious attachments are sandboxed and analyzed by Microsoft. Attachments can only be viewed once deemed harmless.
  • Real-Time Reports: Offers reports of which malicious links or files were sent or received. Whether these links were quarantined and which users or machines were involved.

Microsoft Defender for Office 365 Plan 2:

  • All features of Defender for Office 365 Plan 1.
  • Attack Simulation Training: A versatile phishing simulation tool with the possibilities of selecting different social engineering techniques, targeting specific users and assigning trainings.
  • Threat Explorer: An enhancement over Plan 1’s ‘Real-Time Reports,’ Threat Explorer offers additional critical features. Unlike the Real-Time Reports, which only track emails flagged by Microsoft as malicious, Threat Explorer extends its monitoring to all email traffic within your organization. It includes advanced analytics such as identifying if a malicious email is part of a coordinated campaign, or whether a URL within an email, Teams message, SharePoint file, or OneDrive document was accessed by a user. Additionally, Threat Explorer offers enhanced filtering and query-saving options, simplifying the investigation process. It also provides a broader range of actions that can be taken on emails, as illustrated in the screenshot below.
  • Threat Tracker: This tab provides all queries that were saved in the Threat Explorer. Additionally, you can create “Tracked Queries” that can run periodically in the Explorer and results will display in the Threat Tracker. Furthermore, Trending Campaigns in the Threat Tracker will highlight new email threats received by your organization according to Microsoft.
  • Microsoft Defender XDR Integration: The specific reasons why Microsoft Defender XDR is only integrated with Plan 2 are not entirely clear, but the integration undoubtedly adds significant value. In Plan 1, alerts from Defender for Office 365 are confined to the “Email & Collaboration Alerts” tab, which offers limited investigative capabilities. In contrast, with Plan 2, these alerts are elevated to the more comprehensive “Alerts” and “Incidents” tabs, while the “Email & Collaboration Alerts” tab is eliminated. This arrangement enhances the overall functionality and allows for more detailed investigations and quicker response actions.
  • Advanced Hunting in Defender XDR: The integration of Defender XDR introduces the Advanced Hunting tool. This query-based feature enables users to delve into up to 30 days of raw data using the Kusto Query Language (KQL), providing a powerful means for detailed data analysis and investigation.
  • Automated Investigation & Response (AIR): AIR can be activated either directly through an alert or manually by an analyst via the Threat Explorer. This feature conducts automated investigations by compiling data associated with the alert and suggesting appropriate actions. By automating these processes, AIR significantly reduces the time and effort required from your analysts.

Business Case

Company profile:.

“SecureFinance” is a medium-sized financial services firm that deals with a lot of sensitive client information, including personal data and financial transactions. The firm is under constant threat from phishing and targeted cyber-attacks, making cybersecurity a top priority.

Scenario with Defender for Office 365 Plan 1:

SecureFinance initially subscribes to Defender for Office 365 Plan 1 to bolster their email security. This plan provides them with essential protections including anti-phishing, anti-spam, anti-malware policies, and features like Safe Links and Safe Attachments, which are crucial for safeguarding against common threats.

  • Pros: The firm benefits from the basic security layers that prevent many standard email threats. Real-Time Reports offer insights into the nature of the threats that are being automatically handled.
  • Cons: SecureFinance faces sophisticated threats that sometimes bypass these initial defenses. The limited investigative and response capabilities in Plan 1 mean they cannot delve deeply into more complex threats or analyze patterns over time.

Experience and Limitations:

While Plan 1 reduces the volume of direct threats, SecureFinance’s IT team finds it challenging to address sophisticated attacks effectively. The basic reports do not provide enough information to analyze or anticipate advanced threats, leading to a few instances where threats were detected too late.

Transition to Defender for Office 365 Plan 2:

Recognizing the need for enhanced capabilities, SecureFinance upgrades to Defender for Office 365 Plan 2. This plan includes all the features of Plan 1 and adds powerful tools such as Attack Simulation Training, Threat Explorer, Advanced Hunting with the integration of Defender XDR, and Automated Investigation & Response (AIR).

  • Pros: With Threat Explorer, the security team can now view all email traffic, not just threats flagged by Microsoft, allowing them to spot and respond to unusual patterns and potential threats proactively. Attack Simulation Training helps prepare employees for real-world phishing attempts, significantly reducing the risk of successful attacks. The integration with Microsoft Defender XDR allows the security team to manage alerts more efficiently, perform detailed investigations, and automate responses to common scenarios, which is crucial for a financial firm dealing with frequent targeted attacks.
  • Cons: Plan 2 comes at a higher subscription cost which may be a significant factor organizations with a limited budget. Additionally, a higher level of expertise and time commitment is required to analyze and manage the added features.

Business Impact:

With Plan 2, SecureFinance not only enhances its defensive capabilities but also significantly improves its ability to respond to incidents. The proactive measures reduce the number of successful breaches and help maintain client trust, a critical component of their business.

Business Conclusion:

For SecureFinance, upgrading to Defender for Office 365 Plan 2 proves essential given the complex nature of the threats they face in the financial sector. While Plan 1 offered foundational security measures suitable for general needs, Plan 2’s advanced features and proactive capabilities align better with the needs of a business handling sensitive information and facing sophisticated cyber threats.

This case highlights the importance of assessing the specific security needs and threat landscape of a business when deciding between these two plans.

Defender for Office 365 Plan 1 is primarily designed for Prevent & Detect capabilities, yet it lacks robust Investigate & Respond tools. In contrast, Plan 2 not only retains all the preventative features of Plan 1 but also introduces additional components such as Attack Simulation Training. However, the real value of Plan 2 lies in its comprehensive Investigate & Respond capabilities.

Both plans provide strong protections crucial for safeguarding email and collaboration tools. Defender for Office 365 Plan 1 is well-suited for organizations requiring basic security measures against common threats but may not have the resources or need for in-depth investigative tools. This makes Plan 1 a fitting choice for inclusion in Business Premium/Defender for Business licenses, targeting smaller organizations with up to 300 employees that typically possess limited investigative capabilities.

On the other hand, Defender for Office 365 Plan 2 is distinguished by its extensive approach that goes beyond mere Prevention and Detection, incorporating substantial investigation and response features. The inclusion of Attack Simulation Training, Threat Explorer, Microsoft Defender XDR Integration, Advanced Hunting, and Automated Investigation & Response (AIR) renders Plan 2 ideal for larger organizations or those seeking to enhance their security measures proactively. These advanced features not only improve the organization’s ability to respond swiftly to incidents but also equip them with the tools needed to proactively identify and neutralize potential threats before they can impact the business.

Tip: For an updated mapping of different Microsoft licenses and features you could navigate to M365 Maps , a great tool by Aaron Dinnage.

Bart de Leeuw

Written by Bart de Leeuw

https://www.linkedin.com/in/de-leeuw/

Text to speech

Microsoft Defender for Office 365 Implementation

Copy this link to share with friends and colleagues:.

defender for office 365 presentation

WELCOME TO POWTOON!

"Like" us on Facebook or follow us on Twitter to get awesome Powtoon hacks, updates and hang out with everyone in the tribe too!

defender for office 365 presentation

Microsoft Defender for Endpoint Overview.pptx

Microsoft Defender for Endpoint is a cybersecurity solution that provides threat protection, detection, and response capabilities. It helps analysts investigate and remediate security alerts and threats more efficiently. Microsoft Defender for Endpoint can be accessed through a Microsoft 365 license like E5 or A5 at no additional cost, and protects organizations from malware, ransomware, and phishing attacks. Read less

defender for office 365 presentation

Recommended

More related content, what's hot, what's hot ( 20 ), similar to microsoft defender for endpoint overview.pptx, similar to microsoft defender for endpoint overview.pptx ( 20 ), recently uploaded, recently uploaded ( 20 ).

  • 1. Microsoft Defender for Endpoint Overview
  • 3. COVID-themed attacks: United States Malware encounters align with news headlines Microsoft Digital Defense Report 2020
  • 18. Microsoft
  • 31. Announcement blog
  • 36. Analysts overwhelmed by manual alert investigation & remediation Analyst 1 Analyst 2 Alert queue
  • 66. http://aka.ms/m365d http://security.microsoft.com
  • 67. Any of these licenses gives you access to Microsoft 365 Defender features via the Microsoft 365 Defender portal without additional cost: • Microsoft 365 E5 or A5 • Microsoft 365 E3 with the Microsoft 365 E5 Security add-on • Microsoft 365 E3 with the Enterprise Mobility + Security E5 add-on • Microsoft 365 A3 with the Microsoft 365 A5 Security add-on • Windows 10 Enterprise E5 or A5 • Windows 11 Enterprise E5 or A5 • Enterprise Mobility + Security (EMS) E5 or A5 • Office 365 E5 or A5 • Microsoft Defender for Endpoint • Microsoft Defender for Identity • Microsoft Defender for Cloud Apps • Defender for Office 365 (Plan 2)

Editor's Notes

  • Talk track: As businesses embrace their digital transformations, many companies that had been seen as more traditional have seen the need to keep up with their competitors and provide a better customer experience. They do this by moving forward with initiatives like developing their own software and selling their products online. They must develop new digital capabilities and break down data silos. Data and information are the lifeblood of the transformation, which increasingly attracts cybercriminal activity. Traditional security approaches have failed us. A hardened perimeter (privileged corporate network) is, at best, a psychological security blanket. But it won’t hold. Siloed on-premises tools and datasets lack visibility, correlation, and automation. Paradoxically, adding more tools makes you less secure. With an overwhelming sea of alerts and complexity and a chronic talent shortage (over 3 million and counting1), security professionals cannot be expected to solve this problem alone. We’ll never have enough people to plug the gap. On top of all this, regulatory rules are constantly changing, and the cost of compliance is increasing. Over 750 regulatory bodies around the world release more than 200 updates per day—keeping up isn’t easy. Since you can’t be compliant without first being secure, it all starts with security.   1. https://blog.isc2.org/isc2_blog/2018/10/cybersecurity-skills-shortage-soars-nearing-3-million.html
  • Criminal groups are evolving their techniques   Criminal groups are skilled and relentless. They have become adept at evolving their techniques to increase success rates, whether by experimenting with different phishing lures, adjusting the types of attacks they execute, or finding new ways to hide their work. They move quickly to discover new threat vectors, use new exploits, and respond to new defenses. The lack of basic security hygiene in any given ecosystem continues to enable cybercriminals to use well-known vulnerabilities—or new variants of them—to exploit their environments. They were observed to leverage the fear and uncertainty associated with COVID-19 with great success. Our tracking of COVID-19-themed attacks shows how rapidly cybercriminals move to adapt their lures to the topics of the day In this graph you can see instances of malware encounters in relation to local news events of the day. For example, as the World Health Organization (WHO) declared COVID-19 a pandemic on March 11, there’s a corresponding uptick in COVID-themed lures. Similarly, as lockdowns were relaxed, and some states began to re-open (May 1, US chart), there’s a corresponding decline in the number of COVID-themed encounters.
  • Microsoft Defender for Endpoint is built into Windows 10 1703 and up and Windows Server 2019. It does not require any agents to be installed on these versions.
  • Show GA progression for individual platforms as a simple visual MacOS – in GA since Jun 2019; GA of EDR for Mac Dec 2019 Linux – in GA since Jun 2020 (EDR capabilities will be added by end of CY2020) Android – GA coming in Sep 2020 iOS – GA coming H1CY21
  • Add a new pain point for operationalized ?
  • https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/
  • Pre and Post breach AI and ML based behavioral blocking and containment Cloud EDR ML based behavior anomaly detection Auto IR Rapid Protection Feedback Loop- EDR detects on patient 0 to AV blocks on patient 0 and plus (1-5 minutes) - blog Shadow Protection  (In preview) - Microsoft Defender for Endpoint provides an additional protection layer by blocking/preventing malicious behavior in the background even when third party AV  is primary AV. 
  • The current functionality in public preview will be included in the Microsoft Defender for Endpoint license with 5 devices entitlement. This includes what is coming out soon for iOS as well.
  • P1 is included in M365 E3 and P2 is included in E5
  • <Suggested talking points for Rob. Love, EricD> Azure Defender: Native & built in across your Azure workloads Huge adoption – over 95% of Azure VMs protected by Azure Defender Cloud evolving rapidly, new solutions and you need native protection NOW cross cloud – major ask from customers, we extend our native controls through Azure Arc on-prem, and cross-cloud to GCP and AWS. One control plane and mgmt fabric to manage your entire estate. New today: New Defender dashboard – see all your workloads and their protected state New multi-cloud support – GCP and AWS – protect servers/vms, SQL servers anywhere, New: Azure Defender for IOT – integrating CyberX Full list in appendix slide
  • What is Microsoft 365 Defender? Microsoft’s best-in-breed threat protection portfolio includes point products to cover security for the critical components of the modern workplace. Azure Advanced Threat Protection—uses Active Directory signals and Microsoft’s cloud intelligence to protect against identity-based threats, compromised and malicious users, and lateral movement. Microsoft Defender Advanced Threat Protection— our endpoint protection platform providing everything from prevention to detection investigation, response and risk mitigation for endpoints Microsoft Cloud App Security—detecting unusual behavior across cloud apps to identify ransomware, compromised users, or rogue applications Microsoft Office 365 Advanced Threat Protection—offering threat protection across email and other collaboration vectors like Microsoft Teams, SharePoint Online, and OneDrive for Business and Office clients M365 Defender brings these best-of-breed products together into one powerful cross-domain full protection stack, deeply integrating signals and capabilities for an end-to-end experience protecting the organization’s network. ---------------------------------------- leftovers [Cori] We introduce new layers of cross-product knowledge and capabilities – Signal sharing – e.g. Office ATP found a malicious payload in email, all other products now know to block this file wherever they see it Unified entity reputation & semantics – all products contribute to building reputation about users, files, URLs etc. and share this, so e.g. If MDATP needs to make a decision about some suspect endpoint behavior, it is now able to consider the reputation of the user executing the activity across the stack Automated coordinated protection & remediation playbooks – e.g. if MDATP identifies a malicious file on a machine and finds it was delivered via email, it can coordinate remediation with others so beyond the machine that’s remediated, similar emails can be zapped from other users’ mailboxes and relevant user accounts subjected to MFA… Enable security teams to visualize, investigate, hunt and remediate attacks across protection areas in a single unified portal
  • That’s why were introducing Microsoft 365 Defender. The next iteration of our Microsoft Threat Protection journey. Automated cross domain security that out of the box combines the power of these products by merging their signals and capabilities into a single cross-domain solution. end-to-end experience protecting the organization’s network. ---------------------------------------- leftovers [Cori] We introduce new layers of cross-product knowledge and capabilities – Signal sharing – e.g. Office ATP found a malicious payload in email, all other products now know to block this file wherever they see it Unified entity reputation & semantics – all products contribute to building reputation about users, files, URLs etc. and share this, so e.g. If MDATP needs to make a decision about some suspect endpoint behavior, it is now able to consider the reputation of the user executing the activity across the stack Automated coordinated protection & remediation playbooks – e.g. if MDATP identifies a malicious file on a machine and finds it was delivered via email, it can coordinate remediation with others so beyond the machine that’s remediated, similar emails can be zapped from other users’ mailboxes and relevant user accounts subjected to MFA… Enable security teams to visualize, investigate, hunt and remediate attacks across protection areas in a single unified portal
  • To successfully achieve its goal we are progress on a journey to: Transition to a single portal and unified entities (as Corina will shortly show) Stop threats before they execute across all vectors from emails to endpoint to identity by coordinating individual alert and suspicious events signals to incidents Automatically heal affected assets back to a working state without the need of security teams to take action to build remediation scripts Prime and enrich data across domains to enable to easily hunt and created custom detections over the accumulated knowledge across all domains A threat-based approach to protection from detections to posture reporting Enabling a common set of management, API and connectors across the suite ---------------------------------------- leftovers [Cori] We introduce new layers of cross-product knowledge and capabilities – Signal sharing – e.g. Office ATP found a malicious payload in email, all other products now know to block this file wherever they see it Unified entity reputation & semantics – all products contribute to building reputation about users, files, URLs etc. and share this, so e.g. If MDATP needs to make a decision about some suspect endpoint behavior, it is now able to consider the reputation of the user executing the activity across the stack Automated coordinated protection & remediation playbooks – e.g. if MDATP identifies a malicious file on a machine and finds it was delivered via email, it can coordinate remediation with others so beyond the machine that’s remediated, similar emails can be zapped from other users’ mailboxes and relevant user accounts subjected to MFA… Enable security teams to visualize, investigate, hunt and remediate attacks across protection areas in a single unified portal

4sysops

  • IT Administration Forum
  • PowerShell Forum
  • Community Forum
  • PowerShell Group
  • Earning as 4sysops member
  • Member Ranks
  • Member Leaderboard – This Month
  • Member Leaderboard – This Year
  • Member Leaderboard – All-time
  • Author Leaderboard – 30 Days
  • Author Leaderboard – 365 Days
  • Cloud Computing
  • Write for 4sysops

Microsoft 365 Defender: An overview of Microsoft’s security services

4sysops - The online community for SysAdmins and DevOps

Avatar

Microsoft Defender for Identity

Microsoft defender for office 365, microsoft defender for endpoint, azure defender, azure identity protection, microsoft cloud app security, microsoft intune/microsoft endpoint manager, azure sentinel.

  • Recent Posts

Paul Schnackenburg

  • Azure Sentinel—A real-world example - Tue, Oct 12 2021
  • Deploying Windows Hello for Business - Wed, Aug 4 2021
  • Azure Purview: Data governance for on-premises, multicloud, and SaaS data - Wed, Feb 17 2021

Microsoft Threat Protection was first announced at Ignite 2018, both as a portal and a connection point for all the other security products in the portfolio. At the Ignite 2020 conference, most of these services were renamed. In this article we'll show the new names along with mentions of updated and new features. Microsoft Threat Protection is now Microsoft 365 Defender and encompasses the following services:

  • Microsoft Defender for Identity (previously Azure Advanced Threat Protection)
  • Microsoft Defender for Office 365 (previously Office 365 Advanced Threat Protection
  • Microsoft Defender for Endpoint (Microsoft Defender Advanced Threat Protection)

The service previously known as Azure Security Center has been renamed to Azure Defender (at least the new names are consistent):

  • Azure Defender for Servers (Azure Security Center)
  • Azure Defender for SQL (Advanced Threat Protection for SQL)
  • Azure Defender for IoT (Azure Security Center for IoT)

The products that haven't changed their name but are still part of Microsoft's overall security stack are:

  • Azure Identity Protection
  • Microsoft Intune / Microsoft Endpoint Manager
  • Exchange Online Protection (EOP)
  • Azure Security Center

In this article, we'll focus on the Defender solutions and how they fit together, as well as the other solutions and how they complement the rest of Microsoft 365 Defender. Azure Sentinel is not officially part of Microsoft 365 Defender, but we'll show how it fits in as well.

Microsoft Defender for Identity (a much more descriptive name, the old name was confusing as it has very little to do with Azure) is a cloud solution that's somewhat unique in this line-up, as it's mostly focused on your on-premises Active Directory (AD). 4sysops looked at it here . When an attacker gains a foothold in your corporate network, they'll perform different actions such as lateral movement (compromising more machines) to eventually be able to elevate privileges to server or domain administrator, leading to domain dominance . These activities leave a trail on your domain controllers (DCs). Microsoft Defender for Identity is specifically designed to identify and catch them.

To get started with Microsoft Defender for Identity, you first create your instance in the cloud, and then you install the sensors on all your DCs. In very high security environments, you can use a standalone sensor on a member server with event forwarding. The sensor monitors the event log and captures the relevant network packets. Microsoft Defender for Identity uses machine learning to build an understanding of what's normal behavior for both user accounts and devices/network endpoints in your networks.

Azure ATP and the Kill Chain (Courtesy of Microsoft)

Microsoft Defender for Identity and the Kill Chain (Courtesy of Microsoft)

Azure ATP used to have its own portal , but it's being deprecated. Instead, the Microsoft Defender for Identity alerts and investigation workflow are surfaced in Microsoft Cloud App Security . Microsoft Defender for Identity is a fairly unique solution, with a very high success rate and low false positives in spotting intruders quickly. The predecessor to Azure ATP was Advanced Threat Analytics, an on-premises solution. While its mainstream support will end on January 13, 2021, it'll still have extended support until 2026. Microsoft Defender for Identity, being a cloud service, is much easier to deploy. What's more, you're protected against new attacks faster since they can update the service quickly.

Microsoft Defender for Identity requires its own add-on license; it's also part of Enterprise Mobility + Security (EMS E5), which in itself is part of Microsoft 365 E5.

Microsoft Defender for Office 365 builds on top of Exchange Online Protection (EOP) that all users of Exchange in the cloud are protected by. EOP provides connection, spam, and malware filtering settings for incoming email, outbound spam settings, and quarantine of questionable emails and Domain Keys Identified Mail (DKIM) settings.

Exchange Online Protection DKIM policies

Exchange Online Protection DKIM policies

If these policies don't catch enough bad stuff, you can enable Microsoft Defender for Office 365 policies. These include Safe Attachments , which will open unknown email attachments in a VM and identify whether they're malicious. Safe Links does the same for URLs in emails (at the time of click) and both are available across SharePoint, OneDrive, Microsoft Teams, and Exchange Online. Microsoft Defender for Office 365 Protection Plan 2 adds features such as Threat Trackers , Threat Explorer , automated investigation and response , and Attack Simulator for testing your defenses.

Microsoft Defender for Office 365 comes in two flavors. Plan 1 comes with Microsoft 365 Business Premium or as an add-on, and Plan 2 comes with Microsoft 365 E5 or O365 E5, or you can buy either P1 or P2 as standalone licenses.

Vignesh looked at O365 ATP for 4sysops in depth recently here .

Microsoft Defender for Endpoint is a full-fledged endpoint detection and response (EDR) tool for Windows, Linux , MacOS , and Android , with iOS in preview . On Windows, it builds on top of Windows Defender. This means deploying Microsoft Defender for Endpoint isn't about deploying an agent but simply about onboarding the endpoint into Microsoft Defender for Endpoint to unlock the advanced features. You can onboard a few test devices by running a local script, but for larger volumes, you'll want to use Microsoft Endpoint Manager Configuration Manager (SCCM) or Microsoft Endpoint Manager (Intune).

Microsoft Defender for Endpoint uses machine learning models, some running locally and some in the cloud to protect each endpoint against threats . It's also a full EDR solution, so it inventories all software that's installed on each device and all processes that are running. At Ignite 2020 Microsoft furthered the vision of Microsoft 365 Defender by labelling the whole stack together as Extended Detection and Response (XDR), as each component works together with the others, it's not just about protecting endpoints but holistically respond to attacks across servers, applications, and your hybrid infrastructure.

Microsoft Defender ATP Portal

Microsoft Defender for Endpoint portal

Old timers reading this might remember a free tool called EMET, some of its attack surface reduction tech is in Microsoft Defender for Endpoint , along with Threat and Vulnerability Management which identifies vulnerable versions of installed software and prioritizes what needs to be patched first, and hands this over as a job to the desktop team. Automated investigation and response provide automated remediation of threats with an undo button. Finally, Microsoft Defender for Endpoint also gives you access to Microsoft Threat Experts , SOC analysts at Microsoft, providing a managed threat hunting service to complement your own security analysts.

New features revealed at Ignite include the move to System extensions from Kernel extensions for the new MacOS, the iOS agent and Defender Application Guard for Office , providing an isolated VM security boundary for untrusted Word, Excel and PowerPoint documents in a similar way to how Edge can handle untrusted web sites today.

Microsoft Defender for Endpoint is part of Windows 10 Enterprise E5, Microsoft 365 E5 or Microsoft 365 E5 Security.

Azure Defender provides insight into the security posture of your IaaS and PaaS resources in Azure, including often giving you the option to "fix" issues with a single button click. Azure Defender also extends to any VM in any cloud, including on-premises with an agent. This includes Secure Score integration so that your cloud security posture in GCP and AWS is reflected in Azure Defender. With the standard version ("paid for") of Azure Defender, you get Microsoft Defender for Endpoint for servers included.

Azure Defender for SQL now extends to your servers on-premises and in other clouds and the recent acquisition of CyberX is integrated to provide protection for existing Operational Technology deployments.

Azure identity protection is part of Azure Active Directory (AAD) and uses machine learning to build up a profile of your users' sign-in behaviors. It combines these with signals from the Intelligent Security Graph to identify risks associated with each user credential.

You then build user and sign-in risk policies that can take certain actions. For example, Jane normally logs in from Australia on her corporate laptop. If her username and password are used to log in from an unknown device in India, the policy will kick in and prompt MFA (or block the login).

Microsoft Cloud App Security is a cloud access security broker , which basically means it's a firewall in the cloud, securing SaaS application access for your users. Microsoft Cloud App Security lets you discover services that your users are using (Shadow IT), unsanction ones that don't meet your corporate standards, and sanction those that do. It also lets you apply policies for documents that are uploaded to cloud storage (OneDrive, DropBox, Box, etc.), do real-time DLP in sessions, and mitigate threats.

MEM is the new name for Intune, a cloud service that provides mobile device management (MDM) and mobile application management (MAM). MEM is also the new name for System Center Configuration Manager, now positioned as the "edge computing" part of MEM.

It's also a way to simplify licensing. The most common question Microsoft received around Intune/SCCM was if I have licensing for one, can I use the other one? Well, now you can. It's a hybrid solution where all your on-premises resources are managed by SCCM but controlled from the cloud console, and your mobile assets are managed from the same console through Intune.

Together, they provide numerous security features, including the ability to distribute apps to any platform, as well as control corporate data and prohibit it from being leaked into non-business apps.

Management Application Protection Policy

Management Application Protection Policy

The enterprise version of Windows 10 unlocks a number of security features, such as Credential Guard for Remote Desktop , Windows Hello for Business , BitLocker , and Windows Information Protection to separate corporate and personal data.

This cloud-based SIEM is quickly growing in popularity and integrates with several of the other services easily. A SIEM is a centralized database of event logs from all your devices, servers, networking infrastructure, etc. This is then analyzed for evidence of intrusion, raising alerts as required. Analysts use automated and manual search tools to hunt through the data to identify signals from attackers. Importantly, if you're an SMB that is using O365/M365, know that ingesting the unified audit log from there as well as alerts from the ATP services is totally free—a good reason to learn a bit about Sentinel and set up a POC.

At Ignite 2020 Sentinel added User and Entity Behavior Analytics (UEBA) , building up a database of what’s normal activity for user accounts and devices and raising the alarm when anomalous behavior occurs. The new Watchlists lets you import CSV files of non-security data such as critical assets, terminated employees etc. and use these data in queries.

If you’re particularly adventurous you can even build your own Machine Learning models in Sentinel.

Subscribe to 4sysops newsletter!

In today's business landscape, where security is more important than ever (especially as many of us are working from home in hastily cobbled together solutions), having an integrated security solution can simplify management, increase visibility and protection, and above all, reduce alert fatigue for your SOC analysts.

avatar

IT Administration News

  • New Copilot for Microsoft 365 features will be rolled out in July – Neowin
  • Microsoft clarifies Azure MFA requirements: What you need to know – Neowin
  • Microsoft’s AI CEO claims nearly everything on the web can be freely used for AI training – Neowin
  • Whats New in Microsoft Teams | June 2024 – Microsoft Community Hub
  • Microsoft is deprecating WSUS driver synchronization – Neowin

Read All IT Administration News

Join our IT community and read articles without ads!

Do you want to write for 4sysops? We are looking for new authors.

Audit and disable NTLMv1

Audit and disable NTLMv1

Avatar

Enable FIDO passkey authentication for IAM users in AWS

Avatar

Setting up EC2 instance access to an S3 bucket using IAM and OpenTofu

Avatar

Enable Microsoft Entra ID passkey authentication

Avatar

Use PowerShell to deploy and access GPT-4o in Azure OpenAI Service

Avatar

KeePassXC: A free cross-platform password manager for Windows, macOS and Linux

Avatar

Microsoft Purview Audit Search Graph API: Retrieve audit logs from Microsoft 365 with PowerShell

Flow of an external authentication with Entra ID. Courtesy: Microsoft

Configuring external authentication methods in Microsoft 365 with Microsoft Entra ID

Microsoft Graph and its interconnected components

Integrate Microsoft Graph activity logs for Microsoft 365 with Azure Monitor

Representation of a multitenant organization

The new Microsoft 365 multitenant organization feature

Running an OpenTofu init

Create an S3 bucket in AWS with OpenTofu

Exchange Online Interacting with Azure Communication Services Email

Disable Basic Authentication for SMTP AUTH in Exchange Online

Add-BitLockerKeyProtector displays the new key on the screen if it is called without WarningAction.

Rotate BitLocker recovery passwords, delete used keys from Active Directory

Deregister an AMI and delete all associated EBS snapshots

Deregister an AMI and delete attached EBS snapshots in AWS with a script

Granting permissions to select principals to unlock user accounts.

Delegate permission to unlock Active Directory accounts

Figure 8 Graph API. Image courtesy: Microsoft

Alternatives to RBAC application impersonation in Exchange Online

Executing arbitrary code on the logon screen

Allow end users to execute code on the Windows logon screen with administrator privileges

Avatar

New mitigations for CVE-2023-24932 (BlackLotus) in the April update, not yet enabled by default

Disabling Automatic Scaling

How to enable Azure App Service Automatic Scaling

Entra ID excludes insecure passwords based on a list that Microsoft does not publicly disclose

Combining password policies for Active Directory and Entra ID (Azure AD)

Avatar

Hi Paul, great blog. I would like to steal your blog and use large portions and translate in Dutch for an explaination to our customers and co-workers. I am naming you and reference to your article. Would you approve such an action ? Cheers and great article.

Avatar

Frank, you can use the text internally in your organization, but you must not publish the translated text.

avatar

Leave a reply Click here to cancel the reply

Please enclose code in pre tags: <pre></pre>

Your email address will not be published. Required fields are marked *

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Receive new post notifications

Twitter

Subscribe to Newsletter

Follow 4sysops.

Please ask IT administration questions in the forums . Any other messages are welcome.

Log in with your credentials

or      Create an account

Forgot your details?

Create account.

How-To Geek

Microsoft 365 isn't just office apps: don't overlook these perks.

4

Your changes have been saved

Email Is sent

Please verify your email address.

You’ve reached your account maximum for followed topics.

Key Takeaways

  • With a Microsoft 365 subscription, you get access to a secure Personal Vault for storing confidential documents and an advanced Microsoft Defender app available on Windows, macOS, iOS, and Android.
  • You receive 60 free Skype minutes each month for making calls to landline and mobile numbers, access to premium templates for document creation, and expanded storage space.
  • Furthermore, you can use the advanced features of Microsoft Editor, use the Copilot add-on in Office applications, and schedule callback support for technical assistance whenever needed.

Subscribing to Microsoft 365 not only provides access to a suite of Office applications but also offers several additional benefits. Let's see how these benefits make your subscription more valuable, and how you might get the most out of them.

OneDrive's Personal Vault

You might already use OneDrive's cloud storage for storing data, but did you know Microsoft offers a Personal Vault feature to protect sensitive information with an extra layer of security? Files stored in the vault can only be accessed after confirming your identity, typically by entering a confirmation code, adding a PIN, using Face ID, and more.

Moving a file to Personal Vault in OneDrive.

While the free plan allows you to add up to three files to your Personal Vault, a Microsoft 365 subscription lets you store an unlimited number of files. This makes it a decent place to save soft copies of legal, personal identification, and other sensitive documents. This way, you can easily access them while keeping your data protected from privacy leaks.

60 Skype Minutes Per Month

While Skype-to-Skype calls are free, you need Skype minutes—referred to as Skype Credit—to call landlines and mobile phones. With Microsoft 365 Personal, Family, and Business plans, you get 60 of these credits for free each month. Even if you've previously purchased credits, Skype uses the free minutes first.

The downside is that unused minutes don't roll over and expire at the end of each month. Also, these free minutes can only be used in 60 regions and countries. To avoid unexpected charges, check the list of eligible countries on the Microsoft website to ensure the destination you want to call is covered.

The Microsoft Defender Desktop App

With a Microsoft 365 Personal or Family subscription, you get exclusive access to the Microsoft Defender app , which offers security features beyond the built-in Windows Defender. Available for Windows, macOS, Android, and iOS, this app allows you to protect multiple devices and monitor the security of all your devices from a unified dashboard.

The welcome screen of the Microsoft Defender desktop app.

The app monitors your personal information for identity theft, alerting you to any suspicious activity. As a parent, you can set screen time limits, filter content, and monitor your child's activity. Also, it provides advanced protection against phishing attacks, ransomware, and other types of malware.

For more details on the additional benefits of the Microsoft Defender app, visit the official Microsoft website .

Extra Cloud Storage Space

On a free plan, you only get 5 GB of cloud storage space. However, subscribing to Microsoft 365 provides additional storage—100 GB, 1 TB, or even 6 TB (1 TB per user), depending on your subscription plan. With this extra storage, you can do a lot more than store your data. Check out different Microsoft 365 plans on the Microsoft website .

You can back up critical data and large files to OneDrive and keep them synced across multiple devices for easy access anywhere. You can also keep track of older versions of files you modify and automatically back up files created in Office apps. Moreover, with more storage, you can fully utilize Personal Vault to secure your confidential data.

The limited storage on the free plan makes it challenging to take full advantage of OneDrive's features. Thus, the increased storage capacity with Microsoft 365 is a valuable perk.

Premium Templates

A Microsoft 365 subscription also provides access to a wide range of premium templates for Microsoft Office applications. Whether you need to create a business report, build a resume, design a brochure, or create a budget plan, there's a template available for any document, presentation, or spreadsheet you want to make.

These templates are professionally designed and ready to use, but they are also customizable. You can modify text, colors, and other elements to suit your needs. Using these templates saves you the time and effort of creating documents from scratch. Plus, since they are integrated into Microsoft Office applications, you can use them with a single click.

Technical Support Via Callback

An iPhone 11 receiving a FaceTime call.

As a free user, technical support via live chat is limited. If no support representatives are available, you'll have to wait your turn, and long wait times can be pretty frustrating. If you move away from the window and don't respond when a representative becomes available, you're removed from the queue and need to start over.

With a Microsoft 365 subscription, you can avoid this hassle. While you can still use live chat when a support person is available, you also have the option to schedule a callback. This allows you to receive phone support from a Microsoft technical expert at a convenient time, which eliminates wait times and speeds up the troubleshooting process.

Additionally, when seeking email support for OneDrive, Microsoft 365 subscribers receive faster response times compared to non-subscribers.

Microsoft Editor and Copilot

As a free user, Microsoft Editor only provides basic spelling and grammar checking. However, with a Microsoft 365 subscription, you gain access to advanced grammar checks, clarity and conciseness improvements, and formal tone adjustments for professional documents and emails. The tool also suggests better vocabulary where appropriate.

Also, subscribers can access the Copilot add-on for most Microsoft Office apps, which can boost productivity and efficiency in your work.

Besides unlocking full access to all Office applications, a Microsoft 365 subscription provides a range of valuable benefits that can save you time and effort when used correctly. If you are already using Office 365 but haven't explored these features, give them a try to see how they can improve your workflow.

If you're not yet subscribed, you're clearly missing out on a host of productivity-boosting tools and perks.

  • Microsoft 365
  • Microsoft Office

Darmowy kompletny pakiet biurowy z edytorem PDF

Edytuj za darmo dokumenty Word, Excel i PPT.

Czytaj, edytuj i konwertuj pliki PDF za pomocą potężnego narzędzia do PDF.

Interfejs zbliżony do Microsoft, łatwy w obsłudze.

Windows • MacOS • Linux • iOS • Android

banner

  • Strona główna

Pobierz Office za darmo bez licencji. Jak to zrobić w 2024 roku?

Pobieranie Office'a za darmo bez licencji pozostaje niezbędne dla tysięcy organizacji i indywidualnych użytkowników, którzy nie mogą sobie pozwolić na subskrypcję Office 365, ale potrzebują darmowego pakietu biurowego. W tym artykule przedstawimy główne metody pobierania Office'a za darmo bez licencji w 2024 roku i zapoznamy cię z bezpłatną alternatywą, jaką jest WPS Office, aby łatwo zainstalować pakiet biurowy.

Pobierz Office za darmo bez licencji w 2024 roku – Trzy sposoby na to

Jeśli potrzebujesz pracować z dokumentami Worda, Excela lub PowerPointa, ale nie masz subskrypcji Microsoft 365, możesz spróbować pobrać Office'a za darmo bez licencji dla systemów Windows 7, 8.1, 10, 11, a nawet macOS. Jednak Microsoft zaostrzył kontrole nad swoim pakietem Office, co sprawia, że instalacje za pomocą ISO stają się coraz bardziej ograniczone, a uzyskanie klucza licencyjnego online jest mało skuteczne.

Nie martw się! Poniżej omówimy główne metody pobierania Office'a za darmo bez licencji, począwszy od pobierania i instalowania starego ISO w systemie Windows, aż do poproszenia o bezpłatną wersję próbną Office'a dla systemów Windows i macOS. A jeśli żaden z tych sposobów cię nie satysfakcjonuje, pamiętaj, że zawsze możesz zainstalować WPS Office za darmo, aby uzyskać dostęp do szerokiego zakresu funkcji biurowych bez żadnych kosztów.

Jak pobrać Office za darmo bez licencji dla systemu Windows?

Istnieje kilka sposobów pobrania Office'a za darmo bez licencji dla systemu Windows 10, chociaż idealna metoda zależy od twojej wiedzy technicznej i sposobu, w jaki zamierzasz korzystać z pakietu biurowego. Doświadczeni użytkownicy mogą zainstalować Office bezpośrednio z ISO , podczas gdy inni mogą subskrybować Office 365 i korzystać z bezpłatnej wersji próbnej udostępnionej przez Microsoft.

Użyj pobranego ISO i aktywuj

Możesz uzyskać nieco przestarzałe, ale wciąż funkcjonalne pełne wersje Office'a, pobierając instalacyjne ISO. Pozwala to pobrać Office'a za darmo bez licencji w 2019 lub 2016 roku, zainstalować go na swoich urządzeniach i pracować z Wordem, PowerPointem lub Excelem. Oto plik ISO/IMG Microsoft Office 2019 Pro Plus do pobrania.

Język

Rozmiar

Link do pobrania

Angielski

3.3 GB

Niemiecki

3.27 GB

Włoski

3.31 GB

Hiszpański

3.22 GB

Portugalski

3.19 GB

Portugalski (Brazylia)

3.2 GB

Francuski

3.3 GB

Japoński

3.4 GB

Rosyjski

3.2 GB

Chiński (uproszczony)

3.2 GB

Chiński (tradycyjny)

3.2 GB

Tajski

3.1 GB

Wietnamski

3 GB

Aby go aktywować, najczęstszą metodą jest użycie klucza produktu lub aktywatora KMSpico. Jeśli zakupisz komputer z zainstalowanym wstępnie Office'em, prawdopodobnie masz klucz produktu, który musisz znaleźć. W przeciwnym razie oto obszerny przewodnik, jak używać KMSpico do aktywacji Office'a 2019 .

Po aktywacji możesz korzystać z Office'a za darmo bez żadnych problemów. Aktywator KMSpico można usunąć po aktywowaniu Microsoft Office.

Wadą tego sposobu jest to, że instalacja ISO i aktywacja za pomocą KMSpico są dość skomplikowane i czasochłonne. Bez klucza produktu ta metoda nie jest zalecana.

Pobierz wersję próbną Office 365

Nowe wersje Office'a działają poprzez system subskrypcji, który nie obsługuje już pobierania ISO. Jednakże oferują one miesięczną bezpłatną wersję próbną, dzięki której możesz ocenić aplikacje pakietu przed zapisaniem się na subskrypcję. Pozwala to pobrać Office 'a za darmo bez licencji dla systemu Windows, korzystając z konta Microsoft i korzystać z niego przez miesiąc za darmo. Po tym czasie będziesz musiał zapłacić lub anulować subskrypcję.

Jak pobrać Office za darmo bez licencji dla Maca?

Proces pobierania Office'a za darmo bez licencji dla systemu Mac w 2021 lub 2023 roku jest podobny do tego dla systemów Windows. Nie jest już możliwe zainstalowanie Office'a dla Maca za pomocą ISO, więc najlepiej zdecydować się na subskrypcję Office 365. Podczas gdy subskrypcje Office 365 kosztują od 69 do 149 euro rocznie, możesz skorzystać z 30-dniowej wersji próbnej za darmo. Pamiętaj, że będziesz musiał podać numer karty kredytowej, aby aktywować tę wersję próbną.

Najlepszą alternatywą dla Microsoft Office'a: WPS Office

Mimo że pakiet biurowy Office oferuje doskonały zestaw narzędzi do pracy z różnymi dokumentami, może być kosztowny dla wielu użytkowników. Jeśli nie możesz sobie pozwolić na subskrypcję Office 365 lub wolisz prostsze rozwiązanie, rozważ WPS Office , darmową i wszechstronną alternatywę.

WPS Office jest kompatybilny z Wordem, PowerPointem i Excelem, a także zawiera edytor i konwerter plików PDF , których nie ma w pakiecie Microsoft Office. Jedną z jego głównych zalet jest możliwość korzystania z pakietu za darmo bez subskrypcji żadnych planów, chociaż z niektórymi zrezygnowanymi funkcjami zaawansowanymi.

WPS Writer , edytor, jest jednym z najbardziej kompletnych, posiadając nawet bardziej intuicyjny interfejs niż Microsoft Word. Prezentacja WPS i Arkusz WPS zapewniają podobną łatwość użytkowania dla dokumentów PowerPointa i Excela, odpowiednio.

Ponadto WPS Office może poszczycić się zaawansowanym zintegrowanym AI, który może być używany do różnych zadań, takich jak tworzenie lub podsumowywanie tekstów, tworzenie list, rozwijanie punktów, czy korektę gramatyczną.

Jego intuicyjny interfejs sprawia, że instalacja jest o wiele prostsza - wystarczy odwiedzić stronę internetową WPS, pobrać oprogramowanie i zainstalować je na swoim komputerze PC lub Mac. Nie ma potrzeby korzystania z ISO ani podawania danych płatnościowych, a pakiet biurowy za darmo będzie gotowy w zaledwie kilka minut.

Jak zainstalować Microsoft Office za darmo bez licencji?

Starsze wersje Microsoft Office'a można zainstalować bez licencji, jeśli uda ci się pobrać kompatybilne ISO dla swojego systemu operacyjnego. Jednak te wersje mają ograniczenia i dezaktywują się po krótkim czasie.

Gdzie mogę pobrać pakiet biurowy za darmo?

Office 365 pozwala na subskrybowanie planów indywidualnych, rodzinnych lub akademickich i zapytanie o 30-dniową wersję próbną, co daje dostęp do pełnego pakietu. Po okresie próbnym będziesz musiał zapłacić za plan lub anulować subskrypcję.

Który Office można używać bez licencji?

Można używać starszych wersji Office'a bez licencji, jeśli uzyskasz ważne ISO i pomyślnie je zainstalujesz na swoim systemie operacyjnym. Jednak automatyczne aktualizacje firmy Microsoft wykryją brak licencji i ostatecznie dezaktywują Office'a.

Jak pobrać Worda, Excela i PowerPointa za darmo?

Najprostszym sposobem uzyskania dostępu do aplikacji Worda, Excela i PowerPointa jest korzystanie z darmowego pakietu biurowego, takiego jak WPS Office, który zapewnia w pełni funkcjonalne aplikacje biurowe dożywotnio bez żadnych kosztów.

Wypróbuj teraz WPS Office za darmo i poznaj jego zalety!

Jeśli nie jesteś pewien instalowania Microsoft Office za pomocą ISO, nie możesz uzyskać klucza licencyjnego lub wahasz się przed ryzykiem potencjalnych opłat od Microsoftu za pełen roczny plan podczas korzystania z wersji próbnej Office 365, twoją najlepszą alternatywą jest WPS Office. Dzięki kompleksowemu pakietowi biurowemu WPS Office zyskasz dostęp do najlepszych aplikacji do tworzenia i zarządzania plikami Word, PowerPoint, Excel y PDF.

Darmowa wersja WPS Office oferuje w pełni funkcjonalne wersje WPS Writer, WPS Presentation i WPS Spreadsheet. Dodatkowo zapewnia liczne opcje konwersji plików. Możesz teraz eksplorować jego możliwości bez żadnych opłat ani konieczności podawania danych bankowych. Jeśli później zechcesz uzyskać dostęp do jego zaawansowanych funkcji, łatwo możesz przeprowadzić aktualizację do pełnej wersji, kiedy uznasz to za odpowiednie.

  • 1. Jak zrobić oś czasu w programie PowerPoint
  • 2. [2024 Zaktualizowane] Pobierz za darmo crack do Microsoft Office 2019
  • 3. Jak aktywować pakiet Microsoft Office bez klucza produktu [2024]
  • 4. Pobierz Microsoft Excel 2013 za darmo
  • 5. [Aktualizacja 2024] Microsoft Office Crack Pobierz bezpłatnie 2024
  • 6. 5 Kluczowych Rzeczy Dotyczących Licencji Microsoft Office Przed Jej Użyciem

defender for office 365 presentation

15 lat doświadczenia w branży biurowej, miłośnik technologii i copywriter. Śledź mnie, aby uzyskać recenzje, porównania i rekomendacje dotyczące nowych aplikacji i oprogramowania.

defender for office 365 presentation

Power BI insights. Microsoft 365 productivity.

defender for office 365 presentation

Explore how Microsoft 365 works seamlessly with Power BI

Share valuable insights with microsoft teams.

A screenshot of a Microsoft Teams chat

Save time exploring data with Excel

A screen shot of Excel with Power BI data

Share reports for insightful decision-making

A screenshot of a Sharepoint site with Power BI data

Publish your reports to PowerPoint

A screenshot of a Power BI report embedded into a presentation

Share data and insights with Outlook

A screenshot showing a user embedding a Power BI report into an email in Outlook

Help protect your Power BI data—even when exported to Excel or PowerPoint

A screenshot of a security dashboard

The intersection of business intelligence and productivity

defender for office 365 presentation

Access insights when you need them

defender for office 365 presentation

Help protect your exported BI data

defender for office 365 presentation

Find answers quickly

defender for office 365 presentation

Improve your organizational decision-making

defender for office 365 presentation

See how customers bring together Power BI and Microsoft 365

defender for office 365 presentation

“We run our business on Power BI reports now. The standard for most meetings or presentations at Avanade is to provide a link to a Power BI report that’s connected to official data sources.”

Worker wearing a hard hat standing at a construction site

“Now we can understand progress just by looking at the Power BI screen. We were able to reduce the time required to input and draw by about 60 percent.”

defender for office 365 presentation

“We employ nearly 11,000 people … Not all of them are as tech-savvy as we need them to be. Together with Microsoft, we’re finally changing that narrative.”

More about power bi.

defender for office 365 presentation

Self-guided learning

defender for office 365 presentation

Documentation

defender for office 365 presentation

Power BI support

defender for office 365 presentation

Community overview

defender for office 365 presentation

Power BI blog

A woman sitting at a table using a laptop.

Powerful integrations

defender for office 365 presentation

Excel and Power BI

defender for office 365 presentation

Azure and Power BI

defender for office 365 presentation

Power BI for business analysts

defender for office 365 presentation

Dynamics 365 and Power BI

Follow power platform.

Twitter logo

  • Windows 10, version 22H2 update history

June 25, 2024—KB5039299 (OS Build 19045.4598) Preview

  • June 11, 2024—KB5039211 (OS Builds 19044.4529 and 19045.4529)
  • May 29, 2024—KB5037849 (OS Build 19045.4474) Preview
  • May 14, 2024—KB5037768 (OS Builds 19044.4412 and 19045.4412)
  • April 23, 2024—KB5036979 (OS Build 19045.4355) Preview
  • April 9, 2024—KB5036892 (OS Builds 19044.4291 and 19045.4291)
  • March 26, 2024—KB5035941 (OS Build 19045.4239) Preview
  • March 12, 2024—KB5035845 (OS Builds 19044.4170 and 19045.4170)
  • February 29, 2024—KB5034843 (OS Build 19045.4123) Preview
  • February 13, 2024—KB5034763 (OS Builds 19044.4046 and 19045.4046)
  • January 23, 2024—KB5034203 (OS Build 19045.3996) Preview
  • January 9, 2024—KB5034122 (OS Builds 19044.3930 and 19045.3930)
  • December 12, 2023—KB5033372 (OS Builds 19044.3803 and 19045.3803)
  • November 30, 2023—KB5032278 (OS Build 19045.3758) Preview
  • November 14, 2023—KB5032189 (OS Builds 19044.3693 and 19045.3693)
  • October 26, 2023—KB5031445 (OS Build 19045.3636) Preview
  • October 10, 2023—KB5031356 (OS Builds 19044.3570 and 19045.3570)
  • September 26, 2023—KB5030300 (OS Build 19045.3516) Preview
  • September 12, 2023—KB5030211 (OS Builds 19044.3448 and 19045.3448)
  • August 22, 2023—KB5029331 (OS Build 19045.3393) Preview
  • August 8, 2023—KB5029244 (OS Builds 19044.3324 and 19045.3324)
  • July 25, 2023—KB5028244 (OS Build 19045.3271) Preview
  • July 11, 2023—KB5028166 (OS Builds 19044.3208 and 19045.3208)
  • June 27, 2023—KB5027293 (OS Build 19045.3155) Preview
  • June 13, 2023—KB5027215 (OS Builds 19044.3086 and 19045.3086)
  • May 23, 2023—KB5026435 (OS Build 19045.3031) Preview
  • May 9, 2023—KB5026361 (OS Builds 19042.2965, 19044.2965, and 19045.2965)
  • April 25, 2023—KB5025297 (OS Build 19045.2913) Preview
  • April 11, 2023—KB5025221 (OS Builds 19042.2846, 19044.2846, and 19045.2846)
  • March 21, 2023—KB5023773 (OS Builds 19042.2788, 19044.2788, and 19045.2788) Preview
  • March 14, 2023—KB5023696 (OS Builds 19042.2728, 19044.2728, and 19045.2728)
  • February 21, 2023—KB5022906 (OS Builds 19042.2673, 19044.2673, and 19045.2673) Preview
  • February 14, 2023—KB5022834 (OS Builds 19042.2604, 19044.2604, and 19045.2604)
  • January 19, 2023—KB5019275 (OS Builds 19042.2546, 19044.2546, and 19045.2546) Preview
  • January 10, 2023—KB5022282 (OS Builds 19042.2486, 19044.2486, and 19045.2486)
  • December 13, 2022—KB5021233 (OS Builds 19042.2364, 19043.2364, 19044.2364, and 19045.2364)
  • November 15, 2022—KB5020030 (OS Builds 19042.2311, 19043.2311, 19044.2311, and 19045.2311) Preview
  • November 8, 2022—KB5019959 (OS Builds 19042.2251, 19043.2251, 19044.2251, and 19045.2251)
  • October 28, 2022—KB5020953 (OS Builds 19042.2194, 19043.2194, 19044.2194, and 19045.2194) Out-of-band
  • Windows 10, version 21H2 update history
  • October 25, 2022—KB5018482 (OS Builds 19042.2193, 19043.2193, and 19044.2193) Preview
  • October 17, 2022—KB5020435 (OS Builds 19042.2132, 19043.2132, and 19044.2132) Out-of-band
  • October 11, 2022—KB5018410 (OS Builds 19042.2130, 19043.2130, and 19044.2130)
  • September 20, 2022—KB5017380 (OS Builds 19042.2075, 19043.2075, and 19044.2075) Preview
  • September 13, 2022—KB5017308 (OS Builds 19042.2006, 19043.2006, and 19044.2006)
  • August 26, 2022—KB5016688 (OS Builds 19042.1949, 19043.1949, and 19044.1949) Preview
  • August 9, 2022—KB5016616 (OS Builds 19042.1889, 19043.1889, and 19044.1889)
  • July 26, 2022—KB5015878 (OS Builds 19042.1865, 19043.1865, and 19044.1865) Preview
  • July 12, 2022—KB5015807 (OS Builds 19042.1826, 19043.1826, and 19044.1826)
  • June 28, 2022—KB5014666 (OS Builds 19042.1806, 19043.1806, and 19044.1806) Preview
  • June 20, 2022—KB5016139 (OS Builds 19042.1767, 19043.1767, and 19044.1767) Out-of-band
  • June 14, 2022—KB5014699 (OS Builds 19042.1766, 19043.1766, and 19044.1766)
  • June 2, 2022—KB5014023 (OS Builds 19042.1741, 19043.1741, and 19044.1741) Preview
  • May 19, 2022—KB5015020 (OS Builds 19042.1708, 19043.1708, and 19044.1708) Out-of-band
  • May 10, 2022—KB5013942 (OS Builds 19042.1706, 19043.1706, and 19044.1706)
  • April 25, 2022—KB5011831 (OS Builds 19042.1682, 19043.1682, and 19044.1682) Preview
  • April 12, 2022—KB5012599 (OS Builds 19042.1645, 19043.1645, and 19044.1645)
  • March 22, 2022—KB5011543 (OS Builds 19042.1620, 19043.1620, and 19044.1620) Preview
  • March 8, 2022—KB5011487 (OS Builds 19042.1586, 19043.1586, and 19044.1586)
  • February 15, 2022—KB5010415 (OS Builds 19042.1566, 19043.1566, and 19044.1566) Preview
  • February 8, 2022—KB5010342 (OS Builds 19042.1526, 19043.1526, and 19044.1526)
  • January 25, 2022—KB5009596 (OS Builds 19042.1503, 19043.1503, and 19044.1503) Preview
  • January 17, 2022—KB5010793 (OS Builds 19042.1469, 19043.1469, and 19044.1469) Out-of-band
  • January 11, 2022—KB5009543 (OS Builds 19042.1466, 19043.1466, and 19044.1466)
  • December 14, 2021—KB5008212 (OS Builds 19041.1415, 19042.1415, 19043.1415, and 19044.1415)
  • November 22, 2021—KB5007253 (OS Builds 19041.1387, 19042.1387, 19043.1387, and 19044.1387) Preview
  • Windows 10, version 21H1 update history
  • End of service statement
  • November 9, 2021—KB5007186 (OS Builds 19041.1348, 19042.1348, and 19043.1348)
  • October 26, 2021—KB5006738 (OS Builds 19041.1320, 19042.1320, and 19043.1320) Preview
  • October 12, 2021—KB5006670 (OS Builds 19041.1288, 19042.1288, and 19043.1288)
  • September 30, 2021—KB5005611 (OS Builds 19041.1266, 19042.1266, and 19043.1266) Preview
  • September 14, 2021—KB5005565 (OS Builds 19041.1237, 19042.1237, and 19043.1237)
  • September 1, 2021—KB5005101 (OS Builds 19041.1202, 19042.1202, and 19043.1202) Preview
  • August 10, 2021—KB5005033 (OS Builds 19041.1165, 19042.1165, and 19043.1165)
  • July 29, 2021—KB5004296 (OS Builds 19041.1151, 19042.1151, and 19043.1151) Preview
  • July 13, 2021—KB5004237 (OS Builds 19041.1110, 19042.1110, and 19043.1110)
  • July 6, 2021—KB5004945 (OS Builds 19041.1083, 19042.1083, and 19043.1083) Out-of-band
  • June 29, 2021—KB5004760 (OS Builds 19041.1082, 19042.1082, and 19043.1082) Out-of-band
  • June 21, 2021—KB5003690 (OS Builds 19041.1081, 19042.1081, and 19043.1081) Preview
  • June 11, 2021—KB5004476 (OS Builds 19041.1055, 19042.1055, and 19043.1055) Out-of-band
  • June 8, 2021—KB5003637 (OS Builds 19041.1052, 19042.1052, and 19043.1052)
  • May 25, 2021—KB5003214 (OS Builds 19041.1023, 19042.1023, and 19043.1023) Preview
  • May 11, 2021—KB5003173 (OS Builds 19041.985, 19042.985, and 19043.985)
  • Windows 10, version 20H2 and Windows Server, version 20H2 update history
  • April 28, 2021—KB5001391 (OS Builds 19041.964 and 19042.964) Preview
  • April 13, 2021—KB5001330 (OS Builds 19041.928 and 19042.928)
  • March 29, 2021—KB5000842 (OS Builds 19041.906 and 19042.906) Preview
  • March 18, 2021—KB5001649 (OS Builds 19041.870 and 19042.870) Out-of-band
  • March 15, 2021—KB5001567 (OS Builds 19041.868 and 19042.868) Out-of-band
  • March 9, 2021—KB5000802 (OS Builds 19041.867 and 19042.867)
  • February 24, 2021—KB4601382 (OS Builds 19041.844 and 19042.844) Preview
  • February 9, 2021—KB4601319 (OS Builds 19041.804 and 19042.804)
  • February 2, 2021—KB4598291 (OS Builds 19041.789 and 19042.789) Preview
  • January 12, 2021—KB4598242 (OS Builds 19041.746 and 19042.746)
  • December 8, 2020—KB4592438 (OS Builds 19041.685 and 19042.685)
  • November 30, 2020—KB4586853 (OS Builds 19041.662 and 19042.662) Preview
  • November 19, 2020—KB4594440 (OS Builds 19041.631 and 19042.631) Out-of-band
  • November 10, 2020—KB4586781 (OS Builds 19041.630 and 19042.630)
  • October 29, 2020—KB4580364 (OS Builds 19041.610 and 19042.610) Preview
  • Windows 10, version 2004 and Windows Server, version 2004 update history
  • October 13, 2020—KB4579311 (OS Build 19041.572)
  • October 1, 2020—KB4577063 (OS Build 19041.546) Preview
  • September 8, 2020—KB4571756 (OS Build 19041.508)
  • September 3, 2020—KB4571744 (OS Build 19041.488) Preview
  • August 11, 2020—KB4566782 (OS Build 19041.450)
  • July 31, 2020—KB4568831 (OS Build 19041.423)
  • July 14, 2020—KB4565503 (OS Build 19041.388)
  • June 18, 2020—KB4567523 (OS Build 19041.331)
  • June 9, 2020—KB4557957 (OS Build 19041.329)
  • Windows 10, version 1909 and Windows Server, version 1909 update history
  • May 10, 2022—KB5013945 (OS Build 18363.2274)
  • April 12, 2022—KB5012591 (OS Build 18363.2212)
  • March 8, 2022—KB5011485 (OS Build 18363.2158)
  • February 8, 2022—KB5010345 (OS Build 18363.2094)
  • January 17, 2022—KB5010792 (OS Build 18363.2039) Out-of-band
  • January 11, 2022—KB5009545 (OS Build 18363.2037)
  • December 14, 2021—KB5008206 (OS Build 18363.1977)
  • November 9, 2021—KB5007189 (OS Build 18363.1916)
  • October 12, 2021—KB5006667 (OS Build 18363.1854)
  • September 21, 2021—KB5005624 (OS Build 18363.1830) Preview
  • September 14, 2021—KB5005566 (OS Build 18363.1801)
  • August 26, 2021—KB5005103 (OS Build 18363.1766) Preview
  • August 10, 2021—KB5005031 (OS Build 18363.1734)
  • July 29, 2021—KB5004293 (OS Build 18363.1714) Preview
  • July 13, 2021—KB5004245 (OS Build 18363.1679)
  • July 6, 2021—KB5004946 (OS Build 18363.1646) Out-of-band
  • June 15, 2021—KB5003698 (OS Build 18363.1645) Preview
  • June 8, 2021—KB5003635 (OS Build 18363.1621)
  • May 20, 2021—KB5003212 (OS Build 18363.1593) Preview
  • May 11, 2021—KB5003169 (OS Build 18363.1556)
  • April 22, 2021—KB5001396 (OS Build 18363.1533) Preview
  • April 13, 2021—KB5001337 (OS Build 18363.1500)
  • March 25, 2021—KB5000850 (OS Build 18363.1474) Preview
  • March 18, 2021—KB5001648 (OS Build 18363.1443) Out-of-band
  • March 15, 2021—KB5001566 (OS Build 18363.1441) Out-of-band
  • March 9, 2021—KB5000808 (OS Build 18363.1440)
  • February 16, 2021—KB4601380 (OS Build 18363.1411) Preview
  • February 11, 2021—KB5001028 (OS Build 18363.1379) Out-of-band
  • February 9, 2021—KB4601315 (OS Build 18363.1377)
  • January 21, 2021—KB4598298 (OS Build 18363.1350) Preview
  • January 12, 2021—KB4598229 (OS Build 18363.1316)
  • December 8, 2020—KB4592449 (OS Builds 18362.1256 and 18363.1256)
  • November 19, 2020—KB4594443 (OS Builds 18362.1199 and 18363.1199) Out-of-band
  • November 19, 2020—KB4586819 (OS Builds 18362.1237 and 18363.1237) Preview
  • November 10, 2020—KB4586786 (OS Builds 18362.1198 and 18363.1198)
  • October 20, 2020—KB4580386 (OS Builds 18362.1171 and 18363.1171) Preview
  • October 13, 2020—KB4577671 (OS Builds 18362.1139 and 18363.1139)
  • September 16, 2020—KB4577062 (OS Builds 18362.1110 and 18363.1110) Preview
  • September 8, 2020—KB4574727 (OS Builds 18362.1082 and 18363.1082)
  • August 20, 2020—KB4566116 (OS Builds 18362.1049 and 18363.1049) Preview
  • August 11, 2020—KB4565351 (OS Builds 18362.1016 and 18363.1016)
  • July 21, 2020—KB4559004 (OS Builds 18362.997 and 18363.997)
  • July 14, 2020—KB4565483 (OS Builds 18362.959 and 18363.959)
  • June 16, 2020—KB4567512 (OS Builds 18362.904 and 18363.904)
  • June 9, 2020—KB4560960 (OS Builds 18362.900 and 18363.900)
  • May 12, 2020—KB4556799 (OS Builds 18362.836 and 18363.836)
  • April 21, 2020—KB4550945 (OS Builds 18362.815 and 18363.815)
  • April 14, 2020—KB4549951 (OS Builds 18362.778 and 18363.778)
  • March 30, 2020—KB4554364 (OS Builds 18362.753 and 18363.753)
  • March 24, 2020—KB4541335 (OS Builds 18362.752 and 18363.752)
  • March 12, 2020—KB4551762 (OS Builds 18362.720 and 18363.720)
  • March 10, 2020—KB4540673 (OS Builds 18362.719 and 18363.719)
  • February 27, 2020—KB4535996 (OS Builds 18362.693 and 18363.693)
  • February 11, 2020—KB4532693 (OS Builds 18362.657 and 18363.657)
  • January 28, 2020—KB4532695 (OS Builds 18362.628 and 18363.628)
  • January 14, 2020—KB4528760 (OS Builds 18362.592 and 18363.592)
  • December 10, 2019—KB4530684 (OS Builds 18362.535 and 18363.535)
  • November 12, 2019—KB4524570 (OS Builds 18362.476 and 18363.476)
  • Windows 10, version 1903 and Windows Server, version 1903 update history
  • October 24, 2019—KB4522355 (OS Build 18362.449)
  • October 8, 2019—KB4517389 (OS Build 18362.418)
  • October 3, 2019—KB4524147 (OS Build 18362.388)
  • September 26, 2019—KB4517211 (OS Build 18362.387)
  • September 23, 2019—KB4522016 (OS Build 18362.357)
  • September 10, 2019—KB4515384 (OS Build 18362.356)
  • August 30, 2019—KB4512941 (OS Build 18362.329)
  • August 13, 2019—KB4512508 (OS Build 18362.295)
  • July 26, 2019—KB4505903 (OS Build 18362.267)
  • July 9, 2019—KB4507453 (OS Build 18362.239)
  • June 27, 2019—KB4501375 (OS Build 18362.207)
  • June 11, 2019—KB4503293 (OS Build 18362.175)
  • May 29, 2019—KB4497935 (OS Build 18362.145)
  • Windows 10, version 1809, Windows Server, version 1809, and Windows Server 2019 update history
  • June 11, 2024—KB5039217 (OS Build 17763.5936)
  • May 23, 2024—KB5039705 (OS Build 17763.5830) Out-of-band
  • May 14, 2024—KB5037765 (OS Build 17763.5820)
  • April 9, 2024—KB5036896 (OS Build 17763.5696)
  • March 25, 2024—KB5037425 (OS Build 17763.5579) Out-of-band
  • March 12, 2024—KB5035849 (OS Build 17763.5576)
  • February 13, 2024—KB5034768 (OS Build 17763.5458)
  • January 9, 2024—KB5034127 (OS Build 17763.5329)
  • December 12, 2023—KB5033371 (OS Build 17763.5206)
  • November 14, 2023—KB5032196 (OS Build 17763.5122)
  • October 10, 2023—KB5031361 (OS Build 17763.4974)
  • September 12, 2023—KB5030214 (OS Build 17763.4851)
  • August 8, 2023—KB5029247 (OS Build 17763.4737)
  • July 11, 2023—KB5028168 (OS Build 17763.4645)
  • June 13, 2023—KB5027222 (OS Build 17763.4499)
  • May 9, 2023—KB5026362 (OS Build 17763.4377)
  • April 11, 2023—KB5025229 (OS Build 17763.4252)
  • March 14, 2023—KB5023702 (OS Build 17763.4131)
  • February 14, 2023—KB5022840 (OS Build 17763.4010)
  • January 10, 2023—KB5022286 (OS Build 17763.3887)
  • December 20, 2022—KB5022554 (OS Build 17763.3772) Out-of-band
  • December 13, 2022—KB5021237 (OS Build 17763.3770)
  • November 17, 2022—KB5021655 (OS Build 17763.3653) Out-of-band
  • November 8, 2022—KB5019966 (OS Build 17763.3650)
  • October 17, 2022—KB5020438 (OS Build 17763.3534) Out-of-band
  • October 11, 2022—KB5018419 (OS Build 17763.3532)
  • September 20, 2022—KB5017379 (OS Build 17763.3469) Preview
  • September 13, 2022—KB5017315 (OS Build 17763.3406)
  • August 23, 2022—KB5016690 (OS Build 17763.3346) Preview
  • August 9, 2022—KB5016623 (OS Build 17763.3287)
  • July 21, 2022—KB5015880 (OS Build 17763.3232) Preview
  • July 12, 2022—KB5015811 (OS Build 17763.3165)
  • June 23, 2022—KB5014669 (OS Build 17763.3113) Preview
  • June 14, 2022—KB5014692 (OS Build 17763.3046)
  • May 24, 2022—KB5014022 (OS Build 17763.2989) Preview
  • May 19, 2022—KB5015018 (OS Build 17763.2931) Out-of-band
  • May 10, 2022—KB5013941 (OS Build 17763.2928)
  • April 21, 2022—KB5012636 (OS Build 17763.2867) Preview
  • April 12, 2022—KB5012647 (OS Build 17763.2803)
  • March 22, 2022—KB5011551 (OS Build 17763.2746) Preview
  • March 8, 2022—KB5011503 (OS Build 17763.2686)
  • February 15, 2022—KB5010427 (OS Build 17763.2628) Preview
  • February 8, 2022—KB5010351 (OS Build 17763.2565)
  • January 25, 2022—KB5009616 (OS Build 17763.2510) Preview
  • January 18, 2022—KB5010791 (OS Build 17763.2458) Out-of-band
  • January 11, 2022—KB5009557 (OS Build 17763.2452)
  • January 4, 2022—KB5010196 (OS Build 17763.2369) Out-of-band
  • December 14, 2021—KB5008218 (OS Build 17763.2366)
  • November 22, 2021—KB5007266 (OS Build 17763.2330) Preview
  • November 14, 2021—KB5008602 (OS Build 17763.2305) Out-of-band
  • November 9, 2021—KB5007206 (OS Build 17763.2300)
  • October 19, 2021—KB5006744 (OS Build 17763.2268) Preview
  • October 12, 2021—KB5006672 (OS Build 17763.2237)
  • September 21, 2021—KB5005625 (OS Build 17763.2210) Preview
  • September 14, 2021—KB5005568 (OS Build 17763.2183)
  • August 26, 2021—KB5005102 (OS Build 17763.2145) Preview
  • August 10, 2021—KB5005030 (OS Build 17763.2114)
  • July 27, 2021—KB5005394 (OS Build 17763.2091) Out-of-band
  • July 20, 2021—KB5004308 (OS Build 17763.2090) Preview
  • July 13, 2021—KB5004244 (OS Build 17763.2061)
  • July 6, 2021—KB5004947 (OS Build 17763.2029) Out-of-band
  • June 15, 2021—KB5003703 (OS Build 17763.2028) Preview
  • June 8, 2021—KB5003646 (OS Build 17763.1999)
  • May 20, 2021—KB5003217 (OS Build 17763.1971) Preview
  • May 11, 2021—KB5003171 (OS Build 17763.1935)
  • April 22, 2021—KB5001384 (OS Build 17763.1911) Preview
  • April 13, 2021—KB5001342 (OS Build 17763.1879)
  • March 25, 2021—KB5000854 (OS Build 17763.1852) Preview
  • March 18, 2021—KB5001638 (OS Build 17763.1823) Out-of-band
  • March 15, 2021—KB5001568 (OS Build 17763.1821) Out-of-band
  • March 9, 2021—KB5000822 (OS Build 17763.1817)
  • February 16, 2021—KB4601383 (OS Build 17763.1790) Preview
  • February 9, 2021—KB4601345 (OS Build 17763.1757)
  • January 21, 2021—KB4598296 (OS Build 17763.1728) Preview
  • January 12, 2021—KB4598230 (OS Build 17763.1697)
  • December 8, 2020—KB4592440 (OS Build 17763.1637)
  • November 19, 2020—KB4586839 (OS Build 17763.1613) Preview
  • November 17, 2020—KB4594442 (OS Build 17763.1579) Out-of-band
  • November 10, 2020—KB4586793 (OS Build 17763.1577)
  • October 20, 2020—KB4580390 (OS Build 17763.1554) Preview
  • October 13, 2020—KB4577668 (OS Build 17763.1518)
  • September 16, 2020—KB4577069 (OS Build 17763.1490) Preview
  • September 8, 2020—KB4570333 (OS Build 17763.1457)
  • August 20, 2020—KB4571748 (OS Build 17763.1432) Preview
  • August 11, 2020—KB4565349 (OS Build 17763.1397)
  • July 21, 2020—KB4559003 (OS Build 17763.1369)
  • July 14, 2020—KB4558998 (OS Build 17763.1339)
  • June 16, 2020—KB4567513 (OS Build 17763.1294)
  • June 9, 2020—KB4561608 (OS Build 17763.1282)
  • May 12, 2020—KB4551853 (OS Build 17763.1217)
  • April 21, 2020—KB4550969 (OS Build 17763.1192)
  • April 14, 2020—KB4549949 (OS Build 17763.1158)
  • March 30, 2020—KB4554354 (OS Build 17763.1132)
  • March 17, 2020—KB4541331 (OS Build 17763.1131)
  • March 10, 2020—KB4538461 (OS Build 17763.1098)
  • February 25, 2020—KB4537818 (OS Build 17763.1075)
  • February 11, 2020—KB4532691 (OS Build 17763.1039)
  • January 23, 2020—KB4534321 (OS Build 17763.1012)
  • January 14, 2020—KB4534273 (OS Build 17763.973)
  • December 10, 2019—KB4530715 (OS Build 17763.914)
  • November 12, 2019—KB4523205 (OS Build 17763.864)
  • October 15, 2019—KB4520062 (OS Build 17763.832)
  • October 8, 2019—KB4519338 (OS Build 17763.805)
  • October 3, 2019—KB4524148 (OS Build 17763.775)
  • September 24, 2019—KB4516077 (OS Build 17763.774)
  • September 23, 2019—KB4522015 (OS Build 17763.740)
  • September 10, 2019—KB4512578 (OS Build 17763.737)
  • August 17, 2019—KB4512534 (OS Build 17763.720)
  • August 13, 2019—KB4511553 (OS Build 17763.678)
  • July 22, 2019—KB4505658 (OS Build 17763.652)
  • July 9, 2019—KB4507469 (OS Build 17763.615)
  • June 26, 2019—KB4509479 (OS Build 17763.593)
  • June 18, 2019—KB4501371 (OS Build 17763.592)
  • June 11, 2019—KB4503327 (OS Build 17763.557)
  • May 21, 2019—KB4497934 (OS Build OS 17763.529)
  • May 19, 2019—KB4505056 (OS Build 17763.504)
  • May 14, 2019—KB4494441 (OS Build 17763.503)
  • May 3, 2019—KB4495667 (OS Build 17763.475)
  • May 1, 2019—KB4501835 (OS Build 17763.439)
  • April 9, 2019—KB4493509 (OS Build 17763.437)
  • March 26, 2019—KB4490481 (OS Build 17763.402)
  • March 12, 2019—KB4489899 (OS Build 17763.379)
  • March 1, 2019—KB4482887 (OS Build 17763.348)
  • February 12, 2019—KB4487044 (OS Build 17763.316)
  • January 22, 2019—KB4476976 (OS Build 17763.292)
  • January 8, 2019—KB4480116 (OS Build 17763.253)
  • December 19, 2018—KB4483235 (OS Build 17763.195)
  • December 11, 2018—KB4471332 (OS Build 17763.194)
  • December 5, 2018—KB4469342 (OS Build 17763.168)
  • November 13, 2018—KB4464455 (OS Build 17763.107)
  • November 13, 2018—KB4467708 (OS Build 17763.134)
  • October 9, 2018—KB4464330 (OS Build 17763.55)
  • Windows 10, version 1803 update history
  • May 11, 2021—KB5003174 (OS Build 17134.2208)
  • April 13, 2021—KB5001339 (OS Build 17134.2145)
  • March 18, 2021—KB5001634 (OS Build 17134.2090) Out-of-band
  • March 15, 2021—KB5001565 (OS Build 17134.2088) Out-of-band
  • March 9, 2021—KB5000809 (OS Build 17134.2087)
  • February 9, 2021—KB4601354 (OS Build 17134.2026)
  • January 12, 2021—KB4598245 (OS Build 17134.1967)
  • December 8, 2020—KB4592446 (OS Build 17134.1902)
  • November 10, 2020—KB4586785 (OS Build 17134.1845)
  • October 13, 2020—KB4580330 (OS Build 17134.1792)
  • September 8, 2020—KB4577032 (OS Build 17134.1726)
  • August 11, 2020—KB4571709 (OS Build 17134.1667)
  • July 14, 2020—KB4565489 (OS Build 17134.1610)
  • June 16, 2020—KB4567514 (OS Build 17134.1553)
  • June 9, 2020—KB4561621 (OS Build 17134.1550)
  • May 12, 2020—KB4556807 (OS Build 17134.1488)
  • April 21, 2020—KB4550944 (OS Build 17134.1456)
  • April 14, 2020—KB4550922 (OS Build 17134.1425)
  • March 30, 2020—KB4554349 (OS Build 17134.1401)
  • March 17, 2020—KB4541333 (OS Build 17134.1399)
  • March 10, 2020—KB4540689 (OS Build 17134.1365)
  • February 25, 2020—KB4537795 (OS Build 17134.1345)
  • February 11, 2020—KB4537762 (OS Build 17134.1304)
  • January 23, 2020—KB4534308 (OS Build 17134.1276)
  • January 14, 2020—KB4534293 (OS Build 17134.1246)
  • December 10, 2019—KB4530717 (OS Build 17134.1184)
  • November 12, 2019—KB4525237 (OS Build 17134.1130)
  • October 15, 2019—KB4519978 (OS Build 17134.1099)
  • October 8, 2019—KB4520008 (OS Build 17134.1069)
  • October 3, 2019—KB4524149 (OS Build 17134.1040)
  • September 24, 2019—KB4516045 (OS Build 17134.1039)
  • September 23, 2019—KB4522014 (OS Build 17134.1009)
  • September 10, 2019—KB4516058 (OS Build 17134.1006)
  • August 19, 2019—KB4512509 (OS Build 17134.984)
  • August 13, 2019—KB4512501 (OS Build 17134.950)
  • July 16, 2019—KB4507466 (OS Build 17134.915)
  • July 9, 2019—KB4507435 (OS Build 17134.885)
  • June 26, 2019—KB4509478 (OS Build 17134.860)
  • June 18, 2019—KB4503288 (OS Build 17134.858)
  • June 11, 2019—KB4503286 (OS Build 17134.829)
  • May 21, 2019—KB4499183 (OS Build 17134.799)
  • May 19, 2019—KB4505064 (OS Build 17134.766)
  • May 14, 2019—KB4499167 (OS Build 17134.765)
  • April 25, 2019—KB4493437 (OS Build 17134.753)
  • April 9, 2019—KB4493464 (OS Build 17134.706)
  • March 19, 2019—KB4489894 (OS Build 17134.677)
  • March 12, 2019—KB4489868 (OS Build 17134.648)
  • February 19, 2019—KB4487029 (OS Build 17134.619)
  • February 12, 2019—KB4487017 (OS Build 17134.590)
  • January 15, 2019—KB4480976 (OS Build 17134.556)
  • January 8, 2019—KB4480966 (OS Build 17134.523)
  • December 19, 2018—KB4483234 (OS Build 17134.472)
  • December 11, 2018—KB4471324 (OS Build 17134.471)
  • November 27, 2018—KB4467682 (OS Build 17134.441)
  • November 13, 2018—KB4467702 (OS Build 17134.407)
  • October 24, 2018—KB4462933 (OS Build 17134.376)
  • October 9, 2018—KB4462919 (OS Build 17134.345)
  • September 26, 2018—KB4458469 (OS Build 17134.320)
  • September 17, 2018—KB4464218 (OS Build 17134.286)
  • September 11, 2018—KB4457128 (OS Build 17134.285)
  • August 30, 2018—KB4346783 (OS Build 17134.254)
  • August 14, 2018—KB4343909 (OS Build 17134.228)
  • July 24, 2018—KB4340917 (OS Build 17134.191)
  • July 16, 2018—KB4345421 (OS Build 17134.167)
  • July 10, 2018—KB4338819 (OS Build 17134.165)
  • June 26, 2018—KB4284848 (OS Build 17134.137)
  • June 12, 2018—KB4284835 (OS Build 17134.112)
  • June 5, 2018—KB4338548 (OS Build 17134.83)
  • May 23, 2018—KB4100403 (OS Build 17134.81)
  • May 8, 2018—KB4103721 (OS Build 17134.48)
  • Windows 10, version 1709 update history
  • October 13, 2020—KB4580328 (OS Build 16299.2166)
  • September 8, 2020—KB4577041 (OS Build 16299.2107)
  • August 11, 2020—KB4571741 (OS Build 16299.2045)
  • July 14, 2020—KB4565508 (OS Build 16299.1992)
  • June 18, 2020—KB4567515 (OS Build 16299.1937)
  • June 9, 2020—KB4561602 (OS Build 16299.1932)
  • May 12, 2020—KB4556812 (OS Build 16299.1868)
  • April 14, 2020—KB4550927 (OS Build 16299.1806)
  • March 30, 2020—KB4554342 (OS Build 16299.1776)
  • March 17, 2020—KB4541330 (OS Build 16299.1775)
  • March 10, 2020—KB4540681 (OS Build 16299.1747)
  • February 25, 2020—KB4537816 (OS Build 16299.1717)
  • February 11, 2020—KB4537789 (OS Build 16299.1686)
  • January 23, 2020—KB4534318 (OS Build 16299.1654)
  • January 14, 2020—KB4534276 (OS Build 16299.1625)
  • January 14, 2020—KB4535289 Update for Windows 10 Mobile (OS Build 15254.603)
  • December 10, 2019—KB4530714 (OS Build 16299.1565)
  • December 10, 2019—KB4522812 Update for Windows 10 Mobile (OS Build 15254.600)
  • November 12, 2019—KB4522811 Update for Windows 10 Mobile (OS Build 15254.597)
  • November 12, 2019—KB4525241 (OS Build 16299.1508)
  • October 15, 2019—KB4520006 (OS Build 16299.1481)
  • October 8, 2019—KB4522809 Update for Windows 10 Mobile (OS Build 15254.590)
  • October 8, 2019—KB4520004 (OS Build 16299.1451)
  • October 3, 2019—KB4524150 (OS Build 16299.1421)
  • September 24, 2019—KB4516071 (OS Build 16299.1420)
  • September 23, 2019—KB4522012 (OS Build 16299.1392)
  • September 10, 2019—KB4516066 (OS Build 16299.1387)
  • September 10, 2019—KB4518514 Update for Windows 10 Mobile (OS Build 15254.587)
  • August 16, 2019—KB4512494 (OS Build 16299.1365)
  • August 13, 2019—KB4512516 (OS Build 16299.1331)
  • August 13, 2019—KB4513172 Update for Windows 10 Mobile (OS Build 15254.582)
  • July 16, 2019—KB4507465 (OS Build 16299.1296 )
  • July 9, 2019—KB4507455 (OS Build 16299.1268)
  • July 9, 2019—KB4509104 Update for Windows 10 Mobile (OS Build 15254.575)
  • June 26, 2019—KB4509477 (OS Build 16299.1239)
  • June 18, 2019—KB4503281 (OS Build 16299.1237)
  • June 11, 2019—KB4503284 (OS Build 16299.1217)
  • June 11, 2019—KB4505390 Update for Windows 10 Mobile (OS Build 15254.572)
  • May 28, 2019—KB4499147 (OS Build 16299.1182)
  • May 19, 2019—KB4505062 (OS Build 16299.1150)
  • May 14, 2019—KB4500154 Update for Windows 10 Mobile (OS Build 15254.566)
  • May 14, 2019—KB4499179 (OS Build 16299.1146)
  • April 25, 2019—KB4493440 (OS Build 16299.1127)
  • April 9, 2019—KB4495357 Update for Windows 10 Mobile (OS Build 15254.562)
  • April 9, 2019—KB4493441 (OS Build 16299.1087)
  • March 19, 2019—KB4489890 (OS Build 16299.1059)
  • March 12, 2019—KB4489886 (OS Build 16299.1029)
  • March 12, 2019—KB4491736 Update for Windows 10 Mobile (OS Build 15254.556)
  • February 19, 2019—KB4487021 (OS Build 16299.1004)
  • February 12, 2019—KB4487695 Update for Windows 10 Mobile (OS Build 15254.552)
  • February 12, 2019—KB4486996 (OS Build 16299.967)
  • January 15, 2019—KB4480967 (OS Build 16299.936)
  • January 8, 2019—KB4480978 (OS Build 16299.904)
  • January 8, 2019—KB4483203 Update for Windows 10 Mobile (OS Build 15254.547)
  • December 19, 2018—KB4483232 (OS Build 16299.847)
  • December 11, 2018—KB4478936 Update for Windows 10 Mobile (OS Build 15254.544)
  • December 11, 2018—KB4471329 (OS Build 16299.846)
  • November 27, 2018—KB4467681 (OS Build 16299.820)
  • November 13, 2018—KB4469220 Update for Windows 10 Mobile (OS Build 15254.541)
  • November 13, 2018—KB4467686 (OS Build 16299.785)
  • October 18, 2018—KB4462932 (OS Build 16299.755)
  • October 9, 2018—KB4464853 Update for Windows 10 Mobile (OS Build 15254.538)
  • October 9, 2018—KB4462918 (OS Build 16299.726)
  • September 26, 2018—KB4457136 (OS Build 16299.699)
  • September 17, 2018—KB4464217 (OS Build 16299.666)
  • September 11, 2018—KB4457142 (OS Build 16299.665)
  • September 11, 2018—KB4459082 Update for Windows 10 Mobile (OS Build 15254.530)
  • August 30, 2018—KB4343893 (OS Build 16299.637)
  • August 14, 2018—KB4346644 Update for Windows 10 Mobile (OS Build 15254.527)
  • August 14, 2018—KB4343897 (OS Build 16299.611)
  • July 24, 2018—KB4338817 (OS Build 16299.579)
  • July 16, 2018—KB4345420 (OS Build 16299.551)
  • July 10, 2018—KB4338825 (OS Build 16299.547)
  • June 21, 2018—KB4284822 (OS Build 16299.522)
  • June 12, 2018—KB4316692 Update for Windows 10 Mobile (OS Build 15254.489)
  • June 12, 2018—KB4284819 (OS Build 16299.492)
  • May 21, 2018—KB4103714 (OS Build 16299.461)
  • May 8, 2018—KB4134196 Update for Windows 10 Mobile (OS Build 15254.401)
  • May 8, 2018—KB4103727 (OS Build 16299.431)
  • April 23, 2018—KB4093105 (OS Build 16299.402)
  • April 10, 2018—KB4099572 Update for Windows 10 Mobile (OS Build 15254.369)
  • April 10, 2018—KB4093112 (OS Build 16299.371)
  • March 22, 2018—KB4089848 (OS Build 16299.334)
  • March 15, 2018—KB4090912 Update for Windows 10 Mobile (OS Build 15254.313)
  • March 13, 2018—KB4088776 (OS Build 16299.309)
  • March 5, 2018—KB4090913 (OS Build 16299.251)
  • February 14, 2018—KB4077675 (OS Build 15254.248)
  • February 13, 2018—KB4074588 (OS Build 16299.248)
  • January 31, 2018—KB4058258 (OS Build 16299.214)
  • January 18, 2018—KB4073291 (OS Build 16299.201)
  • January 5, 2018—KB4073117 (OS Build 15254.158)
  • January 3, 2018—KB4056892 (OS Build 16299.192)
  • December 12, 2017—KB4054517 (OS Build 16299.125)
  • December 12, 2017—KB4056342 Update for Windows 10 Mobile (OS Build 15254.124)
  • November 30, 2017—KB4051963 (OS Build 16299.98)
  • November 14, 2017—KB4048955 (OS Build 16299.64)
  • November 14, 2017—KB4052314 (OS Build 15254.12)
  • October 17, 2017—KB4043961 (OS Build 16299.19)
  • Windows 10, version 1703 update history
  • March 9, 2021—KB5000812 (OS Build 15063.2679)
  • February 9, 2021—KB4601330 (OS Build 15063.2642)
  • January 12, 2021—KB4599208 (OS Build 15063.2614)
  • December 8, 2020—KB4592473 (OS Build 15063.2584)
  • November 10, 2020—KB4586782 (OS Build 15063.2554)
  • October 13, 2020—KB4580370 (OS Build 15063.2525)
  • September 8, 2020—KB4577021 (OS Build 15063.2500)
  • August 11, 2020—KB4571689 (OS Build 15063.2467)
  • July 14, 2020—KB4565499 (OS Build 15063.2439)
  • June 18, 2020—KB4567516 (OS Build 15063.2411)
  • June 9, 2020—KB4561605 (OS Build 15063.2409)
  • May 12, 2020—KB4556804 (OS Build 15063.2375)
  • April 14, 2020—KB4550939 (OS Build 15063.2346)
  • March 10, 2020—KB4540705 (OS Build 15063.2313)
  • February 11, 2020—KB4537765 (OS Build 15063.2284)
  • January 14, 2020—KB4534296 (OS Build 15063.2254)
  • December 10, 2019—KB4530711 (OS Build 15063.2224)
  • November 12, 2019—KB4525245 (OS Build 15063.2172)
  • October 8, 2019—KB4520010 (OS Build 15063.2108)
  • October 3, 2019—KB4524151 (OS Build 15063.2079)
  • September 24, 2019—KB4516059 (OS Build 15063.2078)
  • September 23, 2019—KB4522011 (OS Build 15063.2046)
  • September 10, 2019—KB4516068 (OS Build 15063.2045)
  • August 17, 2019—KB4512474 (OS Build 15063.2021)
  • August 13, 2019—KB4512507 (OS Build 15063.1988)
  • July 16, 2019—KB4507467 (OS Build 15063.1955)
  • July 9, 2019—KB4507450 (OS Build 15063.1928)
  • June 26, 2019—KB4509476 (OS Build 15063.1898)
  • June 18, 2019—KB4503289 (OS Build 15063.1897)
  • June 11, 2019—KB4503279 (OS Build 15063.1868)
  • May 28, 2019—KB4499162 (OS Build 15063.1839)
  • May 19, 2019—KB4505055 (OS Build 15063.1808)
  • May 14, 2019—KB4499181 (OS Build 15063.1805)
  • May 2, 2019—KB4502112 (OS Build 15063.1785)
  • April 25, 2019—KB4493436 (OS Build 15063.1784)
  • April 9, 2019—KB4493474 (OS Build 15063.1746)
  • March 19, 2019—KB4489888 (OS Build 15063.1716)
  • March 12, 2019—KB4489871 (OS Build 15063.1689)
  • February 19, 2019—KB4487011 (OS Build 15063.1659)
  • February 12, 2019—KB4487020 (OS Build 15063.1631)
  • January 15, 2019—KB4480959 (OS Build 15063.1596)
  • January 8, 2019—KB4480973 (OS Build 15063.1563)
  • December 19, 2018—KB4483230 (OS Build 15063.1508)
  • December 11, 2018—KB4471327 (OS Build 15063.1506)
  • November 27, 2018—KB4467699 (OS Build 15063.1478)
  • November 13, 2018—KB4467696 (OS Build 15063.1446)
  • October 18, 2018—KB4462939 (OS Build 15063.1418)
  • October 9, 2018—KB4462937 (OS Build 15063.1387)
  • September 20, 2018—KB4457141 (OS Build 15063.1358)
  • September 11, 2018—KB4457138 (OS Build 15063.1324)
  • August 30, 2018—KB4343889 (OS Build 15063.1292)
  • August 14, 2018—KB4343885 (OS Build 15063.1266)
  • July 24, 2018—KB4338827 (OS Build 15063.1235)
  • July 16, 2018—KB4345419 (OS Build 15063.1209)
  • July 10, 2018—KB4338826 (OS Build 15063.1206)
  • June 21, 2018—KB4284830 (OS Build 15063.1182)
  • June 12, 2018—KB4284874 (OS Build 15063.1155)
  • May 17, 2018—KB4103722 (OS Build 15063.1112)
  • May 8, 2018—KB4103731 (OS Build 15063.1088)
  • April 17, 2018—KB4093117 (OS Build 15063.1058)
  • April 10, 2018—KB4093107 (OS Build 15063.1029)
  • March 22, 2018—KB4088891 (OS Build 15063.994)
  • March 13, 2018—KB4088782 (OS Build 15063.966 and 15063.968)
  • March 8, 2018—KB4092077 (OS Build 15063.936)
  • February 22, 2018—KB4077528 (OS Build 15063.936)
  • February 13, 2018—KB4074592 (OS Build 15063.909)
  • January 17, 2018—KB4057144 (OS Build 15063.877)
  • January 3, 2018—KB4056891 (OS Build 15063.850)
  • December 12, 2017—KB4053580 (OS Build 15063.786)
  • November 22, 2017—KB4055254 (OS Build 15063.729)
  • November 14, 2017—KB4048954 (OS Build 15063.726 and 15063.728)
  • November 2, 2017—KB4049370 (OS Build 15063.675)
  • October 10, 2017—KB4041676 (OS Build 15063.674)
  • September 25, 2017—KB4040724 (OS Build 15063.632)
  • September 12, 2017—KB4038788 (OS Build 15063.608)
  • August 8, 2017—KB4034674 (OS Build 15063.540)
  • July 31, 2017—KB4032188 (OS Build 15063.502)
  • July 11, 2017—KB4025342 (OS Build 15063.483)
  • June 27, 2017—KB4022716 (OS Build 15063.447)
  • June 13, 2017—KB4022725 (OS Build 15063.413 and 15063.414)
  • May 25, 2017—KB4020102 (OS Build 15063.332)
  • May 9, 2017—KB4016871 (OS Build 15063.296 and 15063.297)
  • April 25, 2017—KB4016240 (OS Build 15063.250)
  • April 11, 2017—KB4015583 (OS Build 15063.138)
  • April 5, 2017—KB4016251 (OS Build 15063.13)
  • Windows 10, version 1607 and Windows Server 2016 update history
  • June 11, 2024—KB5039214 (OS Build 14393.7070)
  • May 14, 2024—KB5037763 (OS Build 14393.6981)
  • April 9, 2024—KB5036899 (OS Build 14393.6897)
  • March 22, 2024—KB5037423 (OS Build 14393.6799) Out-of-band
  • March 12, 2024—KB5035855 (OS Build 14393.6796)
  • February 13, 2024—KB5034767 (OS Build 14393.6709)
  • January 9, 2024—KB5034119 (OS Build 14393.6614)
  • December 12, 2023—KB5033373 (OS Build 14393.6529)
  • November 14, 2023—KB5032197 (OS Build 14393.6452)
  • October 10, 2023—KB5031362 (OS Build 14393.6351)
  • September 12, 2023—KB5030213 (OS Build 14393.6252)
  • August 8, 2023—KB5029242 (OS Build 14393.6167)
  • July 11, 2023—KB5028169 (OS Build 14393.6085)
  • June 23, 2023—KB5028623 (OS Build 14393.5996) Out-of-band
  • June 13, 2023—KB5027219 (OS Build 14393.5989)
  • May 9, 2023—KB5026363 (OS Build 14393.5921)
  • April 11, 2023—KB5025228 (OS Build 14393.5850)
  • March 14, 2023—KB5023697 (OS Build 14393.5786)
  • February 14, 2023—KB5022838 (OS Build 14393.5717)
  • January 10, 2023—KB5022289 (OS Build 14393.5648)
  • December 13, 2022—KB5021235 (OS Build 14393.5582)
  • November 17, 2022—KB5021654 (OS Build 14393.5502) Out-of-band
  • November 8, 2022—KB5019964 (OS Build 14393.5501)
  • October 18, 2022—KB5020439 (OS Build 14393.5429) Out-of-band
  • October 11, 2022—KB5018411 (OS Build 14393.5427)
  • September 13, 2022—KB5017305 (OS Build 14393.5356)
  • August 9, 2022—KB5016622 (OS Build 14393.5291)
  • July 12, 2022—KB5015808 (OS Build 14393.5246)
  • June 14, 2022—KB5014702 (OS Build 14393.5192)
  • May 19, 2022—KB5015019 (OS Build 14393.5127) Out-of-band
  • May 10, 2022—KB5013952 (OS Build 14393.5125)
  • April 12, 2022—KB5012596 (OS Build 14393.5066)
  • March 8, 2022—KB5011495 (OS Build 14393.5006) - EXPIRED
  • February 8, 2022—KB5010359 (OS Build 14393.4946) - EXPIRED
  • January 17, 2022—KB5010790 (OS Build 14393.4889) Out-of-band
  • January 11, 2022—KB5009546 (OS Build 14393.4886) - EXPIRED
  • January 5, 2022—KB5010195 (OS Build 14393.4827) Out-of-band
  • December 14, 2021—KB5008207 (OS Build 14393.4825) - EXPIRED
  • November 14, 2021—KB5008601 (OS Build 14393.4771) Out-of-band
  • November 9, 2021—KB5007192 (OS Build 14393.4770) - EXPIRED
  • October 12, 2021—KB5006669 (OS Build 14393.4704) - EXPIRED
  • September 14, 2021—KB5005573 (OS Build 14393.4651) - EXPIRED
  • August 10, 2021—KB5005043 (OS Build 14393.4583) - EXPIRED
  • July 29, 2021—KB5005393 (OS Build 14393.4532) Out-of-band
  • July 13, 2021—KB5004238 (OS Build 14393.4530) - EXPIRED
  • July 7, 2021—KB5004948 (OS Build 14393.4470) Out-of-band - EXPIRED
  • June 8, 2021—KB5003638 (OS Build 14393.4467) - EXPIRED
  • May 11, 2021—KB5003197 (OS Build 14393.4402) - EXPIRED
  • April 13, 2021—KB5001347 (OS Build 14393.4350) - EXPIRED
  • March 18, 2021—KB5001633 (OS Build 14393.4288) Out-of-band
  • March 9, 2021—KB5000803 (OS Build 14393.4283) - EXPIRED
  • February 9, 2021—KB4601318 (OS Build 14393.4225)
  • January 12, 2021—KB4598243 (OS Build 14393.4169)
  • December 8, 2020—KB4593226 (OS Build 14393.4104)
  • November 19, 2020—KB4594441 (OS Build 14393.4048) Out-of-band
  • November 10, 2020—KB4586830 (OS Build 14393.4046)
  • October 13, 2020—KB4580346 (OS Build 14393.3986)
  • September 8, 2020—KB4577015 (OS Build 14393.3930)
  • August 11, 2020—KB4571694 (OS Build 14393.3866)
  • July 14, 2020—KB4565511 (OS Build 14393.3808)
  • June 18, 2020—KB4567517 (OS Build 14393.3755)
  • June 9, 2020—KB4561616 (OS Build 14393.3750)
  • May 12, 2020—KB4556813 (OS Build 14393.3686)
  • April 21, 2020—KB4550947 (OS Build 14393.3659)
  • April 14, 2020—KB4550929 (OS Build 14393.3630)
  • March 17, 2020—KB4541329 (OS Build 14393.3595)
  • March 10, 2020—KB4540670 (OS Build 14393.3564)
  • February 25, 2020—KB4537806 (OS Build 14393.3542)
  • February 11, 2020—KB4537764 (OS Build 14393.3504)
  • January 23, 2020—KB4534307 (OS Build 14393.3474)
  • January 14, 2020—KB4534271 (OS Build 14393.3443)
  • December 10, 2019—KB4530689 (OS Build 14393.3384)
  • November 12, 2019—KB4525236 (OS Build 14393.3326)
  • October 15, 2019—KB4519979 (OS Build 14393.3300)
  • October 8, 2019—KB4519998 (OS Build 14393.3274)
  • October 3, 2019—KB4524152 (OS Build 14393.3243)
  • September 24, 2019—KB4516061 (OS Build 14393.3242)
  • September 23, 2019—KB4522010 (OS Build 14393.3206)
  • September 10, 2019—KB4516044 (OS Build 14393.3204)
  • August 17, 2019—KB4512495 (OS Build 14393.3181)
  • August 13, 2019—KB4512517 (OS Build 14393.3144)
  • July 16, 2019—KB4507459 (OS Build 14393.3115)
  • July 9, 2019—KB4507460 (OS Build 14393.3085)
  • June 27, 2019—KB4509475 (OS Build 14393.3056)
  • June 18, 2019—KB4503294 (OS Build 14393.3053)
  • June 11, 2019—KB4503267 (OS Build 14393.3025)
  • May 23, 2019—KB4499177 (OS Build 14393.2999)
  • May 19, 2019—KB4505052 (OS Build 14393.2972)
  • May 14, 2019—KB4494440 (OS Build 14393.2969)
  • April 25, 2019—KB4493473 (OS Build 14393.2941)
  • April 9, 2019—KB4493470 (OS Build 14393.2906)
  • March 19, 2019—KB4489889 (OS Build 14393.2879)
  • March 12, 2019—KB4489882 (OS Build 14393.2848)
  • February 19, 2019—KB4487006 (OS Build 14393.2828)
  • February 12, 2019—KB4487026 (OS Build 14393.2791)
  • January 17, 2019—KB4480977 (OS Build 14393.2759)
  • January 8, 2019—KB4480961 (OS Build 14393.2724)
  • December 19, 2018—KB4483229 (OS Build 14393.2670)
  • December 11, 2018—KB4471321 (OS Build 14393.2665)
  • December 3, 2018—KB4478877 (OS Build 14393.2641)
  • November 27, 2018—KB4467684 (OS Build 14393.2639)
  • November 13, 2018—KB4467691 (OS Build 14393.2608)
  • October 18, 2018—KB4462928 (OS Build 14393.2580)
  • October 9, 2018—KB4462917 (OS Build 14393.2551)
  • September 20, 2018—KB4457127 (OS Build 14393.2515)
  • September 11, 2018—KB4457131 (OS Build 14393.2485)
  • August 30, 2018—KB4343884 (OS Build 14393.2457)
  • August 14, 2018—KB4343887 (OS Build 14393.2430)
  • July 30, 2018 - KB4346877 (OS Build 14393.2396)
  • July 24, 2018—KB4338822 (OS Build 14393.2395)
  • July 16, 2018—KB4345418 (OS Build 14393.2368)
  • July 10, 2018—KB4338814 (OS Build 14393.2363)
  • June 21, 2018—KB4284833 (OS Build 14393.2339)
  • June 12, 2018—KB4284880 (OS Build 14393.2312)
  • May 17, 2018—KB4103720 (OS Build 14393.2273)
  • May 8, 2018—KB4103723 (OS Build 14393.2248)
  • April 17, 2018—KB4093120 (OS Build 14393.2214)
  • April 10, 2018—KB4093119 (OS Build 14393.2189)
  • March 29, 2018—KB4096309 (OS Build 14393.2156)
  • March 22, 2018—KB4088889 (OS Build 14393.2155)
  • March 13, 2018—KB4088787 (OS Build 14393.2125 and 14393.2126)
  • February 22, 2018—KB4077525 (OS Build 14393.2097)
  • February 13, 2018—KB4074590 (OS Build 14393.2068)
  • January 17, 2018—KB4057142 (OS Build 14393.2034)
  • January 3, 2018—KB4056890 (OS Build 14393.2007)
  • December 12, 2017—KB4053579 (OS Build 14393.1944)
  • November 27, 2017—KB4051033 (OS Build 14393.1914)
  • November 14, 2017—KB4048953 (OS Build 14393.1884)
  • November 2, 2017—KB4052231 (OS Build 14393.1797)
  • October 17, 2017—KB4041688 (OS Build 14393.1794)
  • October 10, 2017—KB4041691 (OS Build 14393.1770)
  • September 28, 2017—KB4038801 (OS Build 14393.1737)
  • September 12, 2017—KB4038782 (OS Build 14393.1715)
  • August 28, 2017—KB4039396 (OS Build 14393.1670)
  • August 16, 2017—KB4034661 (OS Build 14393.1613)
  • August 8, 2017—KB4034658 (OS Build 14393.1593)
  • August 7, 2017—KB4038220 (OS Build 14393.1537)
  • July 18, 2017—KB4025334 (OS Build 14393.1532)
  • July 11, 2017—KB4025339 (OS Build 14393.1480)
  • June 27, 2017—KB4022723 (OS Build 14393.1378)
  • June 13, 2017—KB4022715 (OS Build 14393.1358)
  • May 26, 2017—KB4023680 (OS Build 14393.1230)
  • May 9, 2017—KB4019472 (OS Build 14393.1198)
  • April 11, 2017—KB4015217 (OS Build 14393.1066 and 14393.1083)
  • March 22, 2017—KB4016635 (OS Build 14393.970)
  • March 20, 2017—KB4015438 (OS Build 14393.969)
  • March 14, 2017—KB4013429 (OS Build 14393.953)
  • January 30, 2017—KB4010672 (OS Build 14393.729)
  • January 26, 2017—KB 3216755 (OS Build 14393.726)
  • January 10, 2017—KB3213986 (OS Build 14393.693)
  • December 13, 2016 — KB3206632 (OS Build 14393.571)
  • December 9, 2016 — KB3201845 (OS Build 14393.479)
  • November 9, 2016 — KB3200970 (OS Build 14393.448)
  • November 8, 2016 — KB3200970 (OS Build 14393.447)
  • October 27, 2016 — KB3197954 (OS Build 14393.351)
  • October 11, 2016 — KB3194798 (OS Build 14393.321)
  • September 29, 2016 — KB3194496 (OS Builds 14393.222)
  • September 20, 2016 — KB3193494 (OS Builds 14393.187 and 14393.189)
  • September 13, 2016 — KB3189866 (OS Builds 14393.187 and 14393.189)
  • August 31, 2016 — KB3176938 (OS Build 14393.105)
  • August 23, 2016 — KB3176934 (OS Build 14393.82)
  • August 9, 2016 — KB3176495 (OS Build 14393.51)
  • August 2, 2016 — KB3176929 (OS Build 14393.10)
  • Windows 10, version 1511 update history
  • April 10, 2018—KB4093109 (OS Build 10586.1540)
  • March 13, 2018—KB4088779 (OS Build 10586.1478)
  • February 13, 2018—KB4074591 (OS Build 10586.1417)
  • January 18, 2018—KB4075200 (OS Build 10586.1358)
  • January 3, 2018—KB4056888 (OS Build 10586.1356)
  • December 12, 2017—KB4053578 (OS Build 10586.1295)
  • November 14, 2017—KB4048952 (OS Build 10586.1232)
  • November 2, 2017—KB4052232 (OS Build 10586.1177)
  • October 10, 2017—KB4041689 (OS Build 10586.1176)
  • September 12, 2017—KB4038783 (OS Build 10586.1106)
  • August 8, 2017—KB4034660 (OS Build 10586.1045)
  • July 11, 2017—KB4025344 (OS Build 10586.1007)
  • June 27, 2017—KB4032693 (OS Build 10586.965)
  • June 13, 2017—KB4022714 (OS Build 10586.962)
  • May 9, 2017—KB4019473 (OS Build 10586.916)
  • April 11, 2017—KB4015219 (OS Build 10586.873)
  • March 22, 2017—KB4016636 (OS Build 10586.842)
  • March 14, 2017—KB4013198 (OS Build 10586.839)
  • January 10, 2017—KB3210721 (OS Build 10586.753)
  • December 13, 2016 — KB3205386 (OS Build 10586.713)
  • November 14, 2016 — KB3198586 (OS Build 10586.682)
  • November 8, 2016 — KB3198586 (OS Build 10586.679)
  • October 11, 2016 — KB3192441 (OS Build 10586.633)
  • September 13, 2016 — KB3185614 (OS Build 10586.589)
  • August 9, 2016 — KB3176493 (OS Build 10586.545)
  • July 12, 2016 — KB3172985 (OS Build 10586.494)
  • June 14, 2016 — KB3163018 (OS Build 10586.420)
  • May 10, 2016 — KB3156421 (OS Build 10586.318)
  • April 12, 2016 — KB3147458 (OS Build 10586.218)
  • March 8, 2016 — KB3140768 (OS Build 10586.164)
  • March 1, 2016 — KB3140743 (OS Build 10586.122)
  • February 9, 2016 — KB3135173 (OS Build 10586.104)
  • Windows 10 (initial version released July 2015) update history
  • June 11, 2024-KB5039225 (OS Build 10240.20680)
  • May 14, 2024-KB5037788 (OS Build 10240.20651)
  • April 9, 2024-KB5036925 (OS Build 10240.20596)
  • March 12, 2024-KB5035858 (OS Build 10240.20526)
  • February 13, 2024-KB5034774 (OS Build 10240.20469)
  • January 9, 2024-KB5034134 (OS Build 10240.20402)
  • December 12, 2023-KB5033379 (OS Build 10240.20345)
  • November 14, 2023-KB5032199 (OS Build 10240.20308)
  • October 10, 2023-KB5031377 (OS Build 10240.20232)
  • September 12, 2023-KB5030220 (OS Build 10240.20162)
  • August 8, 2023-KB5029259 (OS Build 10240.20107)
  • July 11, 2023-KB5028186 (OS Build 10240.20048)
  • June 23, 2023-KB5028622 (OS Build 10240.19986) Out-of-band
  • June 13, 2023-KB5027230 (OS Build 10240.19983)
  • May 9, 2023-KB5026382 (OS Build 10240.19926)
  • April 11, 2023-KB5025234 (OS Build 10240.19869)
  • March 14, 2023-KB5023713 (OS Build 10240.19805)
  • February 14, 2023-KB5022858 (OS Build 10240.19747)
  • January 10, 2023-KB5022297 (OS Build 10240.19685)
  • December 13, 2022-KB5021243 (OS Build 10240.19624)
  • November 8, 2022-KB5019970 (OS Build 10240.19567)
  • October 18, 2022-KB5020440 (OS Build 10240.19509) Out-of-band
  • October 11, 2022-KB5018425 (OS Build 10240.19507)
  • September 13, 2022-KB5017327 (OS Build 10240.19444)
  • August 9, 2022-KB5016639 (OS Build 10240.19387) - EXPIRED
  • July 12, 2022-KB5015832 (OS Build 10240.19360)
  • June 14, 2022-KB5014710 (OS Build 10240.19325) - EXPIRED
  • May 10, 2022-KB5013963 (OS Build 10240.19297) - EXPIRED
  • April 12, 2022-KB5012653 (OS Build 10240.19265) - EXPIRED
  • March 8, 2022-KB5011491 (OS Build 10240.19235) - EXPIRED
  • February 8, 2022-KB5010358 (OS Build 10240.19204) - EXPIRED
  • January 17, 2022-KB5010789 (OS Build 10240.19179) Out-of-band
  • January 11, 2022-KB5009585 (OS Build 10240.19177) - EXPIRED
  • December 14, 2021-KB5008230 (OS Build 10240.19145) - EXPIRED
  • November 9, 2021-KB5007207 (OS Build 10240.19119) - EXPIRED
  • October 12, 2021-KB5006675 (OS Build 10240.19086) - EXPIRED
  • September 14, 2021-KB5005569 (OS Build 10240.19060) - EXPIRED
  • August 10, 2021-KB5005040 (OS Build 10240.19022) - EXPIRED
  • July 13, 2021-KB5004249 (OS Build 10240.19003) - EXPIRED
  • July 6, 2021—KB5004950 (OS Build 10240.18969) Out-of-band - EXPIRED
  • June 8, 2021-KB5003687 (OS Build 10240.18967) - EXPIRED
  • May 11, 2021-KB5003172 (OS Build 10240.18932) - EXPIRED
  • April 13, 2021-KB5001340 (OS Build 10240.18906)
  • March 18, 2021-KB5001631 (OS Build 10240.18875) Out-of-band
  • March 9, 2021-KB5000807 (OS Build 10240.18874)
  • February 9, 2021-KB4601331 (OS Build 10240.18842)
  • January 12, 2021-KB4598231 (OS Build 10240.18818)
  • December 8, 2020-KB4592464 (OS Build 10240.18782)
  • November 10, 2020-KB4586787 (OS Build 10240.18756)
  • October 13, 2020-KB4580327 (OS Build 10240.18725)
  • September 8, 2020-KB4577049 (OS Build 10240.18696)
  • August 11, 2020-KB4571692 (OS Build 10240.18666)
  • July 14, 2020-KB4565513 (OS Build 10240.18638)
  • June 18, 2020-KB4567518 (OS Build 10240.18609)
  • June 9, 2020-KB4561649 (OS Build 10240.18608)
  • May 12, 2020-KB4556826 (OS Build 10240.18575)
  • April 14, 2020-KB4550930 (OS Build 10240.18545)
  • March 10, 2020-KB4540693 (OS Build 10240.18519)
  • February 11, 2020-KB4537776 (OS Build 10240.18486)
  • January 14, 2020-KB4534306 (OS Build 10240.18453)
  • December 10, 2019-KB4530681 (OS Build 10240.18427)
  • November 12, 2019-KB4525232 (OS Build 10240.18395)
  • October 8, 2019-KB4520011 (OS Build 10240.18368)
  • October 3, 2019-KB4524153 (OS Build 10240.18335)
  • September 23, 2019-KB4522009 (OS Build 10240.18334)
  • September 10, 2019-KB4516070 (OS Build 10240.18333)
  • August 17, 2019-KB4517276 (OS Build 10240.18308)
  • August 13, 2019-KB4512497 (OS Build 10240.18305)
  • July 9, 2019-KB4507458 (OS Build 10240.18275)
  • June 11, 2019-KB4503291 (OS Build 10240.18244)
  • May 19, 2019-KB4505051 (OS Build 10240.18218)
  • May 14, 2019-KB4499154 (OS Build 10240.18215)
  • April 25, 2019-KB4498375 (OS Build 10240.18187)
  • April 9, 2019-KB4493475 (OS Build 10240.18186)
  • March 12, 2019-KB4489872 (OS Build 10240.18158)
  • February 21, 2019-KB4491101 (OS Build 10240.18135)
  • February 12, 2019-KB4487018 (OS Build 10240.18132)
  • January 8, 2019-KB4480962 (OS Build 10240.18094)
  • December 19, 2018-KB4483228 (OS Build 10240.18064)
  • December 11, 2018-KB4471323 (OS Build 10240.18063)
  • November 13, 2018-KB4467680 (OS Build 10240.18036)
  • October 9, 2018-KB4462922 (OS Build 10240.18005)
  • September 11, 2018-KB4457132 (OS Build 10240.17976)
  • August 14, 2018—KB4343892 (OS Build 10240.17946)
  • July 16, 2018—KB4345455 (OS Build 10240.17918)
  • July 10, 2018—KB4338829 (OS Build 10240.17914)
  • June 12, 2018—KB4284860 (OS Build 10240.17889)
  • May 8, 2018—KB4103716 (OS Build 10240.17861)
  • April 10, 2018—KB4093111 (OS Build 10240.17831)
  • March 13, 2018—KB4088786 (OS Build 10240.17797)
  • February 13, 2018—KB4074596 (OS Build 10240.17770)
  • January 31, 2018—KB4077735 (OS Build 10240.17741)
  • January 18, 2018—KB4075199 (OS Build 10240.17741)
  • January 3, 2018—KB4056893 (OS Build 10240.17738)
  • December 12, 2017—KB4053581 (OS Build 10240.17709)
  • November 14, 2017—KB4048956 (OS Build 10240.17673)
  • October 10, 2017—KB4042895 (OS Build 10240.17643)
  • September 12, 2017—KB4038781 (OS Build 10240.17609)
  • August 8, 2017—KB4034668 (OS Build 10240.17533)
  • July 11, 2017—KB4025338 (OS Build 10240.17488)
  • June 27, 2017—KB4032695 (OS Build 10240.17446)
  • June 13, 2017—KB4022727 (OS Build 10240.17443)
  • May 9, 2017—KB4019474 (OS Build 10240.17394)
  • April 11, 2017—KB4015221 (OS Build 10240.17354)
  • March 22, 2017—KB4016637 (OS Build 10240.17320)
  • March 14, 2017—KB4012606 (OS Build 10240.17319)
  • January 10, 2017—KB3210720 (OS Build 10240.17236)
  • December 13, 2016 — KB3205383 (OS Build 10240.17202)
  • November 8, 2016 — KB3198585 (OS Build 10240.17190)
  • October 11, 2016 — KB3192440 (OS Build 10240.17146)
  • September 20, 2016 — KB3193821 (OS Build 10240.17113)
  • September 13, 2016 — KB3185611 (OS Build 10240.17113)
  • August 9, 2016 — KB3176492 (OS Build 10240.17071)
  • July 12, 2016 — KB3163912 (OS Build 10240.17024)
  • June 14, 2016 — KB3163017 (OS Build 10240.16942)
  • May 10, 2016 — KB3156387 (OS Build 10240.16854)
  • April 12, 2016 — KB3147461 (OS Build 10240.16769)
  • March 8, 2016 — KB3140745 (OS Build 10240.16725)
  • February 9, 2016 — KB3135174 (OS Build 10240.16683)

defender for office 365 presentation

Release Date:

OS Build 19045.4598

For information about Windows update terminology, see the article about the  types of Windows updates  and the  monthly quality update types . For an overview of Windows 10, version 22H2, see its  update history page .    

Note  Follow  @WindowsUpdate  to find out when new content is published to the Windows release health dashboard. 

 Highlights

New!  We are advancing the Copilot experience on Windows. The Copilot app is now pinned to the taskbar and behaves like an app. This gives you the benefits of a typical app experience. For example, you can resize, move, and snap the window. For existing Windows 10 PCs, the timing of availability and delivery method will vary. This might not be available to all users because it will roll out gradually. 

Important This feature only applies to new Windows 10 PCs and new Copilot+ PCs that ship to the European Economic Area (EEA)and other markets where Copilot is available.

This update addresses an issue that affects an app’s jump list on the taskbar. Completing actions from that list might fail.   A jump list is a menu that appears when you right-click an app on the taskbar or Start menu. It gives you quick access to recently or frequently used app items.

This update addresses an issue that affects the default Japanese Input Method Editor (IME). The candidate window stops responding when you do not expect it. Then, it goes back to a former composition state at random.

This update addresses a known issue that might occur when you right-click some apps. Instead of running the task you choose from the context menu, an “Open with” dialog appears. It asks you, "How do you want to open this file?" This issue might affect any app that has tasks on a context menu. This issue also affects the icons on the taskbar and Start menu.

Improvements

Important:  Use EKB  KB5015684  to update to Windows 10, version 22H2.

This non-security update includes quality improvements. When you install this KB:

This update addresses an issue that affects MSIX applications. When you install them from an HTTPS URI, they fail to open. This issue occurs when the download of the application is not complete. This damages the package.

This update affects mobile device management (MDM). When you enroll a device, the MDM client sends more details about the device. The MDM service uses those details to identify the device model and the company that made it.

This update addresses an issue that affects Direct Composition batched presentations. A brief flash of triangles or boxes show on the screen. This issue affects browsers, like Microsoft Edge, and other apps.

This update brings Country and Operator Settings Asset (COSA) profiles up to date for certain mobile operators.

This update addresses an issue that might stop your system from resuming from hibernate. This occurs after you turn on BitLocker.

This update addresses an issue that affects Windows Defender Application Control (WDAC). The issue copies unsigned WDAC policies to the Extensible Firmware Interface (EFI) disk partition. It is reserved for signed policies.

This update addresses an issue that affects a folder context menu. When you choose the command that removes items, the command adds items instead. This occurs when a third-party service implements a sync feature.

If you installed earlier updates, only the new updates contained in this package will be downloaded and installed on your device.

Windows 10 servicing stack update (KB5039336) - 19045.4585

This update makes quality improvements to the servicing stack, which is the component that installs Windows updates. Servicing stack updates (SSU) ensure that you have a robust and reliable servicing stack so that your devices can receive and install Microsoft updates.

Known issues in this update

After you install  (dated 01/23/2024) or later updates, some Windows devices that use the to discover nodes in their network might be unable to use those nodes. Instead, these Windows devices will download updates and apps from the public internet. IT administrators also see increased download traffic on their internet routes.

Those of you who use the Home edition of Windows are not likely to experience this issue. MCC and DHCP Option 235 are typically used in enterprise environments.

Configure Microsoft Connected Cache endpoint in policy as indicated in . Additionally, has to be set to or removed as indicated in . By default, the policies have no value.

You can mitigate this issue using Group Policies available through our support channel. Organizations can request help at .

We are working on a resolution and will provide an update in an upcoming release.

After installing this update, you might be unable to .

When attempting to change a profile picture by selecting the button > > > and, under , clicking on you might receive an error message with error code 0x80070520. 

We are working on a resolution and will provide an update in an upcoming release.

How to get this update

Before you install this update

Microsoft now combines the latest servicing stack update (SSU) for your operating system with the latest cumulative update (LCU). For general information about SSUs, see Servicing stack updates  and  Servicing Stack Updates (SSU): Frequently Asked Questions .

Prerequisite:

Based on your installation scenario, choose one of the following:

For offline OS image servicing:

If your image does not have the July 25, 2023 ( KB5028244 ) or later LCU, you must install the special standalone Oct 13, 2023 SSU ( KB5031539 ) before installing this update.

For Windows Server Update Services (WSUS) deployment or when installing the standalone package from Microsoft Update Catalog: 

If your devices do not have the May 11, 2021 ( KB5003173 ) or later LCU, you must install the special standalone August 10, 2021 SSU ( KB5005260 ) before installing this update.

Install this update

To install this update, use one of the following Windows and Microsoft release channels.

Yes

Go to  >   >  . In the   area, you will find the link to download and install the update.

No

None. These changes will be included in the next security update to Windows Update for Business.

Yes

To get the standalone package for this update, go to the  website.

No

You can import this update into Windows Server Update Services (WSUS) manually. See the   for instructions.

If you want to remove the LCU

To remove the LCU after installing the combined SSU and LCU package, use the DISM/Remove-Package command line option with the LCU package name as the argument. You can find the package name by using this command: DISM /online /get-packages .

Running Windows Update Standalone Installer ( wusa.exe ) with the /uninstall switch on the combined package will not work because the combined package contains the SSU. You cannot remove the SSU from the system after installation.

File information

For a list of the files that are provided in this update, download the  file information for cumulative update 5039299 .  

For a list of the files that are provided in the servicing stack update, download the  file information for the SSU (KB5039336) - version 19045.4585 .

Facebook

Need more help?

Want more options.

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

defender for office 365 presentation

Microsoft 365 subscription benefits

defender for office 365 presentation

Microsoft 365 training

defender for office 365 presentation

Microsoft security

defender for office 365 presentation

Accessibility center

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

defender for office 365 presentation

Ask the Microsoft Community

defender for office 365 presentation

Microsoft Tech Community

defender for office 365 presentation

Windows Insiders

Microsoft 365 Insiders

Was this information helpful?

Thank you for your feedback.

defender for office 365 presentation

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Step-by-step threat protection in Microsoft Defender for Office 365

  • 10 contributors
  • Applies to: ✅ Microsoft Defender for Office 365 Plan 1 and Plan 2 , ✅ Microsoft Defender XDR

Did you know you can try the features in Microsoft Defender XDR for Office 365 Plan 2 for free? Use the 90-day Defender for Office 365 trial at the Microsoft Defender portal trials hub . Learn about who can sign up and trial terms here .

The Microsoft Defender for Office 365 protection or filtering stack can be broken out into four phases, as in this article. Generally speaking, incoming mail passes through all of these phases before delivery, but the actual path email takes is subject to an organization's Defender for Office 365 configuration.

Stay tuned till the end of this article for a unified graphic of all 4 phases of Defender for Office 365 protection!

Phase 1 - Edge Protection

Unfortunately, Edge blocks that were once critical are now relatively simple for bad actors to overcome. Over time, less traffic is blocked here, but it remains an important part of the stack.

Edge blocks are designed to be automatic. In the case of false positive, senders are notified and told how to address their issue. Connectors from trusted partners with limited reputation can ensure deliverability, or temporary overrides can be put in place, when onboarding new endpoints.

The Phase-1 filtering in Defender for Office 365

Network throttling protects Office 365 infrastructure and customers from Denial of Service (DOS) attacks by limiting the number of messages that can be submitted by a specific set of infrastructure.

IP reputation and throttling blocks messages being sent from known bad connecting IP addresses. If a specific IP sends many messages in a short period of time, they'll be throttled.

Domain reputation blocks any messages being sent from a known bad domain.

Directory-based edge filtering blocks attempts to harvest an organization's directory information through SMTP.

Backscatter detection prevents an organization from being attacked through invalid non-delivery reports (NDRs).

Enhanced filtering for connectors preserves authentication information even when traffic passes through another device before it reaches Office 365. This improves filtering stack accuracy, including heuristic clustering, anti-spoofing, and anti-phishing machine learning models, even when in complex or hybrid routing scenarios.

Phase 2 - Sender Intelligence

Features in sender intelligence are critical for catching spam, bulk, impersonation, and unauthorized spoof messages, and also factor into phish detection. Most of these features are individually configurable.

Phase 2 of filtering in Defender for Office 365 is Sender intelligence

Account compromise detection triggers and alerts are raised when an account has anomalous behavior, consistent with compromise. In some cases, the user account is blocked and prevented from sending any further email messages until the issue is resolved by an organization's security operations team.

Email Authentication involves both customer configured methods and methods set up in the Cloud, aimed at ensuring that senders are authorized, authentic mailers. These methods resist spoofing.

  • SPF can reject mails based on DNS TXT records that list IP addresses and servers allowed to send mail on the organization's behalf.
  • DKIM provides an encrypted signature that authenticates the sender.
  • DMARC lets admins mark SPF and DKIM as required in their domain and enforces alignment between the results of these two technologies.
  • ARC builds on DMARC to work with forwarding in mailing lists while recording an authentication chain.

Spoof intelligence is capable of filtering those allowed to 'spoof' (that is, those sending mail on behalf of another account, or forwarding for a mailing list) from malicious senders who imitate organizational or known external domains. It separates legitimate 'on behalf of' mail from senders who spoof to deliver spam and phishing messages.

Intra-org spoof intelligence detects and blocks spoof attempts from a domain within the organization.

Cross-domain spoof intelligence detects and blocks spoof attempts from a domain outside of the organization.

Bulk filtering lets admins configure a bulk confidence level (BCL) indicating whether the message was sent from a bulk sender. Administrators can use the Bulk Slider in the Antispam policy to decide what level of bulk mail to treat as spam.

Mailbox intelligence learns from standard user email behaviors. It leverages a user's communication graph to detect when a sender only appears to be someone the user usually communicates with, but is actually malicious. This method detects impersonation.

Mailbox intelligence impersonation enables or disables enhanced impersonation results based on each user's individual sender map. When enabled, this feature helps to identify impersonation.

User impersonation allows an admin to create a list of high value targets likely to be impersonated. If a mail arrives where the sender only appears to have the same name and address as the protected high value account, the mail is marked or tagged. (For example, trα[email protected] for [email protected] ).

Domain impersonation detects domains that are similar to the recipient's domain and that attempt to look like an internal domain. For example, this impersonation tracye@liwαre.com for [email protected] .

Phase 3 - Content Filtering

In this phase the filtering stack begins to handle the specific contents of the mail, including its hyperlinks and attachments.

The Phase-3 filtering in MDO is Content Filtering

Transport rules (also known as mail flow rules or Exchange transport rules) allow an admin to take a wide range of actions when an equally wide range of conditions are met for a message. All messages that flow through your organization are evaluated against the enabled mail flow rules / transport rules.

Microsoft Defender Antivirus and a third-party Antivirus engine are used to detect all known malware in attachments.

The anti-virus (AV) engines use true type matching to detect the file type, regardless of the filename extension (for example, exe files renamed to txt are detected as exe files). This capability allows Type blocking (also known as the common attachment filter) to correctly block file types specified by admins. For the list of supported file types, see True type matching in the common attachments filter .

Whenever Microsoft Defender for Office 365 detects a malicious attachment, the file's hash, and a hash of its active content, are added to Exchange Online Protection (EOP) reputation. Attachment reputation blocking blocks that file across all Office 365, and on endpoints, through MSAV cloud calls.

Heuristic clustering can determine that a file is suspicious based on delivery heuristics. When a suspicious attachment is found, the entire campaign pauses, and the file is sandboxed. If the file is found to be malicious, the entire campaign is blocked.

Machine learning models act on the header, body content, and URLs of a message to detect phishing attempts.

Microsoft uses a determination of reputation from URL sandboxing and URL reputation from third party feeds in URL reputation blocking , to block any message with a known malicious URL.

Content heuristics can detect suspicious messages based on structure and word frequency within the body of the message, using machine learning models.

Safe Attachments sandboxes every attachment for Defender for Office 365 customers, using dynamic analysis to detect never-before seen threats.

Linked content detonation treats every URL linking to a file in an email as an attachment, asynchronously sandboxing the file at the time of delivery.

URL Detonation happens when upstream anti-phishing technology finds a message or URL to be suspicious. URL detonation sandboxes the URLs in the message at the time of delivery.

Phase 4 - Post-Delivery Protection

The last stage takes place after mail or file delivery, acting on mail that is in various mailboxes and files and links that appear in clients like Microsoft Teams.

The Phase-4 filtering in Defender for Office 365 is Post-delivery protection

Safe Links is Defender for Office 365's time-of-click protection. Every URL in every message is wrapped to point to Microsoft Safe Links servers. When a URL is clicked it's checked against the latest reputation, before the user is redirected to the target site. The URL is asynchronously sandboxed to update its reputation.

Zero-hour auto purge (ZAP) for phishing retroactively detects and neutralizes malicious phishing messages that have already been delivered to Exchange Online mailboxes.

ZAP for malware retroactively detects and neutralizes malicious malware messages that have already been delivered to Exchange Online mailboxes.

ZAP for spam retroactively detects and neutralizes malicious spam messages that have already been delivered to Exchange Online mailboxes.

Campaign Views let administrators see the big picture of an attack, faster and more completely, than any team could without automation. Microsoft leverages the vast amounts of anti-phishing, anti-spam, and anti-malware data across the entire service to help identify campaigns, and then allows admins to investigate them from start to end, including targets, impacts, and flows, that are also available in a downloadable campaign write-up.

The Report Message add-ins enable people to easily report false positives (good email, mistakenly marked as bad ) or false negatives (bad email marked as good ) to Microsoft for further analysis.

Safe Links for Office clients offers the same Safe Links time-of-click protection, natively, inside supported Office apps like Word, PowerPoint, and Excel.

Protection for OneDrive, SharePoint, and Teams offers the same Safe Attachments protection against malicious files, natively, inside of OneDrive, SharePoint, and Microsoft Teams.

When a URL that points to a file is selected post delivery, linked content detonation displays a warning page until the sandboxing of the file is complete, and the URL is found to be safe.

The filtering stack diagram

The final diagram (as with all parts of the diagram composing it) is subject to change as the product grows and develops . Bookmark this page and use the feedback option you'll find at the bottom if you need to ask after updates. For your records, this is the stack with all the phases in order:

All the phases of filtering in Defender for Office 365 in order, from 1 to 4

Special thanks from MSFTTracyP and the docs writing team to Giulian Garruba for this content .

Was this page helpful?

Coming soon: Throughout 2024 we will be phasing out GitHub Issues as the feedback mechanism for content and replacing it with a new feedback system. For more information see: https://aka.ms/ContentUserFeedback .

Submit and view feedback for

Additional resources

IMAGES

  1. Advanced Threat Protection with Microsoft 365 Defender

    defender for office 365 presentation

  2. What is Microsoft Defender for Office 365? (A Beginner’s Guide)

    defender for office 365 presentation

  3. Microsoft Defender for Office 365: Everything You Need to Know

    defender for office 365 presentation

  4. Microsoft 365 Defender An Overview Of Microsoft S Security Services

    defender for office 365 presentation

  5. Microsoft 365 Defender

    defender for office 365 presentation

  6. Microsoft Defender para Microsoft 365 protege sus aplicaciones más

    defender for office 365 presentation

VIDEO

  1. Microsoft Defender for Office 365 (Plan 1)

  2. Microsoft Defender for Office 365 (Plan 1)

  3. Defender XDR + Sentinel + Sec Copilot, MDC + XDR, MDVM CVE

  4. Microsoft Defender for Office 365 (Plan 1)

  5. Defender for Office 365

  6. Setting up DKIM & DMARC MS 365

COMMENTS

  1. Microsoft Defender for Office 365

    Detailed reporting. Advanced cyberthreat hunting. Automated investigation and response. Cyberattack simulation training. Microsoft Defender XDR capabilities, such as cross-domain hunting and incident correlation. Use best-in-class Microsoft security products to prevent and detect cyberattacks across your Microsoft 365 workloads.

  2. Microsoft Defender for Office 365 overview

    EOP and Defender for Office 365 can be summarized with the following descriptions: EOP prevents broad, volume-based, known email attacks.; Defender for Office 365 Plan 1 protects email and collaboration features from zero-day malware, phishing, and business email compromise (BEC).; Defender for Office 365 Plan 2 adds phishing simulations, post-breach investigation, hunting, and response, and ...

  3. Introduction to Microsoft Defender for Office 365

    Module. 6 Units. Beginner. Security Operations Analyst. Security Engineer. Administrator. Microsoft 365. Microsoft Defender for Office 365. Understand Microsoft Defender for Office 365 and how you can use it to prevent, detect, investigate, and resolve attacks across all your Office 365 products, including Exchange, Teams, and OneDrive.

  4. Microsoft Defender for Office 365 documentation

    Learn about the robust security solutions in Defender for Office 365 to better protect your email and collaboration tools. Defender for Office 365 & Exchange Online Protection Overview Microsoft Defender for Office 365 overview; Exchange Online Protection overview;

  5. Microsoft 365 Defender Overview

    Learn how Microsoft 365 Defender (previously Microsoft Threat Protection) can help you secure attack vectors across users, endpoints, cloud apps, and data: h...

  6. Microsoft Defender for Office 365

    Microsoft Defender for Office 365 protects your organization against malicious threats posed by emails, links, and collaboration tools. Learn how you can use...

  7. Introduction to Defender for Office 365

    In this video I cover a high level introduction to Microsoft Defender for Office 365. This includes the feature set for both Plan 1 and Plan 2 which can be p...

  8. Deep Dive into Microsoft Defender for Office 365

    Taking a deep look at the comprehensive email security capabilities Microsoft Defender for Office 365 provides on top of Exchange Online. We'll take a look at a broad set of capabilities from protection and detection to hunting, investigation and response workflows that help your organization achieve better email security posture and incident response readiness.

  9. Microsoft Defender for Office 365

    In Q1 2023 Q1, Microsoft was once again part of an evaluation of email security platforms conducted by SE Labs. We are thrilled to announce that Microsoft Defender for Office 365 has once again received an AAA Protection Award, the highest possible that a vendor can achieve in this test.

  10. Office 365 ATP is now Microsoft Defender for Office 365

    As part of this announcement, several products have been brought together under the Defender brand. Office 365 Advanced Threat Protection is now Microsoft Defender for Office 365. While the name has changed, what has not changed is Microsoft's continued commitment to offer best-of-breed protection against attacks targeting Office 365.

  11. Microsoft Defender for Office 365 Blog

    New Threat Explorer V3 by Microsoft Defender for Office 365 with improved user experience to detect and investigate pote... 16.5K. Responding to targeted mail attacks with Microsoft 365 Defender AlexanderZagranichnov on May 11 2023 10:22 AM. Spear phishing campaign is a type of attack where phishing emails are tailored to specific organization ...

  12. Understanding Defender for Office 365 Plans

    Defender for Office 365 is designed to enhance the security of email traffic and collaboration tools including Microsoft Teams and OneDrive. It offers two distinct plans: Plan 1 and Plan 2. This ...

  13. Microsoft Defender for Office 365 service description

    In this article. Microsoft Defender for Office 365 is a cloud-based email filtering service that helps protect your organization against advanced threats to email and collaboration tools, like phishing, business email compromise, and malware attacks. Defender for Office 365 also provides investigation, hunting, and remediation capabilities to ...

  14. Powtoon

    Microsoft Defender for Office 365 seamlessly integrates with your Office 365 subscription to safeguard against threats present in emails, URLs, attachments, and collaboration tools. It offers robust investigation, hunting, and remediation capabilities, streamlining security teams' efforts to efficiently detect, prioritize, investigate, and respond to security threats.

  15. Deep Dive into Microsoft Defender for Office 365

    Taking a deep look at the comprehensive email security capabilities Microsoft Defender for Office 365 provides on top of Exchange Online. We'll take a look a...

  16. Microsoft Defender For Office 365

    Microsoft Defender for Office 365 - Free download as PDF File (.pdf), Text File (.txt) or read online for free. Microsoft Defender for Office 365 provides threat protection for email, links, and collaboration tools. It includes policies to define protection levels, reports to monitor performance, and tools to investigate and respond to threats.

  17. Microsoft Defender for Endpoint Overview.pptx

    Microsoft Defender for Endpoint is a cybersecurity solution that provides threat protection, detection, and response capabilities. It helps analysts investigate and remediate security alerts and threats more efficiently. Microsoft Defender for Endpoint can be accessed through a Microsoft 365 license like E5 or A5 at no additional cost, and ...

  18. Microsoft 365 Defender: An overview of Microsoft's security ...

    Microsoft Defender for Identity requires its own add-on license; it's also part of Enterprise Mobility + Security (EMS E5), which in itself is part of Microsoft 365 E5. Microsoft Defender for Office 365. Microsoft Defender for Office 365 builds on top of Exchange Online Protection (EOP) that all users of Exchange in the cloud are protected by.

  19. Microsoft 365 Isn't Just Office Apps: Don't Overlook These Perks

    A Microsoft 365 subscription also provides access to a wide range of premium templates for Microsoft Office applications. Whether you need to create a business report, build a resume, design a brochure, or create a budget plan, there's a template available for any document, presentation, or spreadsheet you want to make.

  20. Introducing the Microsoft Defender for Office 365 Security Operations

    Today, we're pleased to announce the release of the Microsoft Defender for Office 365 Security Operations Guide.. Security operations (SecOps) teams continuously perform tasks to provide a high-quality, reliable approach to protect, detect, and respond to email and collaboration-related security threats within an organization.

  21. Try Microsoft Defender for Office 365

    In this article. As an existing Microsoft 365 customer, the Trials and Evaluation pages in the Microsoft Defender portal at https://security.microsoft.com allow you to try the features of Microsoft Defender for Office 365 Plan 2 before you buy.. Before you try Defender for Office 365 Plan 2, there are some key questions that you need to ask yourself:

  22. Pobierz Office za darmo bez licencji. Jak to zrobić w 2024 roku?

    Subskrypcje Office 365. Najlepszą alternatywą dla Microsoft Office'a: WPS Office. Mimo że pakiet biurowy Office oferuje doskonały zestaw narzędzi do pracy z różnymi dokumentami, może być kosztowny dla wielu użytkowników. Jeśli nie możesz sobie pozwolić na subskrypcję Office 365 lub wolisz prostsze rozwiązanie, rozważ WPS Office ...

  23. Combine Microsoft 365 and Power BI

    Control the visibility of your data with Microsoft Purview Information Protection and Defender for Cloud Apps. Apply published sensitivity labels in Word, Excel, PowerPoint, and Outlook Office apps. Extend protection and governance policies to exported Power BI data. Meet privacy and regulatory requirements with visual markings for sensitive data.

  24. Copilot tutorial: Create a branded presentation from a file

    Note: This feature is available to customers with a Copilot for Microsoft 365 (work) ... See how Copilot in PowerPoint effortlessly transforms templates, files, or PDFs into sleek, branded presentations, intuitively incorporating insightful speaker notes. Try in PowerPoint. See more videos. Kickstart a presentation. Create a presentation with a ...

  25. Microsoft Defender for Office 365 Features service description

    Note. Users must be licensed for Defender for Office 365 *, must be included in Safe Links policies, and must be signed in on their devices for protection to be in place. * For organization-wide Defender for Office 365 licenses (for example, ATP_ENTERPRISE_FACULTY), you don't need to assign Defender for Office 365 licenses to individual users. For more information about Safe Links protection ...

  26. June 25, 2024—KB5039299 (OS Build 19045.4598) Preview

    This update addresses an issue that affects Direct Composition batched presentations. A brief flash of triangles or boxes show on the screen. This issue affects browsers, like Microsoft Edge, and other apps. ... This update addresses an issue that affects Windows Defender Application Control (WDAC). The issue copies unsigned WDAC policies to ...

  27. Microsoft Defender for Endpoint now supports device control for BitLocker

    With the integration of BitLocker device control, organizations can now seamlessly integrate their Defender for Endpoint policies with BitLocker's best-in-class encryption for a comprehensive method to manage access to removable storage based on the BitLocker encryption state.

  28. Step-by-step threat protection in Microsoft Defender for Office 365

    The Microsoft Defender for Office 365 protection or filtering stack can be broken out into four phases, as in this article. Generally speaking, incoming mail passes through all of these phases before delivery, but the actual path email takes is subject to an organization's Defender for Office 365 configuration.

  29. How To Get Free Access To Microsoft PowerPoint

    Search for Microsoft 365 (Office) on the Microsoft Store app. Install and open it. Sign in with your Microsoft account. Alternatively, press "Create free account" if you don't have one yet.