Microsoft Defender Unveils New Security Capabilities Ahead of September 2025 Patch Tuesday

With cyber threats continually evolving, Microsoft is arming security teams with a host of new features across its Defender portfolio just in time for September’s anticipated Patch Tuesday. The September 2025 wave of updates brings industry-leading enhancements for advanced threat hunting, identity and cloud security, and streamlined incident response—all designed to help organizations stay ahead of increasingly sophisticated attacks.
See also: Microsoft Defender November 2025 Updates
Expanded Advanced Hunting and Analytics
Among the most impactful updates is the new CloudStorageAggregatedEvents table, which aggregates storage-related security logs—including operations, authentication attempts, access sources, and success/failure counts—into a unified, queryable schema in Defender for Cloud. This enables analysts to conduct deeper investigations and proactive hunting on suspicious or anomalous storage activity. Organizations can now better investigate Defender for Cloud behaviors and reduce alert fatigue by surfacing more precise, context-rich incidents.
Other hunting improvements include:
-
IdentityEvents Table: Integrates identity event data from external cloud identity providers, enriching investigations with critical sign-in and risk details.
-
Custom Detection Rules: Teams can now craft dynamic alert titles, tailor impacted entity selection, and enrich alert context in side panels for better triage. Microsoft Sentinel customers can further customize alert frequency when using Sentinel-ingested data as the basis for rules.
-
Increased Query Result Limit: The Microsoft Defender portal now supports up to 100,000 rows per query, greatly enhancing scalability and search depth when handling complex datasets.
-
Comprehensive Detection Rules Management: Security admins can now view and filter all user-defined and analytics rules by every available column, including workspace ID for multi-tenant environments. In addition, they can now edit, delete, or toggle analytics rules as needed.
For more details on leveraging these capabilities, see Microsoft’s documentation for investigating behaviors with advanced hunting and custom detection rule management.
Defender Experts Service Expands Cloud and Server Protection
Both Defender Experts for XDR and Defender Experts for Hunting customers can now expand coverage to include workloads protected by Defender for Cloud, thanks to new add-ons for server and cloud workload protection. This move brings best-in-class human-led detection, investigation, and response to an even broader range of resources, including critical cloud infrastructure. Customers can learn about these offerings in the Defender Experts for XDR overview and Defender Experts for Hunting, as well as their cloud coverage FAQ.
Additionally, organizations can now incorporate third-party network signals for enrichment, allowing analysts to gain a multi-layered, holistic view of threat paths and improve detection accuracy.
Sensitivity Labels and Suggested Prompts
The Sensitivity label filter is now available in the Incidents and Alerts queues—security professionals can instantly filter incidents based on resource sensitivity, streamlining investigations in high-risk scenarios (learn more about this feature and alert investigations).
A new public preview feature offers suggested prompts for incident summaries in Security Copilot. With a click, analysts can request deeper insight and receive guided, plain-language summaries with actionable follow-ups, expediting investigations and facilitating rapid response (Security Copilot incident summary details).
Defender for Endpoint and Multi-Tenant Scalability
Endpoint security policies can now be distributed across multiple tenants from a single multi-tenant portal, now available in public preview. New support for custom installation paths on Linux and offline security intelligence updates on macOS are also live, extending Defender for Endpoint’s cross-platform flexibility (Linux custom installation, macOS offline update).

Defender for Identity: Boosting Posture and Remediation
Entra ID risk level data is now integrated across identity inventory assets, enabling SOC analysts to correlate risky user accounts and enhance detection context. New security posture assessments highlight unsecured Active Directory attributes (such as discoverable passwords), providing actionable steps to close those gaps (remove inactive service accounts, discoverable passwords).
A new public Graph-based API empowers organizations to automate remediation actions directly from Defender for Identity (API details). General availability of identity scoping and improved brute-force detection logic further strengthen identity protection (identity scoping setup).
Defender for Office 365: Dispute Capability and Mail Bombing Detection

Security operations teams can now dispute Microsoft verdicts on email and URL investigations, triggering reevaluations with full audit trails and contextual data (dispute process). The suite’s defenses now also include robust mail bombing detection, helping block DDoS-style attacks that can overwhelm users and email security systems (full release notes).
Notable Threat Intelligence and Security Education Resources
-
PipeMagic Analysis: Microsoft’s security blog published an in-depth breakdown of the “PipeMagic” backdoor, exposing modular attack techniques (PipeMagic blog).
-
ClickFix Social Engineering: Security experts are tracking the rise of the “ClickFix” phishing campaign, which manipulates users into downloading malicious payloads (ClickFix analysis).
-
Storm-0501 Ransomware: An update on Storm-0501’s evolving ransomware tactics, with a focus on cloud-based attack vectors (Storm-0501 blog).
Preparing for September 2025’s Patch Tuesday
With Patch Tuesday fast approaching, Microsoft advises all organizations to review their vulnerability management playbooks and ensure timely adoption of these Defender feature updates. The volume and complexity of vulnerabilities expected this month, combined with newly-available hunting and automation tools, put security teams in the best position to rapidly respond to threats.
New Virtual Ninja Show episodes:
For the most current Defender updates and best practices, refer to Microsoft’s monthly news blog and Defender release notes.
Discover more from Microsoft News Now
Subscribe to get the latest posts sent to your email.