|
| 1 | +--- |
| 2 | +title: Review and remediate endpoint detection and response recommendations (agentless) |
| 3 | +description: Identify and remediate security gaps in endpoint detection and response solutions on your virtual machine with Defender for Cloud recommendations. |
| 4 | +author: dcurwin |
| 5 | +ms.author: dacurwin |
| 6 | +ms.topic: how-to |
| 7 | +ms.date: 03/18/2024 |
| 8 | +ai-usage: ai-assisted |
| 9 | +#customer intent: As a user, I want to learn how to review and remediate endpoint detection and response recommendations in order to ensure the security of my virtual machine. |
| 10 | +--- |
| 11 | + |
| 12 | +# Review and remediate endpoint detection and response recommendations (agentless) |
| 13 | + |
| 14 | +Microsoft Defender for Cloud provides recommendations to secure and configure your endpoint detection and response solutions. By remediating these recommendations, you can ensure that your endpoint detection and response solution are compliant and secure across all environments. |
| 15 | + |
| 16 | +The endpoint detection and response recommendations allow you to: |
| 17 | + |
| 18 | +- Identify if an endpoint detection and response solution is installed on your multicloud machines |
| 19 | + |
| 20 | +- Identify gaps in the security configurations on any of the discovered endpoint detection and response solutions |
| 21 | + |
| 22 | +- Remediate detected gaps in your security configurations |
| 23 | + |
| 24 | +## Prerequisites |
| 25 | + |
| 26 | +The recommendations mentioned in this article are only available if you have the following prerequisites in place: |
| 27 | + |
| 28 | +- [Defender for Cloud](connect-azure-subscription.md) enabled on your Azure account. |
| 29 | + |
| 30 | +- You must have either of the following plans enabled on Defender for Cloud enabled on your subscription: |
| 31 | + - [Defender for Servers plan 2](tutorial-enable-servers-plan.md) |
| 32 | + - [Defender Cloud Security Posture Management (CSPM)](tutorial-enable-cspm-plan.md) |
| 33 | + |
| 34 | +- You must enable [agentless scanning for virtual machines](enable-agentless-scanning-vms.md#enabling-agentless-scanning-for-machines). |
| 35 | + |
| 36 | +> [!NOTE] |
| 37 | +> The feature described on this page is the replacement feature for the [MMA based feature](endpoint-protection-recommendations-technical.md), which is set to be retired along with the MMA retirement in August 2024. |
| 38 | +> |
| 39 | +> Learn more about the migration and the [deprecation process of the endpoint protection related recommendations](prepare-deprecation-log-analytics-mma-agent.md#endpoint-protection-recommendations-experience). |
| 40 | +
|
| 41 | +## Review and remediate endpoint detection and response discovery recommendations |
| 42 | + |
| 43 | +When Defender for Cloud discovers a supported endpoint detection and response solution on your VM, the agentless machine scanner performs the following checks to see: |
| 44 | + |
| 45 | +- If a supported endpoint detection and response solution is enabled |
| 46 | +- If Defender for Servers plan 2 is enabled on your subscription and the associated VMs |
| 47 | +- If the supported solution is installed successfully |
| 48 | + |
| 49 | +If these checks present issues, the recommendation offers different remediation steps to ensure that your VMs are protected by a supported endpoint detection and response solution and address any security gaps. |
| 50 | + |
| 51 | +### Supported solutions and platforms |
| 52 | + |
| 53 | +The following endpoint detection and response solutions are supported in Defender for Cloud: |
| 54 | + |
| 55 | +| Endpoint detection and response solution | Supported platforms | |
| 56 | +|--|--| |
| 57 | +| Microsoft Defender for Endpoint for Windows | Windows | |
| 58 | +| Microsoft Defender for Endpoint for Linux | Linux | |
| 59 | +| Microsoft Defender for Endpoint Unified Solution | Windows Server 2012 R2 and Windows 2016 | |
| 60 | +| CrowdStrike (Falcon) | Windows and Linux | |
| 61 | +| Trellix | Windows and Linux | |
| 62 | +| Symantec | Windows and Linux | |
| 63 | +| Sophos | Windows and Linux | |
| 64 | + |
| 65 | +### Identify which endpoint detection and response solution is enabled on a VM |
| 66 | + |
| 67 | +Defender for Cloud has the ability to tell you if you have a [supported endpoint detection and response solution](#supported-solutions-and-platforms) enabled on your virtual machines (VM) and which one it is. |
| 68 | + |
| 69 | +**To identify which solution is enabled on a VM**: |
| 70 | + |
| 71 | +1. Sign in to the [Azure portal](https://portal.azure.com). |
| 72 | + |
| 73 | +1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**. |
| 74 | + |
| 75 | +1. Search for and select one of the following recommendations: |
| 76 | + |
| 77 | + - `EDR solution should be installed on Virtual Machines` |
| 78 | + - `EDR solution should be installed on EC2s` |
| 79 | + - `EDR solution should be installed on Virtual Machines (GCP)` |
| 80 | + |
| 81 | +1. Select the **Healthy resources** tab. |
| 82 | + |
| 83 | +1. The discovered endpoint detection and response column displays the solution that is detected. |
| 84 | + |
| 85 | + :::image type="content" source="media/endpoint-detection-response/discovered-solutions.png" alt-text="Screenshot of the Healthy resources tab, which shows where you can see which endpoint detection and response solution is enabled on your machine." lightbox="media/endpoint-detection-response/discovered-solutions.png"::: |
| 86 | + |
| 87 | +### Review and remediate the discovery recommendations |
| 88 | + |
| 89 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 90 | + |
| 91 | +1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**. |
| 92 | + |
| 93 | +1. Search for and select one of the following recommendations: |
| 94 | + |
| 95 | + - `EDR solution should be installed on Virtual Machines` |
| 96 | + - `EDR solution should be installed on EC2s` |
| 97 | + - `EDR solution should be installed on Virtual Machines (GCP)` |
| 98 | + |
| 99 | + :::image type="content" source="media/endpoint-detection-response/identify-recommendations.png" alt-text="Screenshot of the recommendations page showing the identified endpoint solution recommendations." lightbox="media/endpoint-detection-response/identify-recommendations.png"::: |
| 100 | + |
| 101 | +1. Select the relevant recommendation. |
| 102 | + |
| 103 | +1. The recommendation offers multiple recommended actions to resolve on each attached machine, select the relevant action to see the remediation steps: |
| 104 | + |
| 105 | + - [Enable Microsoft Defender for Endpoint integration](#enable-the-microsoft-defender-for-endpoint-integration). Alternatively, you can remediate this recommendation by installing any of the [supported endpoint detection and response solution](#supported-solutions-and-platforms) on your virtual machine |
| 106 | + - [Upgrade Defender plan](#upgrade-defender-plan) |
| 107 | + - [Troubleshoot issues](#troubleshoot-unsuccessful-installation) |
| 108 | + |
| 109 | +#### Enable the Microsoft Defender for Endpoint integration |
| 110 | + |
| 111 | +This recommended action is available when: |
| 112 | + |
| 113 | +- One of the [supported endpoint detection and response solution](#supported-solutions-and-platforms) wasn't detected on the VM. |
| 114 | + |
| 115 | +- The VM can have Microsoft Defender for Endpoint installed on it as part of the offerings included with Defender for Servers. |
| 116 | + |
| 117 | +**To enable the Defender for Endpoint integration on the affected VM**: |
| 118 | + |
| 119 | +1. Select the affected machine. |
| 120 | + |
| 121 | +1. (Optional) Select multiple affected machines that have the `Enable Microsoft Defender for Endpoint integration` recommended action. |
| 122 | + |
| 123 | +1. Select **Fix**. |
| 124 | + |
| 125 | + :::image type="content" source="media/endpoint-detection-response/enable-fix.png" alt-text="Screenshot that shows where the fix button is located." lightbox="media/endpoint-detection-response/enable-fix.png"::: |
| 126 | + |
| 127 | +1. Select **Enable**. |
| 128 | + |
| 129 | + :::image type="content" source="media/endpoint-detection-response/enable-endpoint.png" alt-text="Screenshot that shows the pop-up window from which to enable the Defender for Endpoint integration on."::: |
| 130 | + |
| 131 | +Defender for endpoint is applied to all Windows and Linux servers within your subscription. After the process is completed, it can take up to 24 hours until your machine appears in the Healthy resources tab. |
| 132 | + |
| 133 | +#### Upgrade Defender plan |
| 134 | + |
| 135 | +This recommended action is available when: |
| 136 | + |
| 137 | +- One of the [supported endpoint detection and response solution](#supported-solutions-and-platforms) wasn't detected on the VM. |
| 138 | + |
| 139 | +- Defender for Servers plan 2 isn't enabled on the VM. |
| 140 | + |
| 141 | +**To enable the Defender for Endpoint integration on your Defender for Servers plan on the affected VM**: |
| 142 | + |
| 143 | +1. Select the affected machine. |
| 144 | + |
| 145 | +1. (Optional) Select multiple affected machines that have the `Upgrade Defender plan` recommended action. |
| 146 | + |
| 147 | +1. Select **Fix**. |
| 148 | + |
| 149 | + :::image type="content" source="media/endpoint-detection-response/upgrade-fix.png" alt-text="Screenshot that shows where the fix button is located on the screen." lightbox="media/endpoint-detection-response/upgrade-fix.png"::: |
| 150 | + |
| 151 | +1. Select a plan in the dropdown menu. Each plan comes with a cost, learn more about the cost on the [Defender for Cloud pricing page](https://azure.microsoft.com/pricing/details/defender-for-cloud/). |
| 152 | + |
| 153 | +1. Select **Enable**. |
| 154 | + |
| 155 | + :::image type="content" source="media/endpoint-detection-response/enable-plan.png" alt-text="Screenshot that shows the pop-up window that allows you to select which Defender for Servers plan to enable on your subscription."::: |
| 156 | + |
| 157 | +After the process is completed, it can take up to 24 hours until your machine appears in the Healthy resources tab. |
| 158 | + |
| 159 | +#### Troubleshoot unsuccessful installation |
| 160 | + |
| 161 | +This recommended action is available when: |
| 162 | + |
| 163 | +- Defender for Endpoint is detected on your machine, but the installation was unsuccessful. |
| 164 | + |
| 165 | +**To troubleshoot issues on your VM**: |
| 166 | + |
| 167 | +1. Select the affected resource. |
| 168 | + |
| 169 | +1. Select **Remediation steps**. |
| 170 | + |
| 171 | + :::image type="content" source="media/endpoint-detection-response/remediation-steps.png" alt-text="Screenshot that shows where the remediation steps are located in the recommendation." lightbox="media/endpoint-detection-response/remediation-steps.png"::: |
| 172 | + |
| 173 | +1. Follow the instructions to troubleshoot Microsoft Defender for Endpoint onboarding issues for [Windows](/microsoft-365/security/defender-endpoint/troubleshoot-onboarding?view=o365-worldwide&WT.mc_id=Portal-Microsoft_Azure_Security) or [Linux](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-linux?view=o365-worldwide&WT.mc_id=Portal-Microsoft_Azure_Security). |
| 174 | + |
| 175 | +After the process is completed, it can take up to 24 hours until your machine appears in the Healthy resources tab. |
| 176 | + |
| 177 | +## Review and remediate endpoint detection and response misconfiguration recommendations |
| 178 | + |
| 179 | +When Defender for Cloud finds misconfigurations in your endpoint detection and response solution, recommendations appear on the recommendations page. This recommendation is only applicable to VMs that have Defender for Endpoint enabled on them. These recommendations check for the following security checks: |
| 180 | + |
| 181 | +- `Both full and quick scans are out of 7 days` |
| 182 | +- `Signature out of date` |
| 183 | +- `Anti-virus is off or partially configured` |
| 184 | + |
| 185 | +**To detect misconfigurations in endpoint detection and response solution**: |
| 186 | + |
| 187 | +1. Sign in to the [Azure portal](https://portal.azure.com/). |
| 188 | + |
| 189 | +1. Navigate to **Microsoft Defender for Cloud** > **Recommendations**. |
| 190 | + |
| 191 | +1. Search for and select one of the following recommendations: |
| 192 | + |
| 193 | + - `EDR configuration issues should be resolved on virtual machines` |
| 194 | + - `EDR configuration issues should be resolved on EC2s` |
| 195 | + - `EDR configuration issues should be resolved on GCP virtual machines` |
| 196 | + |
| 197 | + :::image type="content" source="media/endpoint-detection-response/configurable-solutions.png" alt-text="Screenshot that shows the recommendations that configure your endpoint detection and solution and remediate misconfigurations." lightbox="media/endpoint-detection-response/configurable-solutions.png"::: |
| 198 | + |
| 199 | +1. Select the relevant recommendation. |
| 200 | + |
| 201 | +1. Select a security check to review the affected resources. |
| 202 | + |
| 203 | + :::image type="content" source="media/endpoint-detection-response/affected-resources.png" alt-text="Screenshot that shows a selected security check and the affected resources." lightbox="media/endpoint-detection-response/affected-resources.png"::: |
| 204 | + |
| 205 | +1. Select each security check to review all affected resources. |
| 206 | + |
| 207 | +1. Expand the affected resources section. |
| 208 | + |
| 209 | + :::image type="content" source="media/endpoint-detection-response/affected-resources-section.png" alt-text="Screenshot that shows you where you need to select on screen to expand the affected resources section."::: |
| 210 | + |
| 211 | +1. Select an unhealthy resource to review its findings. |
| 212 | + |
| 213 | + :::image type="content" source="media/endpoint-detection-response/resources-findings.png" alt-text="Screenshot that shows the findings of an affected unhealthy resource." lightbox="media/endpoint-detection-response/resources-findings.png"::: |
| 214 | + |
| 215 | +1. Select the security check to see additional information and the remediation steps. |
| 216 | + |
| 217 | + :::image type="content" source="media/endpoint-detection-response/security-check-remediation.png" alt-text="Screenshot that shows the additional details section."::: |
| 218 | + |
| 219 | +1. Follow the remediation steps. |
| 220 | + |
| 221 | +After the process is completed, it can take up to 24 hours until your machine appears in the Healthy resources tab. |
| 222 | + |
| 223 | +## Next step |
| 224 | + |
| 225 | +> [!div class="nextstepaction"] |
| 226 | +> [Learn about the differences between the MMA experience and the agentless experience](prepare-deprecation-log-analytics-mma-agent.md#endpoint-protection-recommendations-experience). |
0 commit comments