Skip to content

Commit 00c03fa

Browse files
Merge pull request #3810 from grbray/docs-editor/indicator-file-1747420999
Update File Hash Computation pre-req line and add cmd line to enable -- in tech review
2 parents 68087fd + 195e00c commit 00c03fa

File tree

1 file changed

+8
-7
lines changed

1 file changed

+8
-7
lines changed

defender-endpoint/indicator-file.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 03/04/2025
9+
ms.date: 05/16/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -58,7 +58,7 @@ Understand the following prerequisites before you create indicators for files:
5858
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
5959
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
6060
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, Windows Server 2022, and Windows Server 2025.
61-
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
61+
- File hash computation is enabled by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\Enable File Hash Computation` to **Enabled**. Or, you can run the following PowerShell command: `Set-MpPreference -EnableFileHashComputation $true`
6262

6363
> [!NOTE]
6464
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
@@ -91,9 +91,6 @@ Understand the following prerequisites before you create indicators for files:
9191
- Action: Specify the action to be taken and provide a description.
9292
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
9393

94-
> [!NOTE]
95-
> Device Group creation is supported in both Defender for Endpoint Plan 1 and Plan 2
96-
9794
5. Review the details in the Summary tab, then select **Save**.
9895

9996
## Create a contextual indicator from the file details page
@@ -124,7 +121,7 @@ The current supported actions for file IOC are allow, audit and block, and remed
124121
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
125122

126123
> [!IMPORTANT]
127-
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
124+
> - Typically, file blocks are enforced and removed within 15 minutes, average 30 minutes but can take upwards of 2 hours.
128125
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash
129126
IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
130127
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
@@ -147,7 +144,7 @@ Timestamp > ago(30d)
147144

148145
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
149146

150-
Here are other thread names that can be used in the sample query:
147+
Here are other threat names that can be used in the sample query:
151148

152149
Files:
153150

@@ -201,9 +198,13 @@ Microsoft Defender Vulnerability Management's block vulnerable application featu
201198
## See also
202199

203200
- [Create indicators](indicators-overview.md)
201+
204202
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
203+
205204
- [Create indicators based on certificates](indicator-certificates.md)
205+
206206
- [Manage indicators](indicator-manage.md)
207+
207208
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
208209

209210
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)