You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+11-20Lines changed: 11 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 02/06/2025
9
+
ms.date: 03/04/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -29,9 +29,6 @@ search.appverid: met150
29
29
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30
30
-[Microsoft Defender for Business](/defender-business/mdb-overview)
31
31
32
-
> [!TIP]
33
-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
34
-
35
32
> [!IMPORTANT]
36
33
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
37
34
@@ -52,37 +49,33 @@ There are three ways you can create indicators for files:
52
49
Understand the following prerequisites before you create indicators for files:
53
50
54
51
-[Behavior Monitoring is enabled](behavior-monitor.md)
55
-
56
52
-[Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57
-
58
53
-[Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
59
-
60
54
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
61
55
62
56
### Windows prerequisites
63
57
64
58
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
65
-
66
-
- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
67
-
59
+
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
68
60
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.
69
-
70
61
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
71
62
72
63
> [!NOTE]
73
64
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
74
65
75
66
### macOS prerequisites
76
67
77
-
-[File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
78
-
79
-
### Linux prerequisites
68
+
- Real-time protection (RTP) needs to be active.
69
+
-[File hash computation must be enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line). Run the following command: `mdatp config enable-file-hash-computation --value enabled`
80
70
81
-
- Available in Defender for Endpoint version 101.85.27 or later.
71
+
> [!NOTE]
72
+
> On Mac, file indicators support Mach-O files (akin to `.exe` and `.dll` in Windows) scripts, such as sh/bash and AppleScript File (`.scpt`) files only.
82
73
83
-
-[File hash computation is enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
74
+
### Linux prerequisites
84
75
85
-
- Behavior monitoring is preferred, but this will work with any other scan (RTP or Custom).
76
+
- Available in Defender for Endpoint version `101.85.27` or later.
77
+
-[File hash computation must be enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
78
+
- Behavior monitoring enabled is preferred, but this feature works with any other scan (RTP or Custom).
86
79
87
80
## Create an indicator for files from the settings page
88
81
@@ -95,9 +88,7 @@ Understand the following prerequisites before you create indicators for files:
95
88
4. Specify the following details:
96
89
97
90
- Indicator: Specify the entity details and define the expiration of the indicator.
98
-
99
91
- Action: Specify the action to be taken and provide a description.
100
-
101
92
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
102
93
103
94
> [!NOTE]
@@ -156,7 +147,7 @@ Timestamp > ago(30d)
156
147
157
148
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
158
149
159
-
Below are other thread names that can be used in the sample query from above:
150
+
Here are other thread names that can be used in the sample query:
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,6 +64,18 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
64
64
65
65
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-security-recommendation.md
+19-18Lines changed: 19 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,10 @@ audience: ITPro
10
10
ms.collection:
11
11
- m365-security
12
12
- Tier1
13
-
ms.topic: conceptual
13
+
ms.topic: concept-article
14
14
search.appverid: met150
15
-
ms.date: 02/19/2025
15
+
ms.date: 03/04/2025
16
+
#customer intent: Get information on how to view and act on security recommendations in Microsoft Defender Vulnerability Management.
16
17
---
17
18
18
19
# Security recommendations
@@ -32,7 +33,7 @@ Cybersecurity weaknesses identified in your organization are mapped to actionabl
32
33
Each security recommendation includes actionable remediation steps. To help with task management, the recommendation can also be sent using Microsoft Intune and Microsoft Endpoint Configuration Manager. When the threat landscape changes, the recommendation also changes as it continuously collects information from your environment.
33
34
34
35
> [!TIP]
35
-
> To get emails about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications)
36
+
> To get email notifications about new vulnerability events, see [Configure vulnerability email notifications in Microsoft Defender for Endpoint](/defender-endpoint/configure-vulnerability-email-notifications).
36
37
37
38
## How it works
38
39
@@ -51,15 +52,15 @@ Access the Security recommendations page a few different ways:
51
52
52
53
### Navigation menu
53
54
54
-
In the [Microsoft Defender portal](https://security.microsoft.com), go to the **Vulnerability management** navigation menu and select **Recommendations**.
55
+
In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** navigation menu and select **Recommendations**.
55
56
56
57
The page contains a list of security recommendations for the threats and vulnerabilities found in your organization.
57
58
58
59
### Top security recommendations in the vulnerability management dashboard
59
60
60
-
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities, and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
61
+
As a Security Administrator, you can take a look at the [vulnerability management dashboard](tvm-dashboard-insights.md) to see your [exposure score](tvm-exposure-score.md) side by side with your [Microsoft Secure Score for Devices](tvm-microsoft-secure-score-devices.md). The goal is to **lower** your organization's exposure from vulnerabilities and **increase** your organization's device security to be more resilient against cybersecurity threat attacks. The top security recommendations list can help you achieve that goal.
61
62
62
-
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/top-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/top-security-recommendations.png":::
63
+
:::image type="content" alt-text="Screenshot of the vulnerability management dashboard with security recommendations highlighted." source="/defender/media/defender-vulnerability-management/tvm-sec-recommendations-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-recommendations.png":::
63
64
64
65
The top security recommendations list the improvement opportunities prioritized based on the important factors mentioned in the previous section - threat, likelihood to be breached, and value. Selecting a recommendation takes you to the security recommendations page with more details.
65
66
@@ -72,7 +73,7 @@ The color of the **Exposed devices** graph changes as the trend changes. If the
72
73
> [!NOTE]
73
74
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
74
75
75
-
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png" lightbox="/defender/media/defender-vulnerability-management/tvm-security-recommendations.png":::
76
+
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded.png":::
76
77
77
78
### Icons
78
79
@@ -92,9 +93,9 @@ The impact column shows the potential impact on your exposure score and Secure S
92
93
93
94
### Explore security recommendation options
94
95
95
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation that you want to investigate or process.
96
+
1.Select the securityrecommendation that you want to investigate or process from the list.
96
97
97
-
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png" lightbox="/defender/media/defender-vulnerability-management/secrec-flyouteolsw.png":::
98
+
:::image type="content" alt-text="Example of a security recommendation flyout page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-flyout.png":::
98
99
99
100
2. In the flyout, you can choose any of the following options:
100
101
@@ -111,21 +112,21 @@ The impact column shows the potential impact on your exposure score and Secure S
111
112
112
113
If there's a large jump in the number of exposed devices, or a sharp increase in the impact on your organization exposure score and Secure Score for Devices, then that security recommendation is worth investigating.
113
114
114
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select a recommendation, and then select **Open software page**
115
+
1.Select a recommendation, and then select **Open software page**.
115
116
116
-
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md)
117
+
2. Select the **Event timeline** tab to view all the impactful events related to that software, such as new vulnerabilities or new public exploits. [Learn more about event timeline](threat-and-vuln-mgt-event-timeline.md).
117
118
118
-
3. Decide how to address the increase or your organization's exposure, such as submitting a remediation request
119
+
3. Decide how to address the increase or your organization's exposure, like submitting a remediation request.
119
120
120
121
### Recommendations on devices
121
122
122
123
To see the list of security recommendations that apply to a device, follow these steps:
123
124
124
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), in the**Device inventory**page, select a device.
125
+
1.Navigate to the **Device inventory** through **Assets** >**Devices**navigation menu, then select a device.
125
126
126
127
2. Select the **Security recommendations** tab to see a list of security recommendations for the device.
127
128
128
-
:::image type="content" source="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/security-recommendation-devicepage.png":::
129
+
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-device-secreco-small.png" alt-text="Screenshot of the certificate inventory page" lightbox="/defender/media/defender-vulnerability-management/tvm-device-secreco.png":::
129
130
130
131
> [!NOTE]
131
132
> If you have the [Microsoft Defender for IoT](/azure/defender-for-iot/organizations/concept-enterprise/) integration enabled in Defender for Endpoint, recommendations for Enterprise IoT devices that appear on IoT devices tab appears on the security recommendations page. For more information, see [Enable Enterprise IoT security with Defender for Endpoint](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
@@ -136,7 +137,7 @@ The vulnerability management remediation capability bridges the gap between Secu
136
137
137
138
### How to request remediation
138
139
139
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select a security recommendation you would like to request remediation for, and then select **Remediation options**.
140
+
1.Select a security recommendation you would like to request remediation for and then select **Remediation options**.
140
141
141
142
2. Fill out the form and select **Submit request**.
142
143
@@ -154,13 +155,13 @@ When an exception is created for a recommendation, the recommendation is no long
154
155
155
156
### How to create an exception
156
157
157
-
1.In the [Microsoft Defender portal](https://security.microsoft.com), select the security recommendation you want to create an exception for, and then select **Exception options**.
158
+
1.Select the security recommendation you want to create an exception for, and then select **Exception options**.
158
159
159
-

160
+
:::image type="content" alt-text="Showing where the exception options is located in a security recommendation flyout." source="/defender/media/defender-vulnerability-management/tvm-reco-exception-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-reco-exception.png":::
160
161
161
162
2. Fill out the form and submit.
162
163
163
-
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Threat & Vulnerability Management** menu, and select the **Exceptions** tab.
164
+
3. To view your exceptions (current and past), navigate to the [Remediation](tvm-remediation.md) page under the **Endpoints** > **Vulnerability management**navigation menu and select **Remediation**, and then select the **Exceptions** tab.
164
165
165
166
For more information, see [Learn more about how to create an exception](tvm-exception.md#create-an-exception).
0 commit comments