You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+20-3Lines changed: 20 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 05/02/2024
18
+
ms.date: 09/07/2024
19
19
search.appverid: met150
20
20
---
21
21
@@ -109,7 +109,6 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
109
109
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
110
110
111
111
> [!NOTE]
112
-
>
113
112
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114
113
>
115
114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
@@ -257,7 +256,6 @@ This rule prevents an application from writing a vulnerable signed driver to dis
257
256
The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
258
257
259
258
> [!NOTE]
260
-
>
261
259
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
262
260
>
263
261
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
@@ -322,6 +320,9 @@ Dependencies: Microsoft Defender Antivirus
322
320
323
321
### Block credential stealing from the Windows local security authority subsystem
324
322
323
+
> [!NOTE]
324
+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
325
+
325
326
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326
327
327
328
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.
@@ -573,6 +574,14 @@ Configuration Manager name: Not yet available
573
574
574
575
GUID: `33ddedf1-c6e0-47cb-833e-de6133960387`
575
576
577
+
Advanced hunting action type:
578
+
579
+
-`AsrSafeModeRebootedAudited`
580
+
581
+
-`AsrSafeModeRebootBlocked`
582
+
583
+
-`AsrSafeModeRebootWarnBypassed`
584
+
576
585
Dependencies: Microsoft Defender Antivirus
577
586
578
587
### Block untrusted and unsigned processes that run from USB
@@ -610,6 +619,14 @@ Configuration Manager name: Not yet available
3. And run the following command to give the script executable permission:
70
70
71
71
```bash
72
-
./mde_linux_edr_diy.sh
72
+
chmod +x ./mde_linux_edr_diy.sh
73
73
```
74
74
75
-
After a few minutes, a detection should be raised in Microsoft Defender XDR.
76
-
77
-
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
75
+
4. Run the following command to execute the script:
76
+
```bash
77
+
./mde_linux_edr_diy.sh
78
+
```
78
79
80
+
5. After a few minutes, a detection should be raised in Microsoft Defender XDR. Look at the alert details, machine timeline, and perform your typical investigation steps.
81
+
79
82
### macOS
80
83
81
84
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: siosulli
7
7
author: siosulli
8
8
ms.localizationpriority: medium
9
-
ms.date: 08/26/2024
9
+
ms.date: 09/03/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -63,7 +63,12 @@ Understand the following prerequisites before you create indicators for files:
63
63
64
64
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
65
65
66
-
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including `.exe` and `.dll` files. Coverage is extended over time.
66
+
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web.
67
+
68
+
> [!NOTE]
69
+
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
70
+
71
+
67
72
68
73
> [!IMPORTANT]
69
74
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-ebpf.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 08/22/2024
18
+
ms.date: 09/07/2024
19
19
---
20
20
21
21
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -62,6 +62,10 @@ The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the
62
62
| Oracle Linux RHCK | 7.9 | 3.10.0-1160 |
63
63
| Oracle Linux UEK | 7.9 | 5.4 |
64
64
| Amazon Linux 2 | 2 | 5.4.261-174.360|
65
+
| Rocky Linux 8 | 8.7 | 4.18.0-425 |
66
+
| Rocky Linux 9 | 9.2 | 5.14.0-284 |
67
+
| Alma Linux 8 | 8.4 | 4.18.0-305 |
68
+
| Alma Linux 9 | 9.2 | 5.14.0-284 |
65
69
66
70
> [!NOTE]
67
71
> Oracle Linux 8.8 with kernel version 5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64 will result in kernel hang when eBPF is enabled as supplementary subsystem provider. This kernel version should not be used for eBPF mode. Refer to Troubleshooting and Diagnostics section for mitigation steps.
@@ -153,7 +157,7 @@ The following two sets of data help analyze potential issues and determine the m
153
157
154
158
#### Troubleshooting performance issues
155
159
156
-
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirusexclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
160
+
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirus exclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
Copy file name to clipboardExpand all lines: defender-endpoint/mtd.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.subservice: onboard
7
7
ms.author: siosulli
8
8
author: siosulli
9
9
ms.localizationpriority: medium
10
-
ms.date: 01/28/2024
10
+
ms.date: 09/05/2024
11
11
manager: deniseb
12
12
audience: ITPro
13
13
ms.collection:
@@ -101,10 +101,10 @@ While evaluating mobile threat defense with Microsoft Defender for Endpoint, you
101
101
This helps reduce potential issues that could arise while rolling out the service. Here are some tests and exit criteria that might help:
102
102
103
103
- Devices show up in the device inventory list: After successful onboarding of Defender for Endpoint on the mobile device, verify that the device is listed in the Device Inventory in the [security console](https://security.microsoft.com).
104
+
<!---
105
+
- Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here's an example app that can be used for this test: (We are working on new one, it will be updated soon). Note that on Android Enterprise with a work profile, only the work profile is supported. --->
104
106
105
-
- Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here's an example app that can be used for this test: [Test virus](https://play.google.com/store/apps/details?id=com.antivirus&hl=en_US&gl=US). Note that on Android Enterprise with a work profile, only the work profile is supported.
106
-
107
-
- Run a phishing test: Browse to https://smartscreentestratings2.net and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.
107
+
- Run a phishing test: Browse to `https://smartscreentestratings2.net` and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.
108
108
109
109
- Alerts appear in dashboard: Verify that alerts for above detection tests appear on the [security console](https://security.microsoft.com).
Copy file name to clipboardExpand all lines: defender-office-365/mdo-privacy.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ f1.keywords:
5
5
ms.author: chrisda
6
6
author: chrisda
7
7
manager: deniseb
8
-
ms.date: 08/22/2024
8
+
ms.date: 09/03/2024
9
9
audience: ITPro
10
10
ms.topic: conceptual
11
11
ms.service: defender-office-365
@@ -42,7 +42,7 @@ All [reports in Defender for Office 365](reports-defender-for-office-365.md) are
42
42
- All related data is securely stored in the organization's region.
43
43
- Only authorized users in the organization can access the data.
44
44
45
-
Microsoft stores this data securely in Microsoft Entra and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/p/?linkid=827578). All service log data at rest is encrypted and hashed using ODL and CDP encryption (no clear text). Defender for Office 365 uses this data for the following features:
45
+
Microsoft stores this data securely in Microsoft Entra and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/p/?linkid=827578). All service log data at rest is encrypted and hashed using Office Data Loader (ODL) and Common Data Platform (CDP) encryption (no clear text). Defender for Office 365 uses this data for the following features:
46
46
47
47
- Threat protection policies to set the appropriate level of protection for your organization.
48
48
- Real-time reports to monitor Defender for Office 365 performance in your organization.
Copy file name to clipboardExpand all lines: defender-xdr/configure-asset-rules.md
+16-7Lines changed: 16 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 07/11/2023
15
+
ms.date: 09/04/2024
16
16
---
17
17
18
18
# Asset rule management - Dynamic rules for devices
@@ -37,24 +37,31 @@ Dynamic rules can help manage device context by assigning tags and device values
37
37
38
38
A rule can be based on device name, domain, OS platform, internet facing status, onboarding status and manual device tags. You can select or create a tag that will be applied based on the conditions you've set.
39
39
40
+
> [!IMPORTANT]
41
+
> Use of [dynamic device tagging](/defender-xdr/configure-asset-rules) capabilities in Defender for Endpoint to tag devices with `MDE-Management` isn't currently supported with security settings management. Devices tagged through this capability don't successfully enroll. This is currently under investigation.
42
+
40
43
The following steps guide you on how to create a new dynamic rule in Microsoft Defender XDR:
41
44
42
45
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as a user who can view and perform actions on all devices.
46
+
43
47
2. In the navigation pane, select **Settings**\>**Microsoft Defender XDR**\>**Asset Rule Management**.
48
+
44
49
3. Select **Create a new rule**.
50
+
45
51
4. Enter a **Rule name** and **Description***.
52
+
46
53
5. Select **Next** to choose the conditions you want to assign:
47
54
48
-
:::image type="content" source="/defender/media/defender/rule-conditions.png" alt-text="Screenshot of the Rule conditions page" lightbox="/defender/media/defender/rule-conditions.png":::
55
+
:::image type="content" source="/defender/media/defender/rule-conditions.png" alt-text="Screenshot of the Rule conditions page" lightbox="/defender/media/defender/rule-conditions.png":::
49
56
50
57
6. Select **Next** and choose the tag to apply to this rule.
51
58
52
-
:::image type="content" source="/defender/media/defender/actions-to-apply.png" alt-text="Screenshot of the actions page" lightbox="/defender/media/defender/actions-to-apply.png":::
59
+
:::image type="content" source="/defender/media/defender/actions-to-apply.png" alt-text="Screenshot of the actions page" lightbox="/defender/media/defender/actions-to-apply.png":::
53
60
54
61
7. Select **Next** to review and finish creating the rule and then select **Submit**.
55
62
56
-
>[!Note]
57
-
> It may take up to 1 hour for changes to be reflected in the portal.
63
+
>[!NOTE]
64
+
> It may take up to 1 hour for changes to be reflected in the portal.
58
65
59
66
### Dynamic tags in the Device Inventory
60
67
@@ -63,13 +70,15 @@ You can see the dynamic tags assigned in the Device Inventory view.
63
70
To see tags on individual devices:
64
71
65
72
1. Select **Devices** from the **Assets** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com).
73
+
66
74
2. In the **Device Inventory** page, select the device name that you want to view.
75
+
67
76
3. Select **Manage tags**.
68
77
69
-
:::image type="content" source="/defender/media/defender/manage-machine-tags.png" alt-text="Screenshot of the machine tags page" lightbox="/defender/media/defender/manage-machine-tags.png":::
78
+
:::image type="content" source="/defender/media/defender/manage-machine-tags.png" alt-text="Screenshot of the machine tags page" lightbox="/defender/media/defender/manage-machine-tags.png":::
70
79
71
80
### Updating rules
72
81
73
-
Dynamic tags and device values set by dynamic rules can't be manually updated. To edit, delete or turn off a rule, in the **Asset Rule Management** page select the rule and choose the action you wish to take:
82
+
Dynamic tags and device values set by dynamic rules can't be manually updated. To edit, delete or turn off a rule, in the **Asset Rule Management** page select the rule and choose an action.
74
83
75
84
:::image type="content" source="/defender/media/defender/update-rule.png" alt-text="Screenshot of the rule details page" lightbox="/defender/media/defender/update-rule.png":::
0 commit comments