Skip to content

Commit 05f9efd

Browse files
authored
Merge branch 'main' into group
2 parents 7437917 + 3d3d768 commit 05f9efd

15 files changed

+103
-40
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 05/02/2024
18+
ms.date: 09/07/2024
1919
search.appverid: met150
2020
---
2121

@@ -109,7 +109,6 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
109109
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
110110

111111
> [!NOTE]
112-
>
113112
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114113
>
115114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
@@ -257,7 +256,6 @@ This rule prevents an application from writing a vulnerable signed driver to dis
257256
The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
258257

259258
> [!NOTE]
260-
>
261259
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
262260
>
263261
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
@@ -322,6 +320,9 @@ Dependencies: Microsoft Defender Antivirus
322320

323321
### Block credential stealing from the Windows local security authority subsystem
324322

323+
> [!NOTE]
324+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
325+
325326
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326327

327328
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.
@@ -573,6 +574,14 @@ Configuration Manager name: Not yet available
573574

574575
GUID: `33ddedf1-c6e0-47cb-833e-de6133960387`
575576

577+
Advanced hunting action type:
578+
579+
- `AsrSafeModeRebootedAudited`
580+
581+
- `AsrSafeModeRebootBlocked`
582+
583+
- `AsrSafeModeRebootWarnBypassed`
584+
576585
Dependencies: Microsoft Defender Antivirus
577586

578587
### Block untrusted and unsigned processes that run from USB
@@ -610,6 +619,14 @@ Configuration Manager name: Not yet available
610619

611620
GUID: `c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb`
612621

622+
Advanced hunting action type:
623+
624+
- `AsrAbusedSystemToolAudited`
625+
626+
- `AsrAbusedSystemToolBlocked`
627+
628+
- `AsrAbusedSystemToolWarnBypassed`
629+
613630
Dependencies: Microsoft Defender Antivirus
614631

615632
### Block Webshell creation for Servers

defender-endpoint/defender-endpoint-false-positives-negatives.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- m365solution-fpfn
1717
- highpri
1818
- tier1
19-
ms.topic: how-to
19+
ms.topic: solution-overview
2020
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree, jcedola
2121
ms.custom:
2222
- FPFN

defender-endpoint/edr-detection.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/15/2024
18+
ms.date: 09/04/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -57,25 +57,28 @@ Run an EDR detection test to verify that the device is properly onboarded and re
5757

5858

5959
```bash
60-
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
60+
curl -o ~/Downloads/MDE-Linux-EDR-DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
6161
```
6262

63-
1. Extract the zip
63+
2. Extract the zip
6464

6565
```bash
6666
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
6767
```
6868

69-
1. And run the following command:
69+
3. And run the following command to give the script executable permission:
7070

7171
```bash
72-
./mde_linux_edr_diy.sh
72+
chmod +x ./mde_linux_edr_diy.sh
7373
```
7474

75-
After a few minutes, a detection should be raised in Microsoft Defender XDR.
76-
77-
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
75+
4. Run the following command to execute the script:
76+
```bash
77+
./mde_linux_edr_diy.sh
78+
```
7879

80+
5. After a few minutes, a detection should be raised in Microsoft Defender XDR. Look at the alert details, machine timeline, and perform your typical investigation steps.
81+
7982
### macOS
8083

8184
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.

defender-endpoint/indicator-file.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
88
ms.localizationpriority: medium
9-
ms.date: 08/26/2024
9+
ms.date: 09/03/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -63,7 +63,12 @@ Understand the following prerequisites before you create indicators for files:
6363

6464
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
6565

66-
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including `.exe` and `.dll` files. Coverage is extended over time.
66+
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web.
67+
68+
> [!NOTE]
69+
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
70+
71+
6772

6873
> [!IMPORTANT]
6974
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.

defender-endpoint/linux-support-ebpf.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 08/22/2024
18+
ms.date: 09/07/2024
1919
---
2020

2121
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -62,6 +62,10 @@ The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the
6262
| Oracle Linux RHCK | 7.9 | 3.10.0-1160 |
6363
| Oracle Linux UEK | 7.9 | 5.4 |
6464
| Amazon Linux 2 | 2 | 5.4.261-174.360|
65+
| Rocky Linux 8 | 8.7 | 4.18.0-425 |
66+
| Rocky Linux 9 | 9.2 | 5.14.0-284 |
67+
| Alma Linux 8 | 8.4 | 4.18.0-305 |
68+
| Alma Linux 9 | 9.2 | 5.14.0-284 |
6569

6670
> [!NOTE]
6771
> Oracle Linux 8.8 with kernel version 5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64 will result in kernel hang when eBPF is enabled as supplementary subsystem provider. This kernel version should not be used for eBPF mode. Refer to Troubleshooting and Diagnostics section for mitigation steps.
@@ -153,7 +157,7 @@ The following two sets of data help analyze potential issues and determine the m
153157

154158
#### Troubleshooting performance issues
155159

156-
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirusexclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
160+
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirus exclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
157161

158162
```Bash
159163
sudo mdatp diagnostic ebpf-statistics

defender-endpoint/mtd.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: onboard
77
ms.author: siosulli
88
author: siosulli
99
ms.localizationpriority: medium
10-
ms.date: 01/28/2024
10+
ms.date: 09/05/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -101,10 +101,10 @@ While evaluating mobile threat defense with Microsoft Defender for Endpoint, you
101101
This helps reduce potential issues that could arise while rolling out the service. Here are some tests and exit criteria that might help:
102102

103103
- Devices show up in the device inventory list: After successful onboarding of Defender for Endpoint on the mobile device, verify that the device is listed in the Device Inventory in the [security console](https://security.microsoft.com).
104+
<!---
105+
- Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here's an example app that can be used for this test: (We are working on new one, it will be updated soon). Note that on Android Enterprise with a work profile, only the work profile is supported. --->
104106

105-
- Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here's an example app that can be used for this test: [Test virus](https://play.google.com/store/apps/details?id=com.antivirus&hl=en_US&gl=US). Note that on Android Enterprise with a work profile, only the work profile is supported.
106-
107-
- Run a phishing test: Browse to https://smartscreentestratings2.net and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.
107+
- Run a phishing test: Browse to `https://smartscreentestratings2.net` and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.
108108

109109
- Alerts appear in dashboard: Verify that alerts for above detection tests appear on the [security console](https://security.microsoft.com).
110110

defender-endpoint/switch-to-mde-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365initiative-defender-endpoint
1515
- highpri
1616
- tier1
17-
ms.topic: overview
17+
ms.topic: solution-overview
1818
ms.custom: migrationguides
1919
ms.date: 10/24/2023
2020
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho, yongrhee

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 08/13/2024
17+
ms.date: 09/03/2024
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -51,9 +51,12 @@ This article provides instructions on how to run the tool via Live Response on W
5151

5252
:::image type="content" source="media/analyzer-file.png" alt-text="The choose file button-2" lightbox="media/analyzer-file.png":::
5353

54+
Repeat this step for the `MDEClientAnalyzerPreview.zip` file.
55+
5456
6. While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
5557

5658
```console
59+
Putfile MDEClientAnalyzerPreview.zip
5760
Run MDELiveAnalyzer.ps1
5861
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
5962
```

defender-office-365/mdo-privacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 08/22/2024
8+
ms.date: 09/03/2024
99
audience: ITPro
1010
ms.topic: conceptual
1111
ms.service: defender-office-365
@@ -42,7 +42,7 @@ All [reports in Defender for Office 365](reports-defender-for-office-365.md) are
4242
- All related data is securely stored in the organization's region.
4343
- Only authorized users in the organization can access the data.
4444

45-
Microsoft stores this data securely in Microsoft Entra and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/p/?linkid=827578). All service log data at rest is encrypted and hashed using ODL and CDP encryption (no clear text). Defender for Office 365 uses this data for the following features:
45+
Microsoft stores this data securely in Microsoft Entra and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/p/?linkid=827578). All service log data at rest is encrypted and hashed using Office Data Loader (ODL) and Common Data Platform (CDP) encryption (no clear text). Defender for Office 365 uses this data for the following features:
4646

4747
- Threat protection policies to set the appropriate level of protection for your organization.
4848
- Real-time reports to monitor Defender for Office 365 performance in your organization.

defender-xdr/configure-asset-rules.md

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 07/11/2023
15+
ms.date: 09/04/2024
1616
---
1717

1818
# Asset rule management - Dynamic rules for devices
@@ -37,24 +37,31 @@ Dynamic rules can help manage device context by assigning tags and device values
3737

3838
A rule can be based on device name, domain, OS platform, internet facing status, onboarding status and manual device tags. You can select or create a tag that will be applied based on the conditions you've set.
3939

40+
> [!IMPORTANT]
41+
> Use of [dynamic device tagging](/defender-xdr/configure-asset-rules) capabilities in Defender for Endpoint to tag devices with `MDE-Management` isn't currently supported with security settings management. Devices tagged through this capability don't successfully enroll. This is currently under investigation.
42+
4043
The following steps guide you on how to create a new dynamic rule in Microsoft Defender XDR:
4144

4245
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com) as a user who can view and perform actions on all devices.
46+
4347
2. In the navigation pane, select **Settings** \> **Microsoft Defender XDR** \> **Asset Rule Management**.
48+
4449
3. Select **Create a new rule**.
50+
4551
4. Enter a **Rule name** and **Description***.
52+
4653
5. Select **Next** to choose the conditions you want to assign:
4754

48-
:::image type="content" source="/defender/media/defender/rule-conditions.png" alt-text="Screenshot of the Rule conditions page" lightbox="/defender/media/defender/rule-conditions.png":::
55+
:::image type="content" source="/defender/media/defender/rule-conditions.png" alt-text="Screenshot of the Rule conditions page" lightbox="/defender/media/defender/rule-conditions.png":::
4956

5057
6. Select **Next** and choose the tag to apply to this rule.
5158

52-
:::image type="content" source="/defender/media/defender/actions-to-apply.png" alt-text="Screenshot of the actions page" lightbox="/defender/media/defender/actions-to-apply.png":::
59+
:::image type="content" source="/defender/media/defender/actions-to-apply.png" alt-text="Screenshot of the actions page" lightbox="/defender/media/defender/actions-to-apply.png":::
5360

5461
7. Select **Next** to review and finish creating the rule and then select **Submit**.
5562

56-
>[!Note]
57-
> It may take up to 1 hour for changes to be reflected in the portal.
63+
>[!NOTE]
64+
> It may take up to 1 hour for changes to be reflected in the portal.
5865
5966
### Dynamic tags in the Device Inventory
6067

@@ -63,13 +70,15 @@ You can see the dynamic tags assigned in the Device Inventory view.
6370
To see tags on individual devices:
6471

6572
1. Select **Devices** from the **Assets** navigation menu in the [Microsoft Defender portal](https://security.microsoft.com).
73+
6674
2. In the **Device Inventory** page, select the device name that you want to view.
75+
6776
3. Select **Manage tags**.
6877

69-
:::image type="content" source="/defender/media/defender/manage-machine-tags.png" alt-text="Screenshot of the machine tags page" lightbox="/defender/media/defender/manage-machine-tags.png":::
78+
:::image type="content" source="/defender/media/defender/manage-machine-tags.png" alt-text="Screenshot of the machine tags page" lightbox="/defender/media/defender/manage-machine-tags.png":::
7079

7180
### Updating rules
7281

73-
Dynamic tags and device values set by dynamic rules can't be manually updated. To edit, delete or turn off a rule, in the **Asset Rule Management** page select the rule and choose the action you wish to take:
82+
Dynamic tags and device values set by dynamic rules can't be manually updated. To edit, delete or turn off a rule, in the **Asset Rule Management** page select the rule and choose an action.
7483

7584
:::image type="content" source="/defender/media/defender/update-rule.png" alt-text="Screenshot of the rule details page" lightbox="/defender/media/defender/update-rule.png":::

0 commit comments

Comments
 (0)