You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .acrolinx-config.edn
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
{:changed-files-limit60
2
2
:allowed-branchname-matches ["main""release-.*"]
3
-
:allowed-filename-matches ["ATADocs/""CloudAppSecurityDocs/""exposure-management/""defender/""defender-business/""defender-endpoint/""defender-for-cloud/""defender-for-iot/""defender-office-365/""defender-vulnerability-management/""defender-xdr/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3
+
:allowed-filename-matches ["ATADocs/""CloudAppSecurityDocs/""defender/""defender-business/""defender-endpoint/""defender-for-cloud/""defender-for-iot/""defender-office-365/""defender-vulnerability-management/""defender-xdr/""exposure-management/""unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+15-2Lines changed: 15 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: reference
15
15
ms.subservice: android
16
16
search.appverid: met150
17
-
ms.date: 08/26/2024
17
+
ms.date: 11/15/2024
18
18
---
19
19
20
20
# What's new in Microsoft Defender for Endpoint on Android
@@ -27,6 +27,19 @@ ms.date: 08/26/2024
27
27
28
28
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
29
29
30
+
**Ending support for Device Administrator enrolled devices**
31
+
32
+
Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33
+
34
+
**For devices with access to GMS**
35
+
36
+
After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways:
37
+
38
+
- Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39
+
- Intune and Defender for Endpoint technical support will no longer support these devices.
40
+
41
+
For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
42
+
30
43
**Aug-2024 (version: 1.0.6812.0101)**
31
44
32
45
- Network Protection feature is enabled by default for all users
@@ -115,7 +128,7 @@ Notify your users and helpdesk (as applicable) that users will need to accept th
115
128
116
129
2. Tap **Begin**.
117
130
118
-
3. Tap the toggle for **Allow access to manage all files.**
131
+
1. Tap the toggle for **Allow access to manage all files.**
Copy file name to clipboardExpand all lines: defender-endpoint/enable-exploit-protection.md
+56-24Lines changed: 56 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
- m365-security
15
15
- tier3
16
16
- mde-asr
17
-
ms.date: 05/03/2023
17
+
ms.date: 11/15/2024
18
18
search.appverid: met150
19
19
---
20
20
@@ -35,6 +35,31 @@ search.appverid: met150
35
35
36
36
Many features from the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection.
37
37
38
+
## Prerequisites
39
+
40
+
This section includes recommendations for you to be successful with deploying exploit protection.
41
+
42
+
- Set up monitoring for application crashes ([Event ID 1000 and/or Event ID 1001](/troubleshoot/windows-server/performance/troubleshoot-application-service-crashing-behavior)) and/or hangs (Event ID 1002)
43
+
44
+
- Enable [full user mode dump](/windows/win32/wer/collecting-user-mode-dumps) collection
45
+
46
+
- Check to see which applications are already compiled with "[Control Flow Guard](/windows/win32/secbp/control-flow-guard)" (CFG) which primarily focus on mitigating memory corruption vulnerabilities. Use dumpbin tool to see if it's compiled w/ [CFG](/windows/win32/secbp/control-flow-guard). For these applications, you could skip enabling enforcement for DEP, ASRL, SEHOP, and ACG.
47
+
48
+
- Use safe deployment practices.
49
+
50
+
> [!WARNING]
51
+
> If you do not test and do not go thru safe deployment practices, you could contribute to end-user productivity outages.
52
+
53
+
### Safe deployment practices
54
+
55
+
Safe deployment practices (SDP): Safe deployment processes and procedures define how to safely make and deploy changes to your workload. Implementing SDP requires you to think about deployments through the lens of managing risk. You can minimize the risk of end-user productivity outages in your deployments and limit the effects of problematic deployments on your users by implementing SDP.
56
+
57
+
Start out with a small set (for example, 10 to 50) of Windows devices and use that as your test environment to see which of the 21 mitigations, are incompatible with exploit protection. Remove the mitigations that aren't compatible with the application. Reiterate with the applications that you're targeting. Once you feel that the policy is ready for production.
58
+
59
+
Start out by pushing first to User Acceptance Testing (UAT) comprised of the IT administrators, Security administrators and help desk personnel. Then to 1%, 5%, 10%, 25%, 50%, 75%, and finally to 100% of your environment.
60
+
61
+
## Enabling exploit protection mitigations
62
+
38
63
You can enable each mitigation separately by using any of these methods:
39
64
40
65
-[Windows Security app](#windows-security-app)
@@ -55,23 +80,25 @@ You can also set mitigations to [audit mode](evaluate-exploit-protection.md). Au
55
80
2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection settings**.
56
81
57
82
3. Go to **Program settings** and choose the app you want to apply mitigations to.
58
-
- If the app you want to configure is already listed, select it, and then select **Edit**.
59
-
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.
60
-
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with its extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
61
-
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
62
83
63
-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
84
+
- If the app you want to configure is already listed, select it, and then select **Edit**.
85
+
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.
86
+
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with its extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
87
+
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
88
+
89
+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** applies the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
64
90
65
91
5. Repeat steps 3-4 for all the apps and mitigations you want to configure.
66
92
67
93
6. Under the **System settings** section, find the mitigation you want to configure and then specify one of the following settings. Apps that aren't configured individually in the **Program settings** section use the settings that are configured here.
68
-
-**On by default**: The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
69
-
-**Off by default**: The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
70
-
-**Use default**: The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 or Windows 11 installation; the default value (**On** or **Off**) is always specified next to the **Use default** label for each mitigation
94
+
95
+
-**On by default**: The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
96
+
-**Off by default**: The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section
97
+
-**Use default**: The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 or Windows 11 installation; the default value (**On** or **Off**) is always specified next to the **Use default** label for each mitigation
71
98
72
99
7. Repeat step 6 for all the system-level mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
73
100
74
-
If you add an app to the **Program settings** section and configure individual mitigation settings there, they'll be honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work:
101
+
If you add an app to the **Program settings** section and configure individual mitigation settings there, they are honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work:
75
102
76
103
|Enabled in **Program settings**|Enabled in **System settings**|Behavior|
77
104
|:---|:---|:---|
@@ -98,13 +125,14 @@ The result is that DEP is enabled for *test.exe*. DEP won't be enabled for any o
98
125
99
126
2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection**.
100
127
101
-
3. Go to **Program settings** and choose the app you want to apply mitigations to.<br/>
102
-
- If the app you want to configure is already listed, select it, and then select **Edit**.
103
-
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.<br/>
128
+
3. Go to **Program settings** and choose the app you want to apply mitigations to.
129
+
130
+
- If the app you want to configure is already listed, select it, and then select **Edit**.
131
+
- If the app isn't listed, at the top of the list select **Add program to customize** and then choose how you want to add the app.<br/>
104
132
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
105
133
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
106
134
107
-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit**will apply the mitigation in audit mode only. You'll be notified if you need to restart the process or app, or if you need to restart Windows.
135
+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit**applies the mitigation in audit mode only. You're notified if you need to restart the process or app, or if you need to restart Windows.
108
136
109
137
5. Repeat steps 3-4 for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
110
138
@@ -164,7 +192,7 @@ Use the [./Vendor/MSFT/Policy/Config/ExploitGuard/ExploitProtectionSettings](/wi
164
192
165
193
## Group Policy
166
194
167
-
1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)), right-click the Group Policy Object you want to configure and click**Edit**.
195
+
1. On your Group Policy management device, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)). Right-click the Group Policy Object you want to configure and select**Edit**.
168
196
169
197
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
170
198
@@ -174,15 +202,14 @@ Use the [./Vendor/MSFT/Policy/Config/ExploitGuard/ExploitProtectionSettings](/wi
174
202
175
203
## PowerShell
176
204
177
-
You can use the PowerShell verb `Get` or `Set` with the cmdlet `ProcessMitigation`. Using `Get`will list the current configuration status of any mitigations that have been enabled on the device - add the `-Name` cmdlet and app exe to see mitigations for just that app:
205
+
You can use the PowerShell verb `Get` or `Set` with the cmdlet `ProcessMitigation`. Using `Get`lists the current configuration status of any mitigations that are enabled on the device. Add the `-Name` cmdlet and app exe to see mitigations for just that app:
178
206
179
207
```PowerShell
180
208
Get-ProcessMitigation -Name processName.exe
181
209
```
182
210
183
211
> [!IMPORTANT]
184
212
> System-level mitigations that have not been configured will show a status of `NOTSET`.
185
-
>
186
213
> - For system-level settings, `NOTSET` indicates the default setting for that mitigation has been applied.
187
214
> - For app-level settings, `NOTSET` indicates the system-level setting for the mitigation will be applied.
188
215
> The default setting for each system-level mitigation can be seen in the Windows Security.
@@ -245,29 +272,34 @@ The following table lists the individual **Mitigations** (and **Audits**, when a
245
272
|Disable extension points|App-level only|`ExtensionPoint`|Audit not available|
246
273
|Disable Win32k system calls|App-level only|`DisableWin32kSystemCalls`|`AuditSystemCall`|
|Export address filtering (EAF)|App-level only|`EnableExportAddressFilterPlus`, `EnableExportAddressFilter` <ahref="#r1"id="t1">\[1\]</a>|Audit not available <ahref="#r2"id="t2">\[2\]</a>|
249
-
|Import address filtering (IAF)|App-level only|`EnableImportAddressFilter`|Audit not available <ahref="#r2"id="t2">\[2\]</a>|
250
-
|Simulate execution (SimExec)|App-level only|`EnableRopSimExec`|Audit not available <ahref="#r2"id="t2">\[2\]</a>|
251
-
|Validate API invocation (CallerCheck)|App-level only|`EnableRopCallerCheck`|Audit not available <ahref="#r2"id="t2">\[2\]</a>|
275
+
|Export address filtering (EAF)|App-level only|`EnableExportAddressFilterPlus`, `EnableExportAddressFilter` <ahref="#r1"id="t1">[1]</a>|Audit not available <ahref="#r2"id="t2">[2]</a>|
276
+
|Import address filtering (IAF)|App-level only|`EnableImportAddressFilter`|Audit not available <ahref="#r2"id="t2">[2]</a>|
277
+
|Simulate execution (SimExec)|App-level only|`EnableRopSimExec`|Audit not available <ahref="#r2"id="t2">[2]</a>|
278
+
|Validate API invocation (CallerCheck)|App-level only|`EnableRopCallerCheck`|Audit not available <ahref="#r2"id="t2">[2]</a>|
252
279
|Validate handle usage|App-level only|`StrictHandle`|Audit not available|
253
280
|Validate image dependency integrity|App-level only|`EnforceModuleDepencySigning`|Audit not available|
254
-
|Validate stack integrity (StackPivot)|App-level only|`EnableRopStackPivot`|Audit not available <ahref="#r2"id="t2">\[2\]</a>|
281
+
|Validate stack integrity (StackPivot)|App-level only|`EnableRopStackPivot`|Audit not available <ahref="#r2"id="t2">[2]</a>|
255
282
256
-
<ahref="#t1"id="r1">\[1\]</a>: Use the following format to enable EAF modules for DLLs for a process:
283
+
<ahref="#t1"id="r1">[1]</a>: Use the following format to enable EAF modules for DLLs for a process:
<ahref="#t2"id="r2">\[2\]</a>: Audit for this mitigation isn't available via PowerShell cmdlets.
289
+
<ahref="#t2"id="r2">[2]</a>: Audit for this mitigation isn't available via PowerShell cmdlets.
263
290
264
291
## Customize the notification
265
292
266
293
For information about customizing the notification when a rule is triggered and an app or file is blocked, see [Windows Security](/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center).
267
294
295
+
## Removing the exploit protection mitigations
296
+
297
+
To reset (undo or remove) the exploit protection mitigations, see the [Exploit protection reference](/defender-endpoint/exploit-protection-reference).
0 commit comments