Skip to content

Commit 067e9ec

Browse files
authored
Merge pull request #1292 from MicrosoftDocs/main
Publish main to live 09/06/2024, 3:30 PM
2 parents 6262ee8 + 63b6799 commit 067e9ec

8 files changed

+52
-11
lines changed

defender-endpoint/edr-block-mode-faqs.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,14 +38,12 @@ sections:
3838
- question: |
3939
Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
4040
answer: |
41-
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) in block mode.
42-
43-
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. There is a scenario where EDR in block mode enablement might be beneficial, even when the primary antivirus solution is Microsoft Defender Antivirus. If Microsoft Defender Antivirus is misconfigured, such as if PUA protection is not enabled, EDR in block mode can automatically remediate PUA.
41+
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. However, there are scenarios where EDR in block mode might be beneficial, such as if Microsoft Defender Antivirus is misconfigured, or if [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) is not enabled. In such cases, EDR in block mode can automatically remediate detections like PUA.
4442
4543
- question: |
4644
Will EDR in block mode affect a user's antivirus protection?
4745
answer: |
48-
EDR in block mode does not affect third-party antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
46+
EDR in block mode does not affect non-Microsoft antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
4947
5048
- question: |
5149
Why do I need to keep Microsoft Defender Antivirus up to date?

defender-xdr/advanced-hunting-deviceevents-table.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceEvents
@@ -92,6 +92,16 @@ For information on other tables in the advanced hunting schema, [see the advance
9292
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9393
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9494
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
95+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
96+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
97+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
98+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
99+
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
100+
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
101+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process’s RDP session was initiated |
102+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process’s RDP session was initiated |
103+
104+
95105

96106
## Related topics
97107
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-devicefileevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceFileEvents
@@ -89,6 +89,11 @@ For information on other tables in the advanced hunting schema, [see the advance
8989
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9090
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9191
| `AdditionalFields` | `string` | Additional information about the entity or event |
92+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
93+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
94+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
95+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
96+
9297

9398
> [!NOTE]
9499
> File hash information will always be shown when it is available. However, there are several possible reasons why a SHA1, SHA256, or MD5 cannot be calculated. For instance, the file might be located in remote storage, locked by another process, compressed, or marked as virtual. In these scenarios, the file hash information appears empty.

defender-xdr/advanced-hunting-deviceimageloadevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceImageLoadEvents
@@ -73,6 +73,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7373
| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
7474
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7575
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
76+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
77+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
78+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
79+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
80+
7681

7782
## Related topics
7883
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-devicelogonevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 01/16/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceLogonEvents
@@ -82,6 +82,11 @@ For information on other tables in the advanced hunting schema, [see the advance
8282
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
8383
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8484
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
85+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
86+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
87+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
88+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
89+
8590

8691
> [!NOTE]
8792
> The collection of DeviceLogonEvents is not supported on Windows 7 or Windows Server 2008R2 devices onboarded to Defender for Endpoint. We recommend upgrading to a more recent operating system for optimal visibility into user logon activity.

defender-xdr/advanced-hunting-devicenetworkevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceNetworkEvents
@@ -78,6 +78,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7878
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7979
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8080
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
81+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
82+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
83+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
84+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
85+
8186

8287
## Related topics
8388
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-deviceprocessevents-table.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceProcessEvents
@@ -96,6 +96,14 @@ For information on other tables in the advanced hunting schema, [see the advance
9696
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9797
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9898
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
99+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
100+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
101+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
102+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
103+
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
104+
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
105+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process’s RDP session was initiated |
106+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process’s RDP session was initiated |
99107

100108

101109
## Related topics

defender-xdr/advanced-hunting-deviceregistryevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceRegistryEvents
@@ -74,6 +74,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7474
| `InitiatingProcessTokenElevation` | `string` | Token type indicating the presence or absence of User Access Control (UAC) privilege elevation applied to the process that initiated the event |
7575
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7676
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
77+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
78+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
79+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
80+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
81+
7782

7883
## Related topics
7984
- [Advanced hunting overview](advanced-hunting-overview.md)

0 commit comments

Comments
 (0)