Skip to content

Commit 09371bc

Browse files
Merge pull request #1845 from MicrosoftDocs/main
Publish main to live, 11/11, 11:00 AM IST
2 parents aa93ba2 + 1584ff8 commit 09371bc

5 files changed

+30
-13
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/05/2024
18+
ms.date: 11/10/2024
1919
search.appverid: met150
2020
---
2121

@@ -348,6 +348,14 @@ Advanced hunting action type:
348348

349349
Dependencies: Microsoft Defender Antivirus
350350

351+
Known issues: These applications and "Block credential stealing from the Windows local security authority subsystem" rule, are incompatible:
352+
353+
|Application name|For information|
354+
| -------- | -------- |
355+
|Quest Dirsync Password Sync|[Dirsync Password Sync isn’t working when Windows Defender is installed, error: "VirtualAllocEx failed: 5" (4253914)](https://support.quest.com/kb/4253914/dirsync-password-sync-isn-t-working-when-windows-defender-is-installed-error-virtualallocex-failed-5)|
356+
357+
For technical support, contact the software vendor.
358+
351359
### Block executable content from email client and webmail
352360

353361
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
@@ -482,6 +490,15 @@ Advanced hunting action type:
482490

483491
Dependencies: Microsoft Defender Antivirus
484492

493+
Known issues: These applications and "Block Office applications from injecting code into other processes" rule, are incompatible:
494+
495+
|Application name|For information|
496+
| -------- | -------- |
497+
|Avecto (BeyondTrust) Privilege Guard|[September-2024 (Platform: 4.18.24090.11 | Engine 1.1.24090.11)](/defender-endpoint/microsoft-defender-antivirus-updates). |
498+
|Heimdal security|n/a|
499+
500+
For technical support, contact the software vendor.
501+
485502
### Block Office communication application from creating child processes
486503

487504
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.

defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.reviewer: yongrhee
1010
manager: deniseb
1111
ms.subservice: ngp
1212
ms.topic: conceptual
13-
ms.date: 07/25/2024
13+
ms.date: 11/10/2024
1414
ms.collection:
1515
- m365-security
1616
- tier2
@@ -64,7 +64,7 @@ You can specify the cloud block timeout period with an [endpoint security policy
6464

6565
3. Select (or create) an antivirus policy.
6666

67-
4. In the **Configuration settings** section, expand **Cloud protection**. Then, in the **Microsoft Defender Antivirus Extended Timeout In Seconds** box, specify the more time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
67+
4. In the **Configuration settings** section, scroll down to **Cloud Extended Timeout** and specify the timeout, in seconds, from 0 to 50 seconds. Whatever you specify is added to the default 10 seconds.
6868

6969
5. (This step is optional) Make any other changes to your antivirus policy. (Need help? See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)
7070

defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
ms.topic: how-to
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 04/03/2024
9+
ms.date: 11/10/2024
1010
ms.reviewer: pahuijbr
1111
manager: deniseb
1212
ms.custom: nextgen
@@ -81,7 +81,7 @@ For more information about the specific network-connectivity requirements to ens
8181

8282
| Task | Steps |
8383
|---------|---------|
84-
| Create a new policy | 1. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**. Then choose **Next**. <br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
84+
| Create a new policy | 1. For **Platform**, select **Windows**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
8585
| Edit an existing policy | 1. Select the policy that you want to edit.<br/><br/>2. Under **Configuration settings**, choose **Edit**.<br/><br/>3. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>4. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>5. Select **Review + save**. |
8686

8787
> [!TIP]

defender-endpoint/network-protection-macos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent macOS connections to bad sites
33
description: Protect your network by preventing macOS users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 09/27/2024
6+
ms.date: 11/10/2024
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -38,7 +38,7 @@ search.appverid: met150
3838
- Microsoft Edge for macOS browser
3939

4040
> [!NOTE]
41-
> Microsoft Edge for macOS does not currently support web content filtering, custom indicators, or other enterprise features. However, network protection provides this protection to Microsoft Edge for macOS if network protection is enabled.
41+
> SmartScreen in Microsoft Edge for macOS does not currently support web content filtering, custom indicators, or other enterprise features. However, network protection provides this protection to Microsoft Edge for macOS if network protection is enabled.
4242
4343
## Overview
4444

defender-endpoint/specify-cloud-protection-level-microsoft-defender-antivirus.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
ms.topic: how-to
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 07/25/2024
9+
ms.date: 11/10/2024
1010
manager: deniseb
1111
ms.custom: nextgen
1212
ms.subservice: ngp
@@ -38,16 +38,16 @@ Cloud protection works together with Microsoft Defender Antivirus to deliver pro
3838

3939
3. Select an antivirus profile. If you don't have one yet, or if you want to create a new profile, see [Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure).
4040

41-
4. Select **Properties**. Then, next to **Configuration settings**, choose **Edit**.
41+
4. Next to **Configuration settings**, choose **Edit**.
4242

43-
5. Expand **Cloud protection**, and then in the **Cloud-delivered protection level** list, select one of the following:
43+
5. Scroll down to **Cloud Block Level**, and select one of the following:
4444

4545
- **Not configured**: Default state.
4646
- **High**: Applies a strong level of detection.
47-
- **High plus**: Uses the **High** level and applies extra protection measures (might affect client performance).
48-
- **Zero tolerance**: Blocks all unknown executables.
47+
- **High Plus**: Uses the **High** level and applies extra protection measures (might affect client performance).
48+
- **Zero Tolerance**: Blocks all unknown executables.
4949

50-
6. Choose **Review + save**, and then choose **Save**.
50+
6. Choose **Next**, and then choose **Save**.
5151

5252
> [!TIP]
5353
> Need some help? See the following resources:

0 commit comments

Comments
 (0)