Skip to content

Commit 09babc0

Browse files
authored
Merge branch 'main' into repo_sync_working_branch
2 parents e989967 + a186206 commit 09babc0

File tree

3 files changed

+36
-24
lines changed

3 files changed

+36
-24
lines changed

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-linux
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 03/12/2024
17+
ms.date: 05/17/2024
1818
---
1919

2020
# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux
@@ -67,7 +67,6 @@ Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
6767
- Defender for Endpoint version "101.24022.0001" or higher needs to be installed on the Linux endpoints.
6868
- The Linux endpoints need to have connectivity to the Mirror Server.
6969
- The Linux endpoint must be running any of the Defender for Endpoint supported distributions.
70-
7170
- The Mirror Server can be either an HTTP/ HTTPS server or a network share server. For example, an NFS Server.
7271
- The Mirror Server needs to have access to the following URLs:
7372
- `https://github.com/microsoft/mdatp-xplat.git`
@@ -85,6 +84,7 @@ Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
8584

8685
> [!NOTE]
8786
> This configuration may vary depending on the number of requests that are served and the load each server must process.
87+
8888
## Configuring the Mirror Server
8989

9090
> [!NOTE]
@@ -138,7 +138,7 @@ The `settings.json` file consists of a few variables that the user can configure
138138
| Field Name | Value | Description |
139139
|--------------------------|--------|--------------------------------------------------------|
140140
| `downloadFolder` | string | Maps to the location where the script downloads the files to |
141-
| `downloadLinuxUpdates` | bool | When set to true, the script downloads the Linux specific updates to the `downloadFolder` |
141+
| `downloadLinuxUpdates` | bool | When set to `true`, the script downloads the Linux specific updates to the `downloadFolder` |
142142
| `logFilePath` | string | Sets up the diagnostic logs at a given folder. This file can be shared with Microsoft for debugging the script if there are any issues |
143143
| `downloadMacUpdates` | bool | The script downloads the Mac specific updates to the `downloadFolder` |
144144
| `downloadPreviewUpdates` | bool | Downloads the preview version of the updates available for the specific OS |
@@ -189,17 +189,21 @@ Once the Mirror Server is set up, we need to propagate this URL to the Linux end
189189
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
190190
"offlineDefintionUpdateFallbackToCloud":false,
191191
"offlineDefinitionUpdate": "enabled"
192-
}
192+
},
193+
"features": {
194+
"offlineDefinitionUpdateVerifySig": "enabled"
195+
}
193196
}
194197
```
195198

196199
| Field Name | Values | Comments |
197200
|-------------------------------------------|----------------------|-----------------------------------------------------|
198-
| `automaticDefinitionUpdateEnabled` | True / False | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively |
199-
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds) |
200-
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up |
201-
| `offlineDefinitionUpdate` | enabled / disabled | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
202-
| `offlineDefinitionUpdateFallbackToCloud` | True / False | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
201+
| `automaticDefinitionUpdateEnabled` | `True` / `False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
202+
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
203+
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up. |
204+
| `offlineDefinitionUpdate` | `enabled` / `disabled` | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
205+
| `offlineDefinitionUpdateFallbackToCloud` | `True` / `False` | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
206+
| `offlineDefinitionUpdateVerifySig` | `enabled` / `disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints, else vice versa. |
203207

204208
> [!NOTE]
205209
> As of today the offline security intelligence update feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
@@ -212,9 +216,9 @@ To test if the settings are applied correctly on the Linux endpoints, run the fo
212216
mdatp health --details definitions
213217
```
214218

215-
For example, a sample output would look like:
219+
A sample output would look like the following code snippet:
216220

217-
```console
221+
```output
218222
user@vm:~$ mdatp health --details definitions
219223
automatic_definition_update_enabled : true [managed]
220224
definitions_updated : Mar 14, 2024 at 12:13:17 PM
@@ -262,8 +266,8 @@ offline_definition_update_fallback_to_cloud : false[managed]
262266

263267
### Issues: MDATP update failure
264268

265-
- Update stuck or update didn't trigger
266-
- Update failed
269+
- Update stuck, or update didn't trigger.
270+
- Update failed.
267271

268272
### Common Troubleshooting Steps
269273

@@ -294,10 +298,12 @@ offline_definition_update_fallback_to_cloud : false[managed]
294298
### Known Issues:
295299

296300
Offline signature update might fail in the following scenario:
297-
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
301+
302+
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
298303

299304
Mitigation steps:
300-
The fix for this will be available in the upcoming release.
305+
306+
A fix for this issue is planned to release soon.
301307

302308
## Useful Links
303309

defender-endpoint/uefi-scanning-in-defender-for-endpoint.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,13 @@ ms.service: defender-endpoint
1111
ms.subservice: ngp
1212
ms.localizationpriority: medium
1313
ms.custom:
14-
- admindeeplinkDEFENDER
14+
- admindeeplinkDEFENDER
15+
- partner-contribution
1516
ms.collection:
1617
- m365-security
1718
- tier2
1819
search.appverid: met150
19-
ms.date: 04/30/2024
20+
ms.date: 05/22/2024
2021
---
2122

2223
# UEFI scanning in Defender for Endpoint
@@ -91,13 +92,16 @@ To detect unknown threats in SPI flash, signals from the UEFI scanner are analyz
9192
These events can likewise be queried through advanced hunting as shown:
9293

9394
```kusto
94-
DeviceAlertEvents
95-
95+
let AlertStats = AlertInfo
96+
| where Timestamp > ago(30d)
97+
| where ServiceSource == "Microsoft Defender for Endpoint"
98+
| where DetectionSource == "Antivirus"
9699
| where Title has "UEFI"
97-
100+
| join AlertEvidence on AlertId;
101+
AlertStats
102+
| join DeviceInfo on DeviceId
103+
| distinct DeviceName, DeviceId, AlertId, Title, Severity, DetectionSource, Timestamp
98104
| summarize Titles=makeset(Title) by DeviceName, DeviceId, bin(Timestamp, 1d)
99-
100-
| limit 100
101105
```
102106

103107
## Comprehensive security levels up with low-level protections

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ search.appverid: met150
55
ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
8-
ms.reviewer: noamhadash, pahuijbr
8+
ms.reviewer: noamhadash, pahuijbr, yongrhee
99
ms.localizationpriority: medium
10-
ms.date: 05/15/2024
10+
ms.date: 05/22/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -57,6 +57,8 @@ For more information on Microsoft Defender for Endpoint on specific operating sy
5757

5858
- (GA) [Streamlined device connectivity for Defender for Endpoint](configure-device-connectivity.md) is now generally available for Windows, macOS, and Linux. This experience makes it easier to configure and manage Defender for Endpoint services by reducing the number of URLs required for connectivity, providing IP & Azure service tag support, and simplifying post-deployment network management.
5959

60+
- (GA) [Microsoft Defender Core service](/defender-endpoint/microsoft-defender-core-service-overview) is now generally available on Windows clients. Helps with the stability and performance of Microsoft Defender Antivirus.
61+
6062
## April 2024
6163

6264
**Microsoft Defender for Endpoint on macOS** feature now in GA:

0 commit comments

Comments
 (0)