Skip to content

Commit 0c82477

Browse files
authored
Merge pull request #1835 from MicrosoftDocs/main
Publish main to live, Thursday 10:30 AM PST, 11/07
2 parents 905151b + f7fac97 commit 0c82477

7 files changed

+83
-28
lines changed

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 09/03/2024
17+
ms.date: 11/07/2024
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -34,8 +34,10 @@ This article provides instructions on how to run the tool via Live Response on W
3434
1. Download and fetch the required scripts available from within the **Tools** subdirectory of the [Microsoft Defender for Endpoint Client Analyzer](https://aka.ms/BetaMDEAnalyzer).
3535

3636
For example, to get the basic sensor and device health logs, fetch `..\Tools\MDELiveAnalyzer.ps1`.
37-
38-
If you also require Microsoft Defender Antivirus support logs (`MpSupportFiles.cab`), then fetch `..\Tools\MDELiveAnalyzerAV.ps1`.
37+
- If you require additional logs related to Microsoft Defender Antivirus, then use `..\Tools\MDELiveAnalyzerAV.ps1`.
38+
- If you require [Microsoft Endpoint Data Loss Prevention](/purview/endpoint-dlp-learn-about) related logs, then use `..\Tools\MDELiveAnalyzerDLP.ps1`.
39+
- If you require network and [Windows Filter Platform](/windows-hardware/drivers/network/windows-filtering-platform-architecture-overview) related logs, then use `..\Tools\MDELiveAnalyzerNet.ps1`.
40+
- If you require [Process Monitor](/sysinternals/downloads/procmon) logs, then use `..\Tools\MDELiveAnalyzerDLP.ps1`.
3941

4042
2. Initiate a [Live Response session](live-response.md#initiate-a-live-response-session-on-a-device) on the machine you need to investigate.
4143

defender-vulnerability-management/defender-vulnerability-management-capabilities.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ f1.keywords: NOCSH
1313
ms.collection:
1414
- m365-security
1515
- Tier1
16-
ms.date: 08/14/2024
16+
ms.date: 11/07/2024
1717
---
1818

1919
# Compare Microsoft Defender Vulnerability Management plans and capabilities
@@ -100,7 +100,10 @@ The table below shows the availability of Defender Vulnerability Management capa
100100
|[Digital certificate assessment](tvm-certificate-inventory.md)|-||
101101
|[Network share analysis](tvm-network-share-assessment.md)|-||
102102
|[Hardware and firmware assessment](tvm-hardware-and-firmware.md)|-||
103-
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-||
103+
|[Authenticated scan for Windows](windows-authenticated-scan.md)|-|**see note** <sup>2</sup>|
104+
105+
> [!IMPORTANT]
106+
> <sup>2</sup> The Windows authenticated scan feature will be deprecated by the end of November 2025 and will not be supported beyond that date. More information about this change are in the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
104107
105108
## Next steps
106109

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 56 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Microsoft Defender Vulnerability Management frequently asked questions
3-
description: Find answers to frequently asked questions (FAQs) about MDVM
3+
description: Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulnerability Management.
44
ms.service: defender-vuln-mgmt
55
f1.keywords:
66
- NOCSH
@@ -14,7 +14,7 @@ ms.collection:
1414
- Tier1
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 06/02/2022
17+
ms.date: 11/07/2024
1818
---
1919

2020
# Microsoft Defender Vulnerability Management frequently asked questions
@@ -26,16 +26,17 @@ Find answers to frequently asked questions (FAQs) about Microsoft Defender Vulne
2626
- [Block vulnerable applications FAQs](#block-vulnerable-applications-faqs)
2727
- [Security baselines FAQs](#security-baselines-faqs)
2828
- [Defender Vulnerability Management general FAQs](#defender-vulnerability-management-general-faqs)
29+
- [Windows authenticated scan deprecation FAQs](#windows-authenticated-scan-deprecation-faqs)
2930

3031
## Defender Vulnerability Management licensing FAQs
3132

3233
### What license does the user need to benefit from Defender Vulnerability Management capabilities?
3334

3435
Microsoft Defender Vulnerability Management is available via two services:
3536

36-
1. Microsoft Defender for Endpoint Plan 2 customers can seamlessly enhance their existing generally available vulnerability management capabilities with the Microsoft Defender Vulnerability Management add-on. This service provides consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools. To sign up for the free 90-day trial, see [Defender Vulnerability Management Add-on](get-defender-vulnerability-management.md#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
37+
1. Microsoft Defender for Endpoint Plan 2 customers can seamlessly enhance their existing generally available vulnerability management capabilities with the Defender Vulnerability Management add-on. This service provides consolidated inventories, expanded asset coverage, cross-platform support, and new assessment and mitigation tools. To sign up for the free 90-day trial, see [Defender Vulnerability Management Add-on](get-defender-vulnerability-management.md#try-defender-vulnerability-management-add-on-trial-for-defender-for-endpoint-plan-2-customers).
3738

38-
2. For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customers looking for a risk-based vulnerability management solution, Microsoft Defender Vulnerability Management Standalone helps you efficiently discover, assess, and remediate vulnerabilities and misconfigurations in one place. To sign up for the free 90-day trial, see [Defender Vulnerability Management Standalone](get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone).
39+
2. Defender Vulnerability Management Standalone helps you efficiently discover, assess, and remediate vulnerabilities and misconfigurations in one place. This is recommended for new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 customers. To sign up for the free 90-day trial, see [Defender Vulnerability Management Standalone](get-defender-vulnerability-management.md#try-defender-vulnerability-management-standalone).
3940

4041
### Do I need to assign Defender Vulnerability Management licenses to users in my organization as instructed in the admin center?
4142

@@ -58,18 +59,18 @@ For new customers or existing Defender for Endpoint P1 or Microsoft 365 E3 custo
5859
5960
### How is the service provisioned/deployed?
6061

61-
Once a customer is onboarded on to the free-trial experience, Defender Vulnerability Management features are turned on by default at the tenant level for all users within the organization.
62+
Defender Vulnerability Management features are turned on by default at the tenant level for all users within the organization once a customer is onboarded to the free-trial experience.
6263

63-
### If a customer is in public preview, what will happen to their premium capabilities if I don't sign up for a free trial?
64+
### If a customer is in public preview, what happens to their premium capabilities if they don't sign up for a free trial?
6465

65-
The new capabilities will be available only to customers who onboard a trial. Customers who haven't onboarded will lose access to these capabilities. Blocked applications will be immediately unblocked. Security baseline profiles may be stored for a short additional time before being deleted.
66+
The new capabilities are available only to customers who onboard a trial. Customers who aren't onboarded lose access to these capabilities. Blocked applications are immediately unblocked. Security baseline profiles may be stored for a short period before being deleted.
6667

6768
### How long does the trial last and what happens at the end of my trial?
6869

6970
- The Defender Vulnerability Management add-on trial lasts for 90 days.
7071
- The Defender Vulnerability Management Standalone trial lasts for 90 days.
7172

72-
After your trial ends, you'll have a 30 day grace period of active trial before the license becomes suspended. When the trial is suspended, you'll retain your security baselines, but you may lose access to your portal and your blocked applications may become unblocked.
73+
After your trial ends, you have a 30 day grace period of active trial before the license becomes suspended. When the trial is suspended, you retain your security baselines, but you may lose access to your portal and your blocked applications may become unblocked.
7374

7475
After 180 days, your license will be deactivated and your profiles will be deleted.
7576

@@ -84,7 +85,7 @@ Examples of recommendations where you might not see a mitigation action (such as
8485
- Recommendations related to operating systems
8586
- Recommendations related to apps for macOS and Linux
8687

87-
It's also possible that your organization has reached the maximum indicator capacity of 15,000. If this is the case, you will need to free up space by deleting old indicators. To learn more, see [Manage indicators](/defender-endpoint/indicator-manage).
88+
It's also possible that your organization reached the maximum indicator capacity of 15,000. If so, you need to free up space by deleting old indicators. To learn more, see [Manage indicators](/defender-endpoint/indicator-manage).
8889

8990
### Does blocking vulnerable apps work on all devices?
9091

@@ -96,16 +97,16 @@ This feature is supported on Windows devices (1809 or later) with the latest Win
9697

9798
There's currently support for:
9899

99-
- Center for Internet Security (CIS) benchmarks for Windows 10, Windows 11, and Windows Server 2008R2 and above.
100+
- Center for Internet Security (CIS) benchmarks for Windows 10, Windows 11, and Windows Server 2008R2 and later.
100101
- Security Technical Implementation Guides (STIG) benchmarks for Windows 10 and Windows Server 2019.
101102

102103
Upcoming support:
103104

104-
- Microsoft benchmarks for Windows 10, Windows 11, and Windows Server 2008R2 and above will be available in an upcoming release.
105+
- Microsoft benchmarks for Windows 10, Windows 11, and Windows Server 2008R2 and later will be available in an upcoming release.
105106

106107
### What operating systems can I measure using security baseline assessments?
107108

108-
Currently Windows is supported, but coverage will be expanded to cover more operating systems such as Mac and Linux.
109+
Currently Windows is supported, but coverage will be expanded to more operating systems like Mac and Linux.
109110

110111
## Defender Vulnerability Management general FAQs
111112

@@ -119,4 +120,46 @@ Microsoft Defender Vulnerability Management is available as a vulnerability mana
119120

120121
### Can I turn on Defender Vulnerability Management capabilities on a subset of devices in my organization?
121122

122-
There isn't a way to selectively light up the Defender Vulnerability Management assessment capabilities (block vulnerable applications, browser extension, certificate inventory, and network share assessment) on a subset of devices in a given tenant.
123+
Capabilities like blocking vulnerable applications, browser extension, certificate inventory, and network share assessment can't be selectively turned on for a subset of devices in a given tenant.
124+
125+
## Windows authenticated scan deprecation FAQs
126+
127+
### When does the deprecation process begin and end?
128+
129+
The [Windows authenticated scan](windows-authenticated-scan.md) deprecation process begins on November 2024 and will last for 12 months, concluding on November 30, 2025. During this period, support is limited to existing customers only. New customers will not have access to this capability.
130+
131+
### Why is this product being deprecated?
132+
133+
The deprecation is to streamline offerings and focus on features that provide greater value to customers. This change allows our teams to allocate resources to innovations that better meet customer needs. We understand transitions can be challenging, and we're here to support you throughout the process. Let us know if you have any questions or need assistance.
134+
135+
### When will the product be officially deprecated?
136+
137+
Windows authenticated scan will officially be deprecated on November 30, 2025. After this date, the capability will no longer be supported nor be available to customers.
138+
139+
### What happens to my data after the product is deprecated?
140+
141+
All user data is handled according to our [data storage and privacy policy](tvm-prerequisites.md#data-storage-and-privacy). We recommend that you export any important data before the deprecation date.
142+
143+
### Will the product be replaced?
144+
145+
There is no direct replacement for the Windows authenticated scan at this time. However, we are continuously evaluating our offerings and exploring opportunities for future development. We appreciate your understanding. Stay tuned for updates on new features and capabilities.
146+
147+
### Will support still be available after the deprecation date?
148+
149+
The development team will assist with any support tickets regarding Windows authenticated scan until the end of November 2025. However, no new features will be deployed. Support for the deprecated product ends on November 30, 2025. We encourage you to reach out with any questions before this date.
150+
151+
### What steps should I take to prepare for the deprecation?
152+
153+
We recommend reviewing your current usage of the Windows authenticated scan and identifying any critical data you rely on. Ensure that you export any important data before the deprecation date.
154+
155+
### Will I receive notifications about the deprecation process?
156+
157+
Yes. We will send out regular updates and reminders via the Message Center to all affected customers as the deprecation date approaches. Ensure your contact information is up to date in our system to receive these notifications.
158+
159+
### Can I still access the product during the deprecation period?
160+
161+
Yes. You can continue to access the Windows authenticated scan and use its features until the deprecation date of November 30, 2025. However, note that new customers will not be able to gain access during this time.
162+
163+
### How can I provide feedback about this change?
164+
165+
You can send your feedback through the relevant channels. We value your input and your feedback helps us improve our future products.

defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
ms.topic: conceptual
14-
ms.date: 07/09/2024
14+
ms.date: 11/07/2024
1515
---
1616

1717
# What's new in Microsoft Defender Vulnerability Management
@@ -21,10 +21,13 @@ This article provides information about new features and important product updat
2121
> [!TIP]
2222
> Did you know you can try all the features in Microsoft Defender Vulnerability Management for free? Find out how to [sign up for a free trial](defender-vulnerability-management-trial.md).
2323
24-
## July 2024
24+
## November 2024
25+
26+
- The deprecation process of the Windows authenticated scan will begin on November 2024 and concludes on November 30, 2025. For more information, see [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
2527

26-
- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.
28+
## July 2024
2729

30+
- (GA) Learning hub resources have moved from the Microsoft Defender portal to [learn.microsoft.com](https://go.microsoft.com/fwlink/?linkid=2273118). Access Microsoft Defender XDR Ninja training, learning paths, training modules and more. Browse the [list of learning paths](/training/browse/?products=m365-ems-cloud-app-security%2Cdefender-for-cloud-apps%2Cdefender-identity%2Cm365-information-protection%2Cm365-threat-protection%2Cmdatp%2Cdefender-office365&expanded=m365%2Coffice-365), and filter by product, role, level, and subject.
2831

2932
## February 2024
3033

defender-vulnerability-management/windows-authenticated-scan.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: Admin
99
ms.topic: conceptual
1010
ms.service: defender-vuln-mgmt
1111
ms.localizationpriority: medium
12-
ms.date: 11/03/2024
12+
ms.date: 11/07/2024
1313
ms.collection:
1414
- m365-security
1515
- Tier1
@@ -25,7 +25,7 @@ ms.collection:
2525
- [Microsoft Defender for Servers Plan 2](/azure/defender-for-cloud/plan-defender-for-servers-select-plan)
2626

2727
> [!IMPORTANT]
28-
> This feature will be deprecated by the end of November 2025 and will not be supported beyond that date. Reach out to Microsoft Support for more information or assistance.
28+
> This feature will be deprecated by the end of November 2025 and will not be supported beyond that date. More information about this change are in the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
2929
3030
Authenticated scan for Windows provides the ability to run scans on unmanaged Windows devices. You can remotely target by IP ranges or hostnames and scan Windows services by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. Once configured the targeted unmanaged devices will be scanned regularly for software vulnerabilities. By default, the scan will run every four hours with options to change this interval or have it only run once.
3131

defender-xdr/advanced-hunting-defender-use-custom-rules.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -44,15 +44,19 @@ For editable functions, more options are available when you select the vertical
4444
- **Delete** – deletes the function
4545

4646
### Use arg() operator for Azure Resource Graph queries (Preview)
47-
Preview customers can use the *arg()* operator to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like. Read [Create alerts with Azure Resource Graph and Log Analytics](/azure/governance/resource-graph/alerts-query-quickstart?tabs=azure-resource-graph) for more details.
47+
The *arg()* operator can be used to query across deployed Azure resources like subscriptions, virtual machines, CPU, storage, and the like.
48+
49+
This feature was previously only available in log analytics in Microsoft Sentinel. In the Microsoft Defender portal, the `arg()` operator works over Microsoft Sentinel data (that is, Defender XDR tables are not supported). This allows users to use the operator in advanced hunting without needing to manually open a Microsoft Sentinel window.
50+
51+
Read [Query data in Azure Resource Graph by using arg()](/azure/azure-monitor/logs/azure-monitor-data-explorer-proxy#query-data-in-azure-resource-graph-by-using-arg-preview) for more details.
4852

4953
In the query editor, enter *arg("").* followed by the Azure Resource Graph table name.
5054

51-
```Kusto
52-
arg("").<Azure-Resource-Graph-table-name>
53-
```
55+
For example:
56+
57+
:::image type="content" source="/defender-xdr/media/arg-operator2.png" alt-text="Screenshot of arg operator in advanced hunting." lightbox="/defender-xdr/media/arg-operator2.png":::
5458

55-
You can then, for instance, filter a query that searches over Microsoft Sentinel data based on the results of an Azure Resource Graph query:
59+
You can also, for instance, filter a query that searches over Microsoft Sentinel data based on the results of an Azure Resource Graph query:
5660

5761
```Kusto
5862
arg("").Resources
21.7 KB
Loading

0 commit comments

Comments
 (0)