Skip to content

Commit 1054ad7

Browse files
authored
Merge pull request #1613 from MicrosoftDocs/main
AMSI demonstration article -- fix needs to go live
2 parents 39f31a7 + c3bb977 commit 1054ad7

File tree

47 files changed

+208
-328
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+208
-328
lines changed

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -214,6 +214,11 @@
214214
"source_path": "defender-endpoint/defender-endpoint-antivirus-exclusions.md",
215215
"redirect_url": "/defender-endpoint/navigate-defender-endpoint-antivirus-exclusions",
216216
"redirect_document_id": false
217+
},
218+
{
219+
"source_path": "defender-endpoint/defender-endpoint-demonstration-amsi.md",
220+
"redirect_url": "/defender-endpoint/mde-demonstration-amsi",
221+
"redirect_document_id": true
217222
}
218223
]
219224
}

defender-endpoint/TOC.yml

Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -59,44 +59,43 @@
5959
- name: Antivirus solution compatibility with Defender for Endpoint
6060
href: defender-compatibility.md
6161

62-
- name: Microsoft Defender for Endpoint demonstrations
62+
- name: Microsoft Defender for Endpoint demonstrations and evaluation
6363
items:
64-
- name: Microsoft Defender for Endpoint demonstrations
64+
- name: Evaluate Microsoft Defender Antivirus
65+
href: evaluate-microsoft-defender-antivirus.md
6566
items:
66-
- name: Overview
67-
href: evaluate-microsoft-defender-antivirus.md
6867
- name: Evaluate Microsoft Defender Antivirus using PowerShell
6968
href: microsoft-defender-antivirus-using-powershell.md
7069
- name: Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management
7170
href: evaluate-mda-using-mde-security-settings-management.md
7271
- name: Evaluate Microsoft Defender Antivirus using Group Policy
7372
href: evaluate-mdav-using-gp.md
74-
- name: Microsoft Defender for Endpoint demonstration scenarios
75-
href: defender-endpoint-demonstrations.md
73+
- name: Demonstration scenarios
74+
href: defender-endpoint-demonstrations.md
75+
items:
76+
- name: AMSI demonstrations
77+
href: mde-demonstration-amsi.md
78+
- name: Antimalware validation demonstration
79+
href: validate-antimalware.md
80+
- name: Attack surface reduction rules demonstration
81+
href: defender-endpoint-demonstration-attack-surface-reduction-rules.md
7682
- name: App reputation demonstration
7783
href: defender-endpoint-demonstration-app-reputation.md
78-
- name: Behavior monitoring demonstrations
84+
- name: Behavior monitoring demonstration
7985
href: demonstration-behavior-monitoring.md
80-
- name: Validate antimalware
81-
href: validate-antimalware.md
82-
- name: AMSI demonstrations
83-
href: defender-endpoint-demonstration-amsi.md
84-
displayName: Antimalware Scan Interface (AMSI), AMSI
85-
- name: Attack surface reduction rules demonstrations
86-
href: defender-endpoint-demonstration-attack-surface-reduction-rules.md
87-
- name: Cloud-delivered protection demonstration
86+
- name: Cloud-delivered protection
8887
href: defender-endpoint-demonstration-cloud-delivered-protection.md
89-
- name: Controlled folder access (CFA) demonstration (block script)
88+
- name: Controlled folder access (block script) demonstration
9089
href: defender-endpoint-demonstration-controlled-folder-access-test-tool.md
91-
- name: Controlled folder access (CFA) demonstrations (block ransomware)
90+
- name: Controlled folder access (block ransomware) demonstration
9291
href: defender-endpoint-demonstration-controlled-folder-access.md
93-
- name: EDR detections
92+
- name: EDR detections demonstration
9493
href: edr-detection.md
95-
- name: Exploit protection (EP) demonstrations
94+
- name: Exploit protection demonstration
9695
href: defender-endpoint-demonstration-exploit-protection.md
97-
- name: Network protection demonstrations
96+
- name: Network protection demonstration
9897
href: defender-endpoint-demonstration-network-protection.md
99-
- name: Potentially unwanted applications (PUA) demonstration
98+
- name: Potentially unwanted applications demonstration
10099
href: defender-endpoint-demonstration-potentially-unwanted-applications.md
101100
- name: URL reputation demonstrations
102101
href: defender-endpoint-demonstration-smartscreen-url-reputation.md

defender-endpoint/defender-endpoint-demonstration-amsi.md

Lines changed: 0 additions & 239 deletions
This file was deleted.

defender-endpoint/defender-endpoint-demonstrations.md

Lines changed: 26 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -14,27 +14,27 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: ngp
17-
ms.date: 01/15/2024
17+
ms.date: 10/16/2024
1818
---
1919

2020
# Microsoft Defender for Endpoint - demonstration scenarios
2121

2222
**Applies to:**
2323

24-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
25-
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
26-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2724
- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)
25+
- [Microsoft Defender for Endpoint Plan 1 or 2](microsoft-defender-endpoint.md)
26+
- Microsoft Defender for Servers
27+
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
2828
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
2929

30-
The following demonstration scenarios will help you learn about the capabilities of Microsoft Defender for Endpoint on Windows, Mac, and Linux. Demonstration scenarios are provided for the following Microsoft Defender for Endpoint protection areas:
31-
32-
:::image type="content" source="media/microsoft-defender-for-endpoint-cloud-protection.png" alt-text="Shows the areas of Microsoft Defender for Endpoint demonstration scenarios covered in this collection" lightbox="media/microsoft-defender-for-endpoint-cloud-protection.png":::
30+
Demonstration scenarios help you learn about the capabilities of Microsoft Defender for Endpoint on Windows, Mac, and Linux. Demonstration scenarios are provided for the following Microsoft Defender for Endpoint protection areas:
3331

3432
- Attack surface protection (**ASR**)
3533
- Next Generation Protection (**NGP**)
3634
- Endpoint detection and response (**EDR**)
3735

36+
:::image type="content" source="media/microsoft-defender-for-endpoint-cloud-protection.png" alt-text="Shows the areas of Microsoft Defender for Endpoint demonstration scenarios covered in this collection" lightbox="media/microsoft-defender-for-endpoint-cloud-protection.png":::
37+
3838
> [!NOTE]
3939
> None of the sample files or _suspicious_ links provided in this collection are actually malicious; all links and demonstration files are harmless.
4040
>
@@ -44,26 +44,28 @@ The following demonstration scenarios will help you learn about the capabilities
4444

4545
The following table lists the available demonstrations alphabetically, with their associated protection area.
4646

47-
| # | Demonstration name | Protection area | Description |
48-
|:--|:---|:---|:---|
49-
| 1 |[Endpoint Detection and Response (EDR) detections](edr-detection.md)| EDR |Confirm that EDR is detecting cyber threats such as malware.|
50-
| 2 |[Validate antimalware](validate-antimalware.md)| NGP |Confirm that antivirus/antimalware is detecting and blocking malware. |
51-
| 3 |[Behavior Monitoring demonstration](demonstration-behavior-monitoring.md)| NGP |Confirm that behavior monitoring is detecting and blocking malware. |
52-
| 4 |[Potentially unwanted applications (PUA) demonstration](defender-endpoint-demonstration-potentially-unwanted-applications.md)| NGP |Confirm that potentially unwanted applications (PUAs) are being blocked on your network by downloading a fake (safe) PUA file. |
53-
| 5 |[Cloud-delivered protection demonstration](defender-endpoint-demonstration-cloud-delivered-protection.md)| NGP |Confirm that cloud-delivered protection is working properly on your computer. |
54-
| 6 |[App reputation demonstration](defender-endpoint-demonstration-app-reputation.md)| NGP | Navigate to the app reputation page to see the demonstration scenario using Microsoft Edge.|
55-
| 7 |[URL reputation demonstrations](defender-endpoint-demonstration-smartscreen-url-reputation.md)| NGP | Navigate to the URL Reputation page to see the demonstration scenarios using Microsoft Edge. |
56-
| 8 | [Network protection demonstrations](defender-endpoint-demonstration-network-protection.md)| ASR | Navigate to a suspicious URL to trigger network protection. |
57-
| 9 | [Attack surface reduction rules (ASR rules) demonstrations](defender-endpoint-demonstration-attack-surface-reduction-rules.md)| ASR | Download sample files to trigger each ASR rule. |
58-
| 10 | [Exploit protection (EP) demonstrations](defender-endpoint-demonstration-exploit-protection.md) | ASR | Apply custom exploit protection settings. |
59-
| 11 | [Controlled folder access (CFA) demonstration (block script)](defender-endpoint-demonstration-controlled-folder-access-test-tool.md)| ASR | Download the CFA test tool. |
60-
| 12 | [Controlled folder access (CFA) demonstrations (block ransomware)](defender-endpoint-demonstration-controlled-folder-access.md)| ASR| Download and execute a sample file to trigger CFA ransomware protection.|
47+
| Demonstration name | Protection area | Description |
48+
|---|---|---|
49+
| [AMSI demonstrations](mde-demonstration-amsi.md) | Microsoft Defender Antivirus | Confirm that an AMSI script is detected and blocked. |
50+
|[Antimalware validation](validate-antimalware.md)| NGP |Confirm that antivirus/antimalware is detecting and blocking malware. |
51+
| [Attack surface reduction rules demonstrations](defender-endpoint-demonstration-attack-surface-reduction-rules.md)| ASR | Download sample files to trigger each ASR rule. |
52+
|[App reputation demonstration](defender-endpoint-demonstration-app-reputation.md)| NGP | Navigate to the app reputation page to see the demonstration scenario using Microsoft Edge.|
53+
|[Behavior Monitoring demonstration](demonstration-behavior-monitoring.md)| NGP |Confirm that behavior monitoring is detecting and blocking malware. |
54+
|[Cloud-delivered protection demonstration](defender-endpoint-demonstration-cloud-delivered-protection.md)| NGP |Confirm that cloud-delivered protection is working properly on your computer. |
55+
| [Controlled folder access (CFA) demonstration (block script)](defender-endpoint-demonstration-controlled-folder-access-test-tool.md)| ASR | Download the CFA test tool. |
56+
| [Controlled folder access (CFA) demonstrations (block ransomware)](defender-endpoint-demonstration-controlled-folder-access.md)| ASR| Download and execute a sample file to trigger CFA ransomware protection.|
57+
|[Endpoint Detection and Response (EDR) detections](edr-detection.md)| EDR |Confirm that EDR is detecting cyber threats such as malware.|
58+
| [Exploit protection (EP) demonstrations](defender-endpoint-demonstration-exploit-protection.md) | ASR | Apply custom exploit protection settings. |
59+
| [Network protection demonstrations](defender-endpoint-demonstration-network-protection.md)| ASR | Navigate to a suspicious URL to trigger network protection. |
60+
|[Potentially unwanted applications (PUA) demonstration](defender-endpoint-demonstration-potentially-unwanted-applications.md)| NGP |Confirm that potentially unwanted applications (PUAs) are being blocked on your network by downloading a fake (safe) PUA file. |
61+
|[URL reputation demonstrations](defender-endpoint-demonstration-smartscreen-url-reputation.md)| NGP | Navigate to the URL Reputation page to see the demonstration scenarios using Microsoft Edge. |
62+
6163
## See also
6264

63-
[Attack surface protection \(ASR\) overview](overview-attack-surface-reduction.md)
65+
[Attack surface protection overview](overview-attack-surface-reduction.md)
6466
[Test attack surface reduction rules](attack-surface-reduction-rules-deployment-test.md)
65-
[Next Generation Protection \(NGP\) overview](next-generation-protection.md)
66-
[Endpoint detection and response \(EDR\) overview](overview-endpoint-detection-response.md)
67+
[Next Generation Protection overview](next-generation-protection.md)
68+
[Endpoint detection and response overview](overview-endpoint-detection-response.md)
6769
[Microsoft Defender for Endpoint security blog](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/bg-p/MicrosoftDefenderATPBlog)
6870

6971
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)