Skip to content

Commit 1404073

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into yelevin/rename-link-to-move
2 parents 1b40698 + 350a224 commit 1404073

16 files changed

+253
-188
lines changed

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 11/21/2024
18+
ms.date: 02/03/2025
1919
---
2020

2121
# Evaluate exploit protection
@@ -89,6 +89,8 @@ For Adobe Reader use the following ASR rule:
8989

9090
[Block Adobe Reader from creating child processes](attack-surface-reduction-rules-reference.md#block-adobe-reader-from-creating-child-processes)
9191

92+
[Google Chrome ](https://chromium.googlesource.com/chromium/src/+/refs/heads/main/docs/security/faq.md#Can-I-use-EMET-to-help-protect-Chrome-against-attack-on-Microsoft-Windows)no longer recommends enabling Exploit Protection (EMET) because it's redundant or superseded with built-in attack mitigations.
93+
9294
## Application compatibility list
9395

9496
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
@@ -102,7 +104,7 @@ The following table lists specific products that have compatibility issues with
102104
| Certain AMD (ATI) video drivers | System ASLR=AlwaysOn |
103105
| DropBox | EAF |
104106
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
105-
| Google Chrome | EAF+ |
107+
| Google Chrome ([no longer recommended](https://chromium.googlesource.com/chromium/src/+/refs/heads/main/docs/security/faq.md#Can-I-use-EMET-to-help-protect-Chrome-against-attack-on-Microsoft-Windows))| EAF+ |
106108
| Immidio Flex+ | EAF |
107109
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
108110
| Microsoft PowerPoint | EAF |

defender-endpoint/exploit-protection-reference.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
- mde-asr
18-
ms.date: 11/15/2024
18+
ms.date: 02/03/2025
1919
search.appverid: met150
2020
---
2121

@@ -439,6 +439,8 @@ Hardware-enforced stack protection offers robust protection against ROP exploits
439439

440440
Hardware-enforced stack protection only works on chipsets with support for hardware shadow stacks, Intel's Control-flow Enforcement Technology (CET) or AMD shadow stacks.
441441

442+
If you're running applications based on the .Net Framework, hardware-enforced stack protection is compatible with .Net Framework 7 (opt-in), or newer. If you're using an application with an older version (earlier than .Net Framework 7), expect stability issues (crashes or hangs) and/or performance issues (high cpu or memory leaks). These stability issues could also occur when either in audit mode and/or when targeting only compatible modules.
443+
442444
### Configuration options
443445

444446
**Audit only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Defender for Endpoint](/defender-xdr/advanced-hunting-overview).

defender-endpoint/linux-support-perf.md

Lines changed: 199 additions & 152 deletions
Large diffs are not rendered by default.

defender-endpoint/mde-linux-deployment-on-sap.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/06/2025
18+
ms.date: 02/04/2025
1919
ms.custom:
2020
- partner-contribution
2121
---
@@ -262,7 +262,7 @@ sudo mdatp diagnostic create
262262

263263
- [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint on Linux](linux-support-connectivity.md#run-the-connectivity-test)
264264

265-
- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md#troubleshoot-performance-issues-using-microsoft-defender-for-endpoint-client-analyzer)
265+
- [Troubleshoot performance issues for Microsoft Defender for Endpoint on Linux](linux-support-perf.md)
266266

267267
## Related articles
268268

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 11/18/2024
17+
ms.date: 02/03/2025
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -69,14 +69,6 @@ This article provides instructions on how to run the tool via Live Response on W
6969

7070
- The latest preview version of MDEClientAnalyzer can be downloaded here: <https://aka.ms/MDEClientAnalyzerPreview>.
7171

72-
- If you can't allow the machine to reach the above URL, then upload `MDEClientAnalyzerPreview.zip` file to the library before running the LiveAnalyzer script:
73-
74-
```console
75-
PutFile MDEClientAnalyzerPreview.zip -overwrite
76-
Run MDELiveAnalyzer.ps1
77-
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
78-
```
79-
8072
- For more information on gathering data locally on a machine in case the machine isn't communicating with Microsoft Defender for Endpoint cloud services, or doesn't appear in Microsoft Defender for Endpoint portal as expected, see [Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md).
8173

8274
- As described in [Live response command examples](live-response-command-examples.md), you might want to use the `&` symbol at the end of the command to collect logs as a background action:

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,11 +51,23 @@ The following tables present the relevant vulnerability information organized by
5151
| - | Defender Vulnerability Management doesn't currently support Nvidia Cuda Pilot | 20-Jan-25 |
5252
| - | Fixed inaccuracy in Mattermost Desktop vulnerability- CVE-2024-39613 | 21-Jan-25 |
5353
| - | Added Microsoft Defender Vulnerability Management support to BeyondTrust Privileged Remote Access | 21-Jan-25 |
54-
| - | Fixed inaccuracy in BeyondTrust Remote Support | 21-Jan-25 |
5554
| - | Fixed vulnerability detection in InfluxDB | 22-Jan-25 |
55+
| - | Fixed inaccuracy in BeyondTrust Remote Support | 22-Jan-25 |
5656
| 68411 | Fixed inaccurate detections in WebM Project libwebp by excluding razer file path | 22-Jan-25 |
5757
| 77999 | Defender Vulnerability Management doesn't currently support these four ESET vulnerabilities: <br/>- CVE-2020-11446<br/>- CVE-2023-5594<br/>- CVE-2023-3160<br/>- CVE-2024-7400 | 22-Jan-25 |
58-
58+
| - | Updated existing normalization rule for Adobe Acrobat Reader to detect raw names with 'neopackage'| 22-Jan-25 |
59+
| 70377 | Fixed incorrect detections in Microsoft Teams by excluding incorrect Raw Product Names Vida | 22-Jan-25 |
60+
| 74420 | Fixed incorrect detections in Toggl Track by excluding incorrect Raw Product Names WeChat | 22-Jan-25 |
61+
| 75694 | Fixed incorrect detections in McAfee by excluding incorrect Raw Product Names Drive Encryption | 22-Jan-25 |
62+
| 71402 | Fixed incorrect detections in Smoothwall by excluding incorrect Raw Product Names Smoothwall Unified Client | 22-Jan-25 |
63+
| 76607 | Fixed inaccuracy in Dell BeyondCompare by excluding incorrect Raw Product Names Scooter Software | 22-Jan-25 |
64+
| - | Added normalization rule for Microsoft Visual Studio 2015 to improve detection logic | 22-Jan-25 |
65+
| 79328 | Fixed incorrect detections in Microsoft Monitoring Agent by excluding incorrect Raw Product Names MDOP MBAM | 22-Jan-25 |
66+
| 83419 | Added Microsoft Defender Vulnerability Management support to Sinclair MakeMeAdmin | 22-Jan-25 |
67+
| 84540 | Fixed incorrect detections in Apple Xcode by excluding incorrect Raw Product Names ProtoPie and RocketSim | 22-Jan-25 |
68+
| - | Fixed incorrect detections in Apache Tomcat by excluding incorrect Raw Product Names Commons Logging | 22-Jan-25 |
69+
| 61679 | Defender Vulnerability Management doesn't currently support ESRI portal for Arcgis | 22-Jan-25 |
70+
| - | Defender Vulnerability Management doesn't currently support Citrix Virtual Apps & Desktops | 22-Jan-25 |
5971

6072
## November 2024
6173

@@ -72,8 +84,6 @@ The following tables present the relevant vulnerability information organized by
7284
| Inaccuracy report ID | Description | Fix date |
7385
|---|---|---|
7486
| - | Fixed inaccuracy in Microsoft LibDB & NSS vulnerabilities | 03-Oct-24 |
75-
| 70377 | Fixed incorrect detections in Microsoft Teams by excluding Vida from the Teams normalization rule | 09-Oct-24 |
76-
| 74420 | Fixed incorrect detections in Toggl Track by excluding WeChat from the Toggl Track normalization rule | 09-Oct-24 |
7787
| 76607 | Fixed inaccuracy in Scooter Software | 09-Oct-24 |
7888
| 71665 | Fixed inaccuracy in Hoppscotch vulnerabilities - CVE-2023-34097 & CVE-2024-27092 | 29-Oct-24 |
7989
| 74054 | Fixed inaccuracy in Acronis vulnerability - CVE-2022-45449 | 29-Oct-24 |

defender-xdr/incident-queue.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
1818
search.appverid:
1919
- MOE150
2020
- MET150
21-
ms.date: 01/10/2025
21+
ms.date: 01/27/2025
2222
appliesto:
2323
- Microsoft Defender XDR
2424
- Microsoft Sentinel in the Microsoft Defender portal
@@ -107,7 +107,7 @@ The **Filters** list above the list of incidents shows the currently applied fil
107107

108108
From the default incident queue, you can select **Add filter** to see the **Add filter** drop-down, from which you specify filters to apply to the incidents queue to limit the set of incidents shown. Here's an example.
109109

110-
:::image type="content" source="/defender/media/incidents-queue/fig1-newfilters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
110+
:::image type="content" source="/defender/media/incidents-queue/incidents-all-filters.png" alt-text="The Filters pane for the incident queue in the Microsoft Defender portal.":::
111111

112112
Select the filters you want to use, then select **Add** at the bottom of the list to make them available.
113113

@@ -134,8 +134,9 @@ This table lists the filter names that are available.
134134
| **Classification** | Specify the set of classifications of the related alerts. |
135135
| **Automated investigation state** | Specify the status of automated investigation. |
136136
| **Associated threat** | Specify a named threat. |
137-
| **Alert policies** | Specify an alert policy title. |
138-
| **Alert subscription IDs** | Specify an alert based on a subscription ID. |
137+
| **Policy/policy rule** | Filter incidents based on policy or policy rule. |
138+
| **Product names** | Filter incidents based on product name. |
139+
| **Data stream** | Filter incidents based on the location or workload. |
139140

140141
> [!NOTE]
141142
> If you have provisioned access to Microsoft Purview Insider Risk Management, you can view and manage insider risk management alerts and hunt for insider risk management events in the Microsoft Defender portal. For more information, see [Investigate insider risk threats in the Microsoft Defender portal](irm-investigate-alerts-defender.md).

defender-xdr/investigate-alerts.md

Lines changed: 23 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,17 @@ ms.collection:
1616
ms.custom: admindeeplinkDEFENDER
1717
ms.topic: conceptual
1818
search.appverid:
19-
- MOE150
20-
- met150
21-
ms.date: 01/17/2025
19+
- MOE150
20+
- met150
21+
ms.date: 1/27/2025
22+
appliesto:
23+
- Microsoft Defender XDR
2224
---
2325

2426
# Investigate alerts in Microsoft Defender XDR
2527

2628
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2729

28-
**Applies to:**
29-
30-
- Microsoft Defender XDR
31-
3230
> [!NOTE]
3331
> This article describes security alerts in Microsoft Defender XDR. However, you can use activity alerts to send email notifications to yourself or other admins when users perform specific activities in Microsoft 365. For more information, see [Create activity alerts - Microsoft Purview | Microsoft Docs](/Microsoft-365/compliance/create-activity-alerts).
3432
@@ -38,15 +36,15 @@ In Microsoft Defender XDR, related alerts are aggregated together to form [incid
3836

3937
The **Alerts queue** shows the current set of alerts. You get to the alerts queue from **Incidents & alerts > Alerts** on the quick launch of the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139).
4038

41-
:::image type="content" source="/defender/media/investigate-alerts/alerts-ss-alerts-queue.png" alt-text="The Alerts section in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-ss-alerts-queue.png":::
39+
:::image type="content" source="/defender/media/investigate-alerts/alerts-page-defender-small.png" alt-text="The Alerts section in the Microsoft Defender portal" lightbox="/defender/media/investigate-alerts/alerts-page-defender.png":::
4240

4341
Alerts from different Microsoft security solutions like Microsoft Defender for Endpoint, Defender for Office 365, Microsoft Sentinel, Defender for Cloud, Defender for Identity, Defender for Cloud Apps, Defender XDR, App Governance, Microsoft Entra ID Protection, and Microsoft Data Loss Prevention appear here.
4442

4543
By default, the alerts queue in the Microsoft Defender portal displays the new and in progress alerts from the last seven days. The most recent alert is at the top of the list so you can see it first.
4644

47-
From the default alerts queue, you can select **Filter** to see a **Filter** pane, from which you can specify a subset of the alerts. Here's an example.
45+
From the default alerts queue, you can select **Filter** to see all available filters from which you can specify a subset of the alerts. Here's an example.
4846

49-
:::image type="content" source="/defender/media/investigate-alerts/alerts-ss-alerts-filter.png" alt-text="The Filters section in the Microsoft Defender portal." lightbox="/defender/media/investigate-alerts/alerts-ss-alerts-filter.png":::
47+
:::image type="content" source="/defender/media/investigate-alerts/alerts-all-filters.png" alt-text="All the filters available in the Alerts queue in the Microsoft Defender portal":::
5048

5149
You can filter alerts according to these criteria:
5250

@@ -55,10 +53,12 @@ You can filter alerts according to these criteria:
5553
- Categories
5654
- Service/detection sources
5755
- Tags
58-
- Policy
56+
- Policy/Policy rule
57+
- Alert type
58+
- Product name
5959
- Entities (the impacted assets)
6060
- Automated investigation state
61-
- Alert subscription IDs
61+
- Data stream (workload or location)
6262

6363
> [!NOTE]
6464
> Microsoft Defender XDR customers can now filter incidents with alerts where a compromised device communicated with operational technology (OT) devices connected to the enterprise network through the [device discovery integration of Microsoft Defender for IoT and Microsoft Defender for Endpoint](/defender-endpoint/device-discovery#device-discovery-integration). To filter these incidents, select **Any** in the Service/detection sources, then select **Microsoft Defender for IoT** in the Product name or see [Investigate incidents and alerts in Microsoft Defender for IoT in the Defender portal](/defender-for-iot/investigate-threats/). You can also use device groups to filter for site-specific alerts. For more information about Defender for IoT prerequisites, see [Get started with enterprise IoT monitoring in Microsoft Defender XDR](/azure/defender-for-iot/organizations/eiot-defender-for-endpoint/).
@@ -73,6 +73,17 @@ An alert can have system tags and/or custom tags with certain color backgrounds.
7373
> [!TIP]
7474
> Microsoft's Security Exposure Management, based on predefined classifications, automatically tags devices, identities, and cloud resources as a **critical asset**. This out-of-the-box capability ensures the protection of an organization's valuable and most important assets. It also helps security operations teams to prioritize investigation and remediation. Know more about [critical asset management](/security-exposure-management/critical-asset-management).
7575
76+
> [!IMPORTANT]
77+
> Some information in this article relates to a prereleased product, which may be substantially modified before it’s commercially released. Microsoft makes no warranties expressed or implied, with respect to the information provided here.
78+
79+
You can search for alerts using a custom date and time range or by using the search bar to search for specific alerts. To search for alerts within a specific date or time range, select **Custom range** in the date picker and then specify the start and end dates and times.
80+
81+
:::image type="content" source="/defender/media/investigate-alerts/alerts-custom-range.png" alt-text="Highlighting the custom range option in the date and time picker in the Alerts queue.":::
82+
83+
To search for specific alerts, enter the search term in the search bar. You can search for alerts based on the alert title or alert ID.
84+
85+
:::image type="content" source="/defender/media/investigate-alerts/alerts-search-bar-small.png" alt-text="Highlighting the search bar in the Alerts queue" lightbox="/defender/media/investigate-alerts/alerts-search-bar.png":::
86+
7687
## Required roles for Defender for Office 365 alerts
7788

7889
You'll need to have any of the following roles to access Microsoft Defender for Office 365 alerts:

defender-xdr/prerequisites.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
search.appverid:
1717
- MOE150
1818
- MET150
19-
ms.date: 07/18/2024
19+
ms.date: 02/04/2025
2020
appliesto:
2121
- Microsoft Defender XDR
2222
---
@@ -31,7 +31,7 @@ Learn about licensing and other requirements for provisioning and using [Microso
3131

3232
Microsoft Defender XDR natively correlates Microsoft security products' signals, providing security operations teams a single pane of glass to detect, investigate, respond, and protect your assets. These signals are dependent on the license that you have and the access provisioned to you.
3333

34-
Any of the these licenses gives you access to Microsoft Defender XDR features via the Microsoft Defender portal without additional cost:
34+
Any of these licenses give you access to Microsoft Defender XDR features via the Microsoft Defender portal without any additional cost:
3535

3636
- Microsoft 365 E5 or A5
3737
- Microsoft 365 E3 with the Microsoft 365 E5 Security add-on
87.5 KB
Loading

0 commit comments

Comments
 (0)