Skip to content

Commit 16746d9

Browse files
Merge pull request #1266 from MicrosoftDocs/main
publish main to live 9/3 10:30 AM
2 parents b9d231e + 9d0e38f commit 16746d9

File tree

4 files changed

+23
-12
lines changed

4 files changed

+23
-12
lines changed

defender-endpoint/edr-detection.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -57,25 +57,28 @@ Run an EDR detection test to verify that the device is properly onboarded and re
5757

5858

5959
```bash
60-
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
60+
curl -o ~/Downloads/MDE Linux DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
6161
```
6262

63-
1. Extract the zip
63+
2. Extract the zip
6464

6565
```bash
6666
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
6767
```
6868

69-
1. And run the following command:
69+
3. And run the following command to give the script executable permission:
7070

7171
```bash
72-
./mde_linux_edr_diy.sh
72+
chmod +x ./mde_linux_edr_diy.sh
7373
```
7474

75-
After a few minutes, a detection should be raised in Microsoft Defender XDR.
76-
77-
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
75+
4. Run the following command to execute the script:
76+
```bash
77+
./mde_linux_edr_diy.sh
78+
```
7879

80+
5. After a few minutes, a detection should be raised in Microsoft Defender XDR. Look at the alert details, machine timeline, and perform your typical investigation steps.
81+
7982
### macOS
8083

8184
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.

defender-endpoint/indicator-file.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
88
ms.localizationpriority: medium
9-
ms.date: 08/26/2024
9+
ms.date: 09/03/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -63,7 +63,12 @@ Understand the following prerequisites before you create indicators for files:
6363

6464
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
6565

66-
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including `.exe` and `.dll` files. Coverage is extended over time.
66+
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web.
67+
68+
> [!NOTE]
69+
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
70+
71+
6772

6873
> [!IMPORTANT]
6974
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.

defender-endpoint/troubleshoot-collect-support-log.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: troubleshooting
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 08/13/2024
17+
ms.date: 09/03/2024
1818
---
1919

2020
# Collect support logs in Microsoft Defender for Endpoint using live response
@@ -51,9 +51,12 @@ This article provides instructions on how to run the tool via Live Response on W
5151

5252
:::image type="content" source="media/analyzer-file.png" alt-text="The choose file button-2" lightbox="media/analyzer-file.png":::
5353

54+
Repeat this step for the `MDEClientAnalyzerPreview.zip` file.
55+
5456
6. While still in the LiveResponse session, use the following commands to run the analyzer and collect the resulting file.
5557

5658
```console
59+
Putfile MDEClientAnalyzerPreview.zip
5760
Run MDELiveAnalyzer.ps1
5861
GetFile "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\MDECA\MDEClientAnalyzerResult.zip"
5962
```

defender-office-365/mdo-privacy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 08/22/2024
8+
ms.date: 09/03/2024
99
audience: ITPro
1010
ms.topic: conceptual
1111
ms.service: defender-office-365
@@ -42,7 +42,7 @@ All [reports in Defender for Office 365](reports-defender-for-office-365.md) are
4242
- All related data is securely stored in the organization's region.
4343
- Only authorized users in the organization can access the data.
4444

45-
Microsoft stores this data securely in Microsoft Entra and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/p/?linkid=827578). All service log data at rest is encrypted and hashed using ODL and CDP encryption (no clear text). Defender for Office 365 uses this data for the following features:
45+
Microsoft stores this data securely in Microsoft Entra and maintains it in accordance with Microsoft privacy practices and [Microsoft Trust Center policies](https://go.microsoft.com/fwlink/p/?linkid=827578). All service log data at rest is encrypted and hashed using Office Data Loader (ODL) and Common Data Platform (CDP) encryption (no clear text). Defender for Office 365 uses this data for the following features:
4646

4747
- Threat protection policies to set the appropriate level of protection for your organization.
4848
- Real-time reports to monitor Defender for Office 365 performance in your organization.

0 commit comments

Comments
 (0)