Skip to content

Commit 170ee90

Browse files
authored
Merge branch 'main' into patch-10
2 parents 4b13e8d + f5e9572 commit 170ee90

File tree

3 files changed

+111
-34
lines changed

3 files changed

+111
-34
lines changed

defender-endpoint/linux-whatsnew.md

Lines changed: 30 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: What's new in Microsoft Defender for Endpoint on Linux
33
description: List of major changes for Microsoft Defender for Endpoint on Linux.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr
88
ms.localizationpriority: medium
9-
ms.date: 02/20/2025
9+
ms.date: 03/11/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,6 +43,26 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### Mar-2025 Build: 101.25012.0000 | Release version: 30.125012.0000.0
47+
48+
| Build: | **101.25012.0000** |
49+
| -------- | -------- |
50+
|Released:|March 11, 2025|
51+
|Released:| **March 11, 2025**|
52+
| Released: |**March 11, 2025** |
53+
| Published: | **March 11, 2025** |
54+
| Release version: | **30.125012.0000.0** |
55+
| Engine version: | **1.1.24090.13** |
56+
| Signature version: | **1.421.226.0** |
57+
58+
What's new
59+
60+
- The MDATP package rollout into production will be done gradually. From the time the release notes are published, it might take up to a week for the package to be pushed to all production machines.
61+
62+
- The vulnerability in curl, CVE-2024-7264, has been addressed.
63+
64+
- Other stability improvements and bug fixes.
65+
4666
### Feb-2025 Build: 101.24122.0008 | Release version: 30.124112.0008.0
4767

4868
| Build: | **101.24122.0008** |
@@ -96,10 +116,10 @@ What's new
96116
- Enabled: When eBPF is enabled as working as expected.
97117
- Disabled: When eBPF is disabled due to one of the following reasons:
98118
- When MDE is using auditD as a supplementary sensor
99-
- When eBPF is not present and we fallback to Netlink as supplementary event provider
100-
- There is no supplementary sensor present.
119+
- When eBPF isn't present and we fallback to Netlink as supplementary event provider
120+
- There's no supplementary sensor present.
101121

102-
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast and insiderSlow, are unaffected by this change.
122+
- Beginning with 2411, the MDATP package release to Production on `packages.microsoft.com` follows a gradual rollout mechanism which spans over a week. The other release rings, insiderFast, and insiderSlow, are unaffected by this change.
103123

104124
- Stability and performance improvements.
105125

@@ -211,7 +231,7 @@ There are multiple fixes and new changes in this release.
211231

212232
There are multiple fixes and new changes in this release.
213233

214-
- This release fixes a bug related to high memory usage eventually leading to high CPU due to eBPF memory leak in kernel space resulting in servers going into unusable states. This only impacted the kernel versions 3.10x and <= 4.16x, majorly on RHEL/CentOS distros. Update to the latest MDE version to avoid any impact.
234+
- This release fixes a bug related to high memory usage eventually leading to high CPU due to eBPF memory leak in kernel space resulting in servers going into unusable states. This only affected the kernel versions 3.10x and <= 4.16x, majorly on RHEL/CentOS distros. Update to the latest MDE version to avoid any impact.
215235

216236
- We have now simplified the output of `mdatp health --detail features`
217237

@@ -1040,7 +1060,7 @@ sudo systemctl disable mdatp
10401060

10411061
#### Known issues
10421062

1043-
- While upgrading mdatp to version `101.94.13`, you might notice that health is false, with health_issues as "no active supplementary event provider". This can happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines need to be fixed. The following steps can help you to identify such auditd rules (these commands need to be run as super user). Take a backup of following file: `/etc/audit/rules.d/audit.rules` as these steps are only to identify failures.
1063+
- While upgrading mdatp to version `101.94.13`, you might notice that health is false, with health_issues as "no active supplementary event provider. This can happen due to misconfigured/conflicting auditd rules on existing machines. To mitigate the issue, the auditd rules on the existing machines need to be fixed. The following steps can help you to identify such auditd rules (these commands need to be run as super user). Take a backup of following file: `/etc/audit/rules.d/audit.rules` as these steps are only to identify failures.
10441064

10451065
```bash
10461066
echo -c >> /etc/audit/rules.d/audit.rules
@@ -1333,7 +1353,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
13331353

13341354
##### What's new
13351355

1336-
- Added a capability to detect vulnerable log4j jars in use by Java applications. The machine is periodically inspected for running Java processes with loaded log4j jars. The information is reported to the Microsoft Defender for Endpoint backend and is exposed in the Vulnerability Management area of the portal.
1356+
- Added a capability to detect vulnerable Log4j jars in use by Java applications. The machine is periodically inspected for running Java processes with loaded Log4j jars. The information is reported to the Microsoft Defender for Endpoint backend and is exposed in the Vulnerability Management area of the portal.
13371357

13381358
#### Build: 101.47.76 | Release version: 30.121092.14776.0
13391359

@@ -1343,7 +1363,7 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
13431363

13441364
##### What's new
13451365

1346-
- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through mdatp config scan-archives --value [enabled/disabled]. By default, this setting is set to enabled.
1366+
- Added a new switch to the command-line tool to control whether archives are scanned during on-demand scans. This can be configured through mdatp config scan-archives--value [enabled/disabled]. By default, this setting is set to enabled.
13471367

13481368
- Bug fixes
13491369

defender-endpoint/migrate-devices-streamlined.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Migrate devices to use the streamlined onboarding method
33
description: Learn how to migrate devices to Defender for Endpoint using the streamlined connectivity method.
44
search.appverid: met150
55
ms.service: defender-endpoint
6-
ms.author: deniseb
7-
author: denisebmsft
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier1
1414
ms.topic: how-to
1515
ms.subservice: onboard
16-
ms.date: 03/06/2025
16+
ms.date: 03/11/2025
1717
---
1818

1919
# Migrate devices to use the streamlined connectivity method
@@ -31,9 +31,9 @@ This article describes how to migrate (reonboard) devices that had been previous
3131
In most cases, full device offboarding isn't required when reonboarding. You can run the updated onboarding package and reboot your device to switch connectivity over. See the following information for details on individual operating systems.
3232

3333
> [!IMPORTANT]
34-
> Limitations and known issues:- For device migrations (reonboarding): Offboarding is not required to switch over to streamlined connectivity method. Once the updated onboarding package is run, a full device reboot is required for Windows devices and a service restart for macOS and Linux. For more information, see the details included in this article.
35-
- Windows 10 versions 1607, 1703, 1709, and 1803 do not support reonboarding. Offboard first and then onboard using the updated package. These versions also require a longer URL list.
36-
- Devices running the MMA agent are not supported and must continue using the MMA onboarding method.
34+
> Limitations and known issues:- For device migrations (reonboarding): Offboarding isn't required to switch over to streamlined connectivity method. Once the updated onboarding package is run, a full device reboot is required for Windows devices and a service restart for macOS and Linux. For more information, see the details included in this article.
35+
- Windows 10 versions 1607, 1703, 1709, and 1803 don't support reonboarding. Offboard first and then onboard using the updated package. These versions also require a longer URL list.
36+
- Devices running the MMA agent aren't supported and must continue using the MMA onboarding method.
3737

3838

3939
## Migrating devices using the streamlined method
@@ -66,7 +66,7 @@ The following table lists migration instructions for the available onboarding to
6666
### Windows 10 and 11
6767

6868
> [!IMPORTANT]
69-
> Windows 10 version 1607, 1703, 1709, and 1803 do not support reonboarding. To migrate existing devices, you will need to fully offboard and onboard using the streamlined onboarding package.
69+
> Windows 10 versions 1607, 1703, 1709, and 1803 don't support reonboarding. To migrate existing devices, you need to fully offboard and onboard using the streamlined onboarding package.
7070
7171
For general information on onboarding Windows client devices, see [Onboarding Windows Client](onboard-windows-client.md).
7272

@@ -220,7 +220,7 @@ Once a device is migrated to use the streamlined method and the device establish
220220

221221
If you move the device back to the regular method, the value is "standard".
222222

223-
For devices that haven't yet attempted reonboard, the value remains blank.
223+
For devices that have not attempted to reonboard, the value remains empty.
224224

225225
### Tracking locally on a device through Windows Event Viewer
226226

@@ -252,7 +252,7 @@ Open the Defender for Endpoint service event log using the following steps:
252252

253253
> [!NOTE]
254254
> SENSE is the internal name used to refer to the behavioral sensor that powers Microsoft Defender for Endpoint. <br>
255-
> Events recorded by the service will appear in the log. <br>
255+
> Events recorded by the service appear in the log. <br>
256256
> For more information, see [Review events and error using Event Viewer](event-error-codes.md).
257257
258258
### Run tests to confirm connectivity with Defender for Endpoint services
@@ -286,7 +286,7 @@ For Auto-IR testing labs, navigate to **Microsoft Defender XDR** \> **Evaluation
286286
```
287287

288288
> [!NOTE]
289-
> This command will only work on Windows 10, version 1703 or higher, or Windows 11.
289+
> This command only works on Windows 10, version 1703 or higher, or Windows 11.
290290
> For more information, see [Manage Microsoft Defender Antivirus with the mpcmdrun.exe commandline tool](command-line-arguments-microsoft-defender-antivirus.md).
291291
292292
#### Test Block at First Sight
@@ -319,9 +319,7 @@ For macOS and Linux, you can use the following methods:
319319

320320
### MDATP connectivity test (macOS and Linux)
321321

322-
Run `mdatp health -details features` to confirm simplified_connectivity: "enabled".
323-
324-
Run `mdatp health -details edr` to confirm `edr_partner_geo_location` is available. The value should be `GW_<geo>` where 'geo' is your tenant's geo-location.
322+
Run `mdatp health --details edr` to confirm `edr_partner_geo_location` is available. The value should be `GW_<geo>` where 'geo' is your tenant's geo-location.
325323

326324
Run mdatp connectivity test. Ensure the streamlined URL pattern is present. You should expect two for '\storage', one for '\mdav', one for '\xplat', and one for '/packages'.
327325

defender-endpoint/troubleshoot-asr.md

Lines changed: 70 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,9 @@ description: Resources and sample code to troubleshoot issues with attack surfac
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
66
audience: ITPro
7-
author: denisebmsft
8-
ms.author: deniseb
9-
ms.date: 02/24/2025
7+
author: emmwalshh
8+
ms.author: ewalsh
9+
ms.date: 03/11/2025
1010
ms.reviewer:
1111
manager: deniseb
1212
ms.custom: asr
@@ -28,17 +28,21 @@ search.appverid: met150
2828
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
2929
- [Microsoft Defender XDR](/defender-xdr)
3030

31+
The first and most immediate way is to check locally, on a Windows device, which attack surface reduction rules are enabled (and their configuration) is by using the PowerShell cmdlets.
32+
33+
Here are a few other sources of information that Windows offers, to troubleshoot attack surface reduction rules' impact and operation.
34+
3135
When you use [attack surface reduction rules](attack-surface-reduction.md) you might run into issues, such as:
3236

3337
- A rule blocks a file, process, or performs some other action that it shouldn't (false positive); or
3438
- A rule doesn't work as described, or doesn't block a file or process that it should (false negative).
3539

3640
There are four steps to troubleshooting these problems:
3741

38-
1. [Confirm prerequisites](#confirm-prerequisites)
39-
2. [Use audit mode to test the rule](#use-audit-mode-to-test-the-rule)
40-
3. [Add exclusions for the specified rule](#add-exclusions-for-a-false-positive) (for false positives)
41-
4. [Submit support logs](#collect-diagnostic-data-for-file-submissions)
42+
1. [Confirm prerequisites](#confirm-prerequisites).
43+
2. [Use audit mode to test the rule](#use-audit-mode-to-test-the-rule).
44+
3. [Add exclusions for the specified rule](#add-exclusions-for-a-false-positive) (for false positives).
45+
4. [Collect and submit support logs](#collect-microsoft-defender-anti-malware-protection-diagnostic-data-for-file-submissions).
4246

4347
## Confirm prerequisites
4448

@@ -59,6 +63,36 @@ When setting up the attack surface reduction rules by using Group Policy, here a
5963

6064
2. Make sure that there are **no spaces** at the beginning or at the end when adding the GUID for attack surface reduction rules.
6165

66+
### Querying which rules are active
67+
68+
One of the easiest ways to determine if attack surface reduction rules are already enabled is through a PowerShell cmdlet, Get-MpPreference.
69+
70+
Here's an example:
71+
72+
:::image type="content" source="media/getmpreferencescriptnew.png" alt-text="Screenshot showing the get mppreference script." lightbox="media/getmpreferencescriptnew.png":::
73+
74+
There are multiple attack surface reduction rules active, with different configured actions.
75+
76+
To expand information on attack surface reduction rules, you can use the properties `AttackSurfaceReductionRules_Ids` and/or `AttackSurfaceReductionRules_Actions`.
77+
78+
Example:
79+
80+
```powershell
81+
Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Ids
82+
```
83+
84+
:::image type="content" source="media/getmpref-examplenew.png" alt-text="Screenshot showing the get mpreference example." lightbox="media/getmpref-examplenew.png":::
85+
86+
The preceding image shows all the IDs for attack surface reduction rules that have a setting different from 0 (Not Configured).
87+
88+
The next step is then to list the actual actions (Block or Audit) that each rule is configured with.
89+
90+
```powershell
91+
Get-MPPreference | Select-Object -ExpandProperty AttackSurfaceReductionRules_Actions
92+
```
93+
94+
:::image type="content" source="media/getmpref-example2new.png" alt-text="Screenshot that shows the get mppreference example2." lightbox="media/getmpref-example2new.png":::
95+
6296
## Use audit mode to test the rule
6397

6498
Follow these instructions in [Use the demo tool to see how attack surface reduction rules work](attack-surface-reduction-rules-deployment-test.md) to test the specific rule you're encountering problems with.
@@ -71,10 +105,18 @@ Follow these instructions in [Use the demo tool to see how attack surface reduct
71105

72106
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
73107

74-
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
108+
If you tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
75109

76110
- If the attack surface reduction rule is blocking something that it shouldn't block (also known as a false positive), you can [first add an attack surface reduction rule exclusion](#add-exclusions-for-a-false-positive).
77-
- If the attack surface reduction rule isn't blocking something that it should block (also known as a false negative), you can proceed immediately to the last step, [collecting diagnostic data and submitting the issue to us](#collect-diagnostic-data-for-file-submissions).
111+
- If the attack surface reduction rule isn't blocking something that it should block (also known as a false negative), you can proceed immediately to the last step, [collecting diagnostic data and submitting the issue to us](#collect-microsoft-defender-anti-malware-protection-diagnostic-data-for-file-submissions).
112+
113+
### Querying blocking and auditing events
114+
115+
Attack surface reduction rule events can be viewed within the Windows Defender log.
116+
117+
To access it, open Windows Event Viewer, and browse to **Applications and Services Logs** \> **Microsoft** \> **Windows** \> **Windows Defender** \> **Operational**.
118+
119+
:::image type="content" source="media/eventviewerscrnew.png" alt-text="Screenshot that shows the Event Viewer page." lightbox="media/eventviewerscrnew.png":::
78120

79121
## Add exclusions for a false positive
80122

@@ -84,13 +126,13 @@ To add an exclusion, see [Customize attack surface reduction](attack-surface-red
84126

85127
> [!IMPORTANT]
86128
> You can specify individual files and folders to be excluded, but you can't specify individual rules.
87-
> This means any files or folders that are excluded are excluded from all ASR rules.
129+
> This means any files or folders that are excluded from all ASR rules.
88130
89131
## Report a false positive or false negative
90132

91133
Use the [Microsoft Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/support/report-exploit-guard) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
92134

93-
## Collect diagnostic data for file submissions
135+
## Collect Microsoft Defender Anti-malware Protection diagnostic data for file submissions
94136

95137
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
96138

@@ -108,6 +150,23 @@ When you report a problem with attack surface reduction rules, you're asked to c
108150

109151
3. By default, they're saved to `C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab`. Attach the file to the submission form.
110152

153+
154+
You can also view rule events through the Microsoft Defender Antivirus dedicated command-line tool, called `*mpcmdrun.exe*`, that can be used to manage and configure, and automate tasks if needed.
155+
156+
You can find this utility in *%ProgramFiles%\Windows Defender\MpCmdRun.exe*. You must run it from an elevated command prompt (that is, run as Admin).
157+
158+
To generate the support information, type `MpCmdRun.exe -getfiles`. After a while, several logs will be packaged into an archive (MpSupportFiles.cab) and made available at `C:\ProgramData\Microsoft\Windows Defender\Support`.
159+
160+
:::image type="content" source="media/malware-prot-logsnew.png" alt-text="Screenshot that shows the malware protection logs." lightbox="media/malware-prot-logsnew.png":::
161+
162+
Extract that archive and you have many files available for troubleshooting purposes.
163+
164+
The most relevant files are as follows:
165+
166+
- `MPOperationalEvents.txt`: This file contains same level of information found in Event Viewer for Windows Defender's Operational log.
167+
- `MPRegistry.txt`: In this file you can analyze all the current Windows Defender configurations, from the moment, the support logs were captured.
168+
- `MPLog.txt`: This log contains more verbose information about all the actions/operations of the Windows Defender.
169+
111170
## Related articles
112171

113172
- [Attack surface reduction rules](attack-surface-reduction.md)

0 commit comments

Comments
 (0)