You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/StaleBranch.yml
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,7 @@ name: (Scheduled) Stale branch removal
2
2
3
3
permissions:
4
4
contents: write
5
+
pull-requests: read
5
6
6
7
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
7
8
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/azip-integration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,7 +144,7 @@ Follow these instructions to create the file policy:
144
144
145
145
1. You can get more information about these files and their sensitivity labels in the file drawer. Just select the relevant file in the **Files** page and check whether it has a sensitivity label.
146
146
147
-

147
+
:::image type="content" source="media/file-policies/file-drawer.png" alt-text="Screenshot showing the file drawer." lightbox="media/file-policies/file-drawer.png":::
148
148
149
149
1. Then, you can create file policies in Defender for Cloud Apps to control files that are shared inappropriately and find files that are labeled and were recently modified.
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 04/04/2025
18
+
ms.date: 04/30/2025
19
19
search.appverid: met150
20
20
---
21
21
@@ -253,8 +253,8 @@ For rules with the "Rule State" specified:
253
253
254
254
> [!NOTE]
255
255
> To protect your environment from vulnerable drivers, you should first implement these:
256
-
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
257
-
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
256
+
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
257
+
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
258
258
> For Windows 11 or later, and Windows Server core 1809 or later, or Windows Server 2019 or later, you should also enable [Microsoft Windows vulnerable driver blocklist](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules),
259
259
> Then as another layer of defense, you should enable this attack surface reduction rule.
260
260
@@ -544,7 +544,9 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
544
544
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
545
545
546
546
> [!NOTE]
547
-
> If `CcmExec.exe` (SCCM Agent) is detected on the device, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
547
+
> If you're utilizing Configuration Manager (CM, previously known as MEMCM or SCCM) with CcmExec.exe` (SCCM Agent), we recommend running it in audit mode for at least 60 days.
548
+
> Once you're prepared to switch to block mode, ensure you deploy the appropriate ASR rules, considering any necessary rule exclusions.
549
+
548
550
549
551
Intune name: `Persistence through WMI event subscription`
Copy file name to clipboardExpand all lines: defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md
+15-22Lines changed: 15 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: Windows Server includes automatic exclusions, based on server role.
6
6
ms.service: defender-endpoint
7
7
ms.subservice: ngp
8
8
ms.localizationpriority: medium
9
-
ms.date: 03/28/2025
9
+
ms.date: 05/01/2025
10
10
author: emmwalshh
11
11
ms.author: ewalsh
12
12
ms.topic: conceptual
@@ -30,21 +30,17 @@ search.appverid: met150
30
30
31
31
- Windows Server
32
32
33
+
## Important notes about automatic exclusions on Windows Server
33
34
34
-
> [!IMPORTANT]
35
-
> ## Important notes about automatic exclusions on Windows Server
36
-
>
37
-
> -[Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
38
-
> - Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
39
-
> - Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
40
-
> - Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
41
-
> - Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
42
-
> - Appropriate exclusions must be set for software that isn't included with the operating system.
43
-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in and automatic exclusions.
35
+
-[Custom exclusions](configure-exclusions-microsoft-defender-antivirus.md) take precedence over automatic exclusions. When a custom exclusion is set for a path that also has a duplicate automatic or built-in exclusion, the custom exclusion will always apply.
36
+
- Automatic exclusions only apply to [real-time protection (RTP)](configure-protection-features-microsoft-defender-antivirus.md) scanning. Other scan activity, for example [Network Inspection](network-protection.md) and [Behavior Monitoring](behavior-monitor.md), will not be excluded. To exclude other scan types, please use custom exclusions.
37
+
- Automatic exclusions aren't honored during a [quick scan, full scan, and custom scan](schedule-antivirus-scans.md#comparing-the-quick-scan-full-scan-and-custom-scan). To exclude other scan types, please use custom exclusions.
38
+
- Built-in exclusions and automatic server role exclusions don't appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md).
39
+
- Microsoft Defender Antivirus uses the Deployment Image Servicing and Management (DISM) tools to determine which roles are installed on your computer.
40
+
- Appropriate exclusions must be set for software that isn't included with the operating system.
41
+
- The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes.
44
42
45
-
## Overview
46
-
47
-
This article describes types of exclusions that you don't have to define for Microsoft Defender Antivirus:
43
+
This article describes the two main types of exclusions that you don't have to define for Microsoft Defender Antivirus:
48
44
49
45
-[Automatic exclusions](#automatic-server-role-exclusions) for roles on Windows Server 2016 and later.
50
46
-[Built-in exclusions](#built-in-exclusions) for operating system files on all versions of Windows.
@@ -240,10 +236,9 @@ This section lists the folder exclusions that are delivered automatically when y
240
236
241
237
## Built-in exclusions
242
238
243
-
> [!NOTE]
244
-
> - Please see [Important Notes](#important-notes-about-automatic-exclusions-on-windows-server)
245
-
> - Default locations could be different than the locations that are described in this article.
246
-
> - The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
239
+
Make sure to review [Important notes about automatic exclusions](#important-notes-about-automatic-exclusions-on-windows-server) (in this article). Keep in mind that default locations could be different than the locations that are described in this article.
240
+
241
+
The list of built-in exclusions applied by Microsoft Defender Antivirus is kept up to date as the threat landscape changes. This article lists some, but not all, of the built-in exclusions.
247
242
248
243
Because Microsoft Defender Antivirus is built into Windows, it doesn't require exclusions for operating system files on any version of Windows.
249
244
@@ -396,9 +391,7 @@ If necessary, you can add or remove custom exclusions. To do that, see the follo
396
391
-[Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
397
392
-[Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)
398
393
-[Customize, initiate, and review the results of Microsoft Defender Antivirus scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)
399
-
-[Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
400
-
-[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
401
-
-[Configure Defender for Endpoint on Android features](android-configure.md)
402
-
-[Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
394
+
-[Onboard client devices running Windows or macOS to Microsoft Defender for Endpoint](onboard-client.md)
395
+
-[Onboard servers through Microsoft Defender for Endpoint's onboarding experience](onboard-server.md)
403
396
404
397
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
0 commit comments