You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-intune.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 07/25/2024
7
+
ms.date: 07/30/2024
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -80,7 +80,7 @@ You can add audit policies, and you can add Allow/Deny policies. It is recommend
80
80
> If you only configure audit policies, the permissions are inherited from the default enforcement setting.
81
81
82
82
> [!NOTE]
83
-
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to Deny, any allow policy results in blocking actions.
83
+
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to `Deny`, and create an `Allow`policy to be applied specific devices, all devices are blocked except for any devices that are set in the `Allow` policy.
84
84
85
85
## Defining Settings with OMA-URI
86
86
@@ -104,13 +104,13 @@ When you create policies with OMA-URI in Intune, create one XML file for each po
104
104
In the **Add Row** pane, specify the following settings:
105
105
106
106
- In the **Name** field, type `Allow Read Activity`.
107
-
- In the **OMA-URI** field, type `/Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`.
107
+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`. (You could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[PolicyRule Id]`.)
108
108
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
109
109
110
110
You can use parameters to set conditions for specific entries. Here's a [group example XML file for Allow Read access for each removable storage](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Intune%20OMA-URI/Allow%20Read.xml).
111
111
112
112
> [!NOTE]
113
-
> Comments using XML comment notation <!-- COMMENT --> can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
113
+
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
114
114
115
115
### Creating groups with OMA-URI
116
116
@@ -121,7 +121,7 @@ When you create groups with OMA-URI in Intune, create one XML file for each grou
121
121
In the **Add Row** pane, specify the following settings:
122
122
123
123
- In the **Name** field, type `Any Removable Storage Group`.
124
-
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b**[GroupId]**%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**.)
124
+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b[GroupId]%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**. Or, you could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[GroupId]`.)
125
125
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-support-perf.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: macos
16
16
search.appverid: met150
17
-
ms.date: 05/29/2024
17
+
ms.date: 08/05/2024
18
18
---
19
19
20
20
# Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
@@ -85,7 +85,7 @@ To troubleshoot and mitigate performance issues, follow these steps:
85
85
4. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on macOS. Run the following command to enable it:
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
37
+
> The **Endpoint Security Policies** page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is available only for users who have access to all devices and possess `Core security settings (manage)` permissions. Any user role without these permissions, such as `Security Reader`, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
38
38
39
39
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal":::
Copy file name to clipboardExpand all lines: defender-endpoint/mde-plugin-wsl.md
+49-22Lines changed: 49 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.custom:
16
16
- partner-contribution
17
17
audience: ITPro
18
-
ms.date: 08/01/2024
18
+
ms.date: 08/05/2024
19
19
search.appverid: MET150
20
20
---
21
21
@@ -33,33 +33,33 @@ Windows Subsystem for Linux (WSL) 2, which replaces the previous version of WSL
33
33
34
34
## Known issues and limitations
35
35
36
-
Be aware of the following before you start:
36
+
Be aware of the following considerations before you start:
37
37
38
-
1. The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later; updates are supported through Windows Update across all rings. Updates through Windows Server Update services (WSUS), System Center Configuration Manager (SCCM) and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
38
+
1. The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later, updates are supported through Windows Update across all rings. Updates through Windows Server Update services (WSUS), System Center Configuration Manager (SCCM) and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
39
39
40
40
2. It takes a few minutes for the plug-in to fully instantiate, and up to 30 minutes for a WSL2 instance to onboard itself. Short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Once any distribution has been running long enough (at least 30 minutes), it does show up.
41
41
42
42
3. Running a custom kernel and custom kernel command line is not supported. Although the plug-in does not block running in that configuration, it does not guarantee visibility within WSL when you're running a custom kernel and custom kernel command line. We recommend to block such configurations with help of [Microsoft Intune wsl settings](/windows/wsl/intune).
43
43
44
-
4. OS Distribution is displayed **None** in Device overview page of WSL device in Microsoft Defender portal.
44
+
4. OS Distribution is displayed **None** in the **Device overview** page of a WSL device in the Microsoft Defender portal.
45
45
46
46
5. The plug-in is not supported on machines with ARM64 processor.
47
47
48
-
6. The plug-in provides visibility into events from WSL but other features like antimalware, threat and vulnerability management and response commands are not available for the WSL logical device.
48
+
6. The plug-in provides visibility into events from WSL, but other features like antimalware, threat and vulnerability management, and response commands are not available for the WSL logical device.
49
49
50
50
## Software prerequisites
51
51
52
52
- WSL version 2.0.7.0 or later must be running with at least one active distro.
53
53
54
-
Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than 2.0.7.0, run `wsl -–update –pre-release` to get the latest update.
54
+
Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than `2.0.7.0`, run `wsl -–update –pre-release` to get the latest update.
55
55
56
56
- The Windows client device must be onboarded to Defender for Endpoint.
57
57
58
58
- The Windows client device must be running Windows 10, version 2004 and later (build 19044 and later), or Windows 11 to support the WSL versions that can work with the plug-in.
59
59
60
60
## Software components and installer file names
61
61
62
-
Installer: `DefenderPlugin-x64-0.24.426.1.msi`. You can download it from the onboarding page in the [Microsoft Defender portal](https://security.microsoft.com).
62
+
Installer: `DefenderPlugin-x64-0.24.426.1.msi`. You can download it from the onboarding page in the [Microsoft Defender portal](https://security.microsoft.com). (Go to **Settings** > **Endpoints** > **Onboarding**.)
63
63
64
64
Installation directories:
65
65
@@ -69,9 +69,9 @@ Installation directories:
69
69
70
70
Components installed:
71
71
72
-
-`DefenderforEndpointPlug-in.dll`. This DLL is the library to load Defender for Endpoint to work within WSL. You can find it at **%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\plug-in**.
72
+
-`DefenderforEndpointPlug-in.dll`. This DLL is the library to load Defender for Endpoint to work within WSL. You can find it at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\plug-in`.
73
73
74
-
-`healthcheck.exe`. This program checks the health status of Defender for Endpoint and enables you to see the installed versions of WSL, plug-in, and Defender for Endpoint. You can find it at **%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools**.
74
+
-`healthcheck.exe`. This program checks the health status of Defender for Endpoint and enables you to see the installed versions of WSL, plug-in, and Defender for Endpoint. You can find it at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools`.
75
75
76
76
## Installation steps
77
77
@@ -125,6 +125,9 @@ If you want to use the host [winhttp proxy](configure-proxy-internet.md#configur
125
125
126
126
If you want to use the host [network and network proxy setting](https://support.microsoft.com/windows/use-a-proxy-server-in-windows-03096c53-0554-4ffe-b6ab-8b1deee8dae1#ID0EFD=Windows_11&preserve-view=true) for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
127
127
128
+
> [!NOTE]
129
+
> WSL defender supports only `http` proxy.
130
+
128
131
## Plug-in Proxy selection
129
132
130
133
If your host machine contains multiple proxy settings, the plug-in selects the proxy configurations with the following hierarchy:
@@ -135,10 +138,10 @@ If your host machine contains multiple proxy settings, the plug-in selects the p
135
138
136
139
3. Network & Internet proxy settings.
137
140
138
-
Example: If your host machine has both *Winhttp proxy* and *Network & Internet proxy*, the plug-in selects `Winhttp proxy` as the proxy configuration.
141
+
For example, if your host machine has both `Winhttp proxy` and `Network & Internet proxy`, the plug-in selects `Winhttp proxy` as the proxy configuration.
139
142
140
143
> [!NOTE]
141
-
> The `DefenderProxyServer` registry key is no longer supported. Follow the above mentioned steps to configure proxy in plug-in.
144
+
> The `DefenderProxyServer` registry key is no longer supported. Follow the steps described earlier in this article to configure proxy in plug-in.
142
145
143
146
## Connectivity test for Defender running in WSL
144
147
@@ -159,7 +162,7 @@ The following procedure describes how to confirm that Defender in Endpoint in WS
159
162
160
163
2. Run the command `wsl`.
161
164
162
-
4. Wait for 5 minutes and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
165
+
4. Wait for five minutes, and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
163
166
164
167
If successful, you can see that the connectivity test was successful. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from WSL to Defender for Endpoint service URLs is failing.
165
168
@@ -199,7 +202,7 @@ To test the plug-in after installation, follow these steps:
199
202
An alert should appear in the portal after a few minutes for a detection on the WSL2 instance.
200
203
201
204
> [!NOTE]
202
-
> It takes about 5 minutes for the events to appear on the Microsoft Defender portal.
205
+
> It takes about five minutes for the events to appear on the Microsoft Defender portal.
203
206
204
207
Treat the machine as if it were a regular Linux host in your environment to perform testing against. In particular, we would like to get your feedback on the ability to surface potentially malicious behavior using the new plug-in.
205
208
@@ -243,21 +246,21 @@ DeviceProcessEvents
243
246
244
247
## Troubleshooting
245
248
246
-
1. The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in 5 minutes."
249
+
1. The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in five minutes."
2. If the previously mentioned error occurs, take the following steps:
251
254
252
255
1. Open a terminal instance and run the command `wsl`.
253
256
254
-
2. Wait for at least 5 minutes before rerunning the health check.
257
+
2. Wait for at least five minutes before rerunning the health check.
255
258
256
-
3. The `healthcheck.exe` command might show the output, "Waiting for Telemetry. Please retry in 5 minutes."
259
+
3. The `healthcheck.exe` command might show the output, "Waiting for Telemetry. Please retry in five minutes."
257
260
258
261
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-telemetry.png" alt-text="Screenshot showing health telemetry status." lightbox="media/mdeplugin-wsl/wsl-health-check-telemetry.png":::
259
262
260
-
If that error occurs, wait for 5 minutes and rerun `healthcheck.exe`.
263
+
If that error occurs, wait for five minutes and rerun `healthcheck.exe`.
261
264
262
265
4. If you don't see any devices in the Microsoft Defender portal, or you don't see any events in the timeline, check the following things:
263
266
@@ -293,9 +296,33 @@ DeviceProcessEvents
293
296
dnsProxy=false
294
297
```
295
298
296
-
- If the connectivity issues persist, collect the networking logs using the method mentioned at [link](https://aka.ms/wsllogs), and include those logs with your support bundle.
299
+
- If the connectivity issues persist, run the following steps to collect the networking logs
300
+
301
+
1. Open an elevated(admin) PowerShell prompt
302
+
303
+
2. Download and Run: `.\collect-networking-logs.ps1`
4. Open an elevated(admin) command prompt and run: `wsl --debug-shell`
314
+
315
+
5. In debug shell, run: `mdatp connectivity test`
316
+
317
+
6. Allow the connectivity test to be completed
318
+
319
+
7. Stop the .ps1 ran in step #2
320
+
321
+
8. Share the generated .zip file along with support bundle that can be collected as mentioned in [steps](#support-bundle-collection).
322
+
323
+
### Support bundle collection
297
324
298
-
5. If you run into any other challenges or issues, open Terminal, and run the following commands to generate a support bundle:
325
+
1. If you run into any other challenges or issues, open Terminal, and run the following commands to generate a support bundle:
299
326
300
327
```powershell
301
328
cd"%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools"
@@ -309,7 +336,7 @@ DeviceProcessEvents
309
336
310
337
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-overview.png" alt-text="Screenshot showing status in PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check-overview.png":::
311
338
312
-
6. Microsoft Defender Endpoint for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
339
+
2. Microsoft Defender Endpoint for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
313
340
314
341
1. Go to your [Microsoft Intune admin center](https://intune.microsoft.com).
315
342
@@ -333,14 +360,14 @@ DeviceProcessEvents
333
360
wsl --set-default-version 2
334
361
```
335
362
336
-
7. The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set`OverrideReleaseRing` to one of the following under registry and restart WSL:
363
+
3. The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set`OverrideReleaseRing` to one of the following under registry and restart WSL:
337
364
338
365
- **Name**: `OverrideReleaseRing`
339
366
- **Type**: `REG_SZ`
340
367
- **Value**: `Dogfood or External or InsiderFast or Production`
341
368
- **Path**: `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Defender for Endpoint plug-in for WSL`
342
369
343
-
8. If you see an error on launching WSL, such as "A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND", it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
370
+
4. If you see an error on launching WSL, such as "A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND", it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
344
371
345
372
1. In Control Panel, go to **Programs**>**Programs and Features**.
0 commit comments