Skip to content

Commit 1f410d8

Browse files
authored
Merge pull request #1079 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/defender-docs (branch public)
2 parents 7dcdc0f + e826103 commit 1f410d8

File tree

4 files changed

+58
-31
lines changed

4 files changed

+58
-31
lines changed

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 07/25/2024
7+
ms.date: 07/30/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -80,7 +80,7 @@ You can add audit policies, and you can add Allow/Deny policies. It is recommend
8080
> If you only configure audit policies, the permissions are inherited from the default enforcement setting.
8181
8282
> [!NOTE]
83-
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to Deny, any allow policy results in blocking actions.
83+
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to `Deny`, and create an `Allow` policy to be applied specific devices, all devices are blocked except for any devices that are set in the `Allow` policy.
8484
8585
## Defining Settings with OMA-URI
8686

@@ -104,13 +104,13 @@ When you create policies with OMA-URI in Intune, create one XML file for each po
104104
In the **Add Row** pane, specify the following settings:
105105

106106
- In the **Name** field, type `Allow Read Activity`.
107-
- In the **OMA-URI** field, type `/Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`.
107+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`. (You could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[PolicyRule Id]`.)
108108
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
109109

110110
You can use parameters to set conditions for specific entries. Here's a [group example XML file for Allow Read access for each removable storage](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Intune%20OMA-URI/Allow%20Read.xml).
111111

112112
> [!NOTE]
113-
> Comments using XML comment notation <!-- COMMENT --> can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
113+
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
114114
115115
### Creating groups with OMA-URI
116116

@@ -121,7 +121,7 @@ When you create groups with OMA-URI in Intune, create one XML file for each grou
121121
In the **Add Row** pane, specify the following settings:
122122

123123
- In the **Name** field, type `Any Removable Storage Group`.
124-
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b**[GroupId]**%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**.)
124+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b[GroupId]%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**. Or, you could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[GroupId]`.)
125125
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
126126

127127
> [!NOTE]

defender-endpoint/mac-support-perf.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/29/2024
17+
ms.date: 08/05/2024
1818
---
1919

2020
# Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
@@ -85,7 +85,7 @@ To troubleshoot and mitigate performance issues, follow these steps:
8585
4. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on macOS. Run the following command to enable it:
8686

8787
```bash
88-
mdatp config real-time-protection-statistics --value enabled.
88+
mdatp config real-time-protection-statistics --value enabled
8989
```
9090

9191
> [!TIP]

defender-endpoint/manage-security-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: how-to
1414
search.appverid: met150
15-
ms.date: 06/25/2024
15+
ms.date: 08/05/2024
1616
---
1717

1818
# Manage endpoint security policies in Microsoft Defender for Endpoint
@@ -34,7 +34,7 @@ Use security policies to manage security settings on devices. As a Security Admi
3434
You'll find endpoint security policies under **Endpoints** > **Configuration management** > **Endpoint security policies**.
3535

3636
> [!NOTE]
37-
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
37+
> The **Endpoint Security Policies** page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is available only for users who have access to all devices and possess `Core security settings (manage)` permissions. Any user role without these permissions, such as `Security Reader`, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
3838
3939
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal":::
4040

defender-endpoint/mde-plugin-wsl.md

Lines changed: 49 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 08/01/2024
18+
ms.date: 08/05/2024
1919
search.appverid: MET150
2020
---
2121

@@ -33,33 +33,33 @@ Windows Subsystem for Linux (WSL) 2, which replaces the previous version of WSL
3333

3434
## Known issues and limitations
3535

36-
Be aware of the following before you start:
36+
Be aware of the following considerations before you start:
3737

38-
1. The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later; updates are supported through Windows Update across all rings. Updates through Windows Server Update services (WSUS), System Center Configuration Manager (SCCM) and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
38+
1. The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later, updates are supported through Windows Update across all rings. Updates through Windows Server Update services (WSUS), System Center Configuration Manager (SCCM) and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
3939

4040
2. It takes a few minutes for the plug-in to fully instantiate, and up to 30 minutes for a WSL2 instance to onboard itself. Short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Once any distribution has been running long enough (at least 30 minutes), it does show up.
4141

4242
3. Running a custom kernel and custom kernel command line is not supported. Although the plug-in does not block running in that configuration, it does not guarantee visibility within WSL when you're running a custom kernel and custom kernel command line. We recommend to block such configurations with help of [Microsoft Intune wsl settings](/windows/wsl/intune).
4343

44-
4. OS Distribution is displayed **None** in Device overview page of WSL device in Microsoft Defender portal.
44+
4. OS Distribution is displayed **None** in the **Device overview** page of a WSL device in the Microsoft Defender portal.
4545

4646
5. The plug-in is not supported on machines with ARM64 processor.
4747

48-
6. The plug-in provides visibility into events from WSL but other features like antimalware, threat and vulnerability management and response commands are not available for the WSL logical device.
48+
6. The plug-in provides visibility into events from WSL, but other features like antimalware, threat and vulnerability management, and response commands are not available for the WSL logical device.
4949

5050
## Software prerequisites
5151

5252
- WSL version 2.0.7.0 or later must be running with at least one active distro.
5353

54-
Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than 2.0.7.0, run `wsl -–update –pre-release` to get the latest update.
54+
Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than `2.0.7.0`, run `wsl -–update –pre-release` to get the latest update.
5555

5656
- The Windows client device must be onboarded to Defender for Endpoint.
5757

5858
- The Windows client device must be running Windows 10, version 2004 and later (build 19044 and later), or Windows 11 to support the WSL versions that can work with the plug-in.
5959

6060
## Software components and installer file names
6161

62-
Installer: `DefenderPlugin-x64-0.24.426.1.msi`. You can download it from the onboarding page in the [Microsoft Defender portal](https://security.microsoft.com).
62+
Installer: `DefenderPlugin-x64-0.24.426.1.msi`. You can download it from the onboarding page in the [Microsoft Defender portal](https://security.microsoft.com). (Go to **Settings** > **Endpoints** > **Onboarding**.)
6363

6464
Installation directories:
6565

@@ -69,9 +69,9 @@ Installation directories:
6969

7070
Components installed:
7171

72-
- `DefenderforEndpointPlug-in.dll`. This DLL is the library to load Defender for Endpoint to work within WSL. You can find it at **%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\plug-in**.
72+
- `DefenderforEndpointPlug-in.dll`. This DLL is the library to load Defender for Endpoint to work within WSL. You can find it at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\plug-in`.
7373

74-
- `healthcheck.exe`. This program checks the health status of Defender for Endpoint and enables you to see the installed versions of WSL, plug-in, and Defender for Endpoint. You can find it at **%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools**.
74+
- `healthcheck.exe`. This program checks the health status of Defender for Endpoint and enables you to see the installed versions of WSL, plug-in, and Defender for Endpoint. You can find it at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools`.
7575

7676
## Installation steps
7777

@@ -125,6 +125,9 @@ If you want to use the host [winhttp proxy](configure-proxy-internet.md#configur
125125

126126
If you want to use the host [network and network proxy setting](https://support.microsoft.com/windows/use-a-proxy-server-in-windows-03096c53-0554-4ffe-b6ab-8b1deee8dae1#ID0EFD=Windows_11&preserve-view=true) for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
127127

128+
> [!NOTE]
129+
> WSL defender supports only `http` proxy.
130+
128131
## Plug-in Proxy selection
129132

130133
If your host machine contains multiple proxy settings, the plug-in selects the proxy configurations with the following hierarchy:
@@ -135,10 +138,10 @@ If your host machine contains multiple proxy settings, the plug-in selects the p
135138

136139
3. Network & Internet proxy settings.
137140

138-
Example: If your host machine has both *Winhttp proxy* and *Network & Internet proxy*, the plug-in selects `Winhttp proxy` as the proxy configuration.
141+
For example, if your host machine has both `Winhttp proxy` and `Network & Internet proxy`, the plug-in selects `Winhttp proxy` as the proxy configuration.
139142

140143
> [!NOTE]
141-
> The `DefenderProxyServer` registry key is no longer supported. Follow the above mentioned steps to configure proxy in plug-in.
144+
> The `DefenderProxyServer` registry key is no longer supported. Follow the steps described earlier in this article to configure proxy in plug-in.
142145
143146
## Connectivity test for Defender running in WSL
144147

@@ -159,7 +162,7 @@ The following procedure describes how to confirm that Defender in Endpoint in WS
159162

160163
2. Run the command `wsl`.
161164

162-
4. Wait for 5 minutes and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
165+
4. Wait for five minutes, and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test).
163166

164167
If successful, you can see that the connectivity test was successful. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from WSL to Defender for Endpoint service URLs is failing.
165168

@@ -199,7 +202,7 @@ To test the plug-in after installation, follow these steps:
199202
An alert should appear in the portal after a few minutes for a detection on the WSL2 instance.
200203

201204
> [!NOTE]
202-
> It takes about 5 minutes for the events to appear on the Microsoft Defender portal.
205+
> It takes about five minutes for the events to appear on the Microsoft Defender portal.
203206
204207
Treat the machine as if it were a regular Linux host in your environment to perform testing against. In particular, we would like to get your feedback on the ability to surface potentially malicious behavior using the new plug-in.
205208

@@ -243,21 +246,21 @@ DeviceProcessEvents
243246

244247
## Troubleshooting
245248

246-
1. The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in 5 minutes."
249+
1. The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in five minutes."
247250

248251
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check.png" alt-text="Screenshot showing PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check.png":::
249252

250253
2. If the previously mentioned error occurs, take the following steps:
251254

252255
1. Open a terminal instance and run the command `wsl`.
253256

254-
2. Wait for at least 5 minutes before rerunning the health check.
257+
2. Wait for at least five minutes before rerunning the health check.
255258

256-
3. The `healthcheck.exe` command might show the output, "Waiting for Telemetry. Please retry in 5 minutes."
259+
3. The `healthcheck.exe` command might show the output, "Waiting for Telemetry. Please retry in five minutes."
257260

258261
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-telemetry.png" alt-text="Screenshot showing health telemetry status." lightbox="media/mdeplugin-wsl/wsl-health-check-telemetry.png":::
259262

260-
If that error occurs, wait for 5 minutes and rerun `healthcheck.exe`.
263+
If that error occurs, wait for five minutes and rerun `healthcheck.exe`.
261264

262265
4. If you don't see any devices in the Microsoft Defender portal, or you don't see any events in the timeline, check the following things:
263266

@@ -293,9 +296,33 @@ DeviceProcessEvents
293296
dnsProxy=false
294297
```
295298

296-
- If the connectivity issues persist, collect the networking logs using the method mentioned at [link](https://aka.ms/wsllogs), and include those logs with your support bundle.
299+
- If the connectivity issues persist, run the following steps to collect the networking logs
300+
301+
1. Open an elevated(admin) PowerShell prompt
302+
303+
2. Download and Run: `.\collect-networking-logs.ps1`
304+
305+
```powershell
306+
Invoke-WebRequest -UseBasicParsing "https://raw.githubusercontent.com/microsoft/WSL/master/diagnostics/collect-networking-logs.ps1" -OutFile collect-networking-logs.ps1
307+
Set-ExecutionPolicy Bypass -Scope Process -Force
308+
.\collect-networking-logs.ps1
309+
```
310+
311+
3. Open a new command prompt and run: `wsl`
312+
313+
4. Open an elevated(admin) command prompt and run: `wsl --debug-shell`
314+
315+
5. In debug shell, run: `mdatp connectivity test`
316+
317+
6. Allow the connectivity test to be completed
318+
319+
7. Stop the .ps1 ran in step #2
320+
321+
8. Share the generated .zip file along with support bundle that can be collected as mentioned in [steps](#support-bundle-collection).
322+
323+
### Support bundle collection
297324

298-
5. If you run into any other challenges or issues, open Terminal, and run the following commands to generate a support bundle:
325+
1. If you run into any other challenges or issues, open Terminal, and run the following commands to generate a support bundle:
299326

300327
```powershell
301328
cd "%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools"
@@ -309,7 +336,7 @@ DeviceProcessEvents
309336

310337
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-overview.png" alt-text="Screenshot showing status in PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check-overview.png":::
311338

312-
6. Microsoft Defender Endpoint for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
339+
2. Microsoft Defender Endpoint for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
313340

314341
1. Go to your [Microsoft Intune admin center](https://intune.microsoft.com).
315342

@@ -333,14 +360,14 @@ DeviceProcessEvents
333360
wsl --set-default-version 2
334361
```
335362

336-
7. The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set `OverrideReleaseRing` to one of the following under registry and restart WSL:
363+
3. The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set `OverrideReleaseRing` to one of the following under registry and restart WSL:
337364

338365
- **Name**: `OverrideReleaseRing`
339366
- **Type**: `REG_SZ`
340367
- **Value**: `Dogfood or External or InsiderFast or Production`
341368
- **Path**: `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Defender for Endpoint plug-in for WSL`
342369

343-
8. If you see an error on launching WSL, such as "A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND", it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
370+
4. If you see an error on launching WSL, such as "A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND", it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
344371

345372
1. In Control Panel, go to **Programs** > **Programs and Features**.
346373

0 commit comments

Comments
 (0)