Skip to content

Commit 1f6785f

Browse files
authored
Merge branch 'main' into gary-update-acrolinx
2 parents 573f064 + b7ea93e commit 1f6785f

15 files changed

+200
-119
lines changed

defender-endpoint/client-behavioral-blocking.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Antivirus protection works best when paired with cloud protection.
4646

4747
[Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) can detect suspicious behavior, malicious code, fileless and in-memory attacks, and more on a device. When suspicious behaviors are detected, Microsoft Defender Antivirus monitors and sends those suspicious behaviors and their process trees to the cloud protection service. Machine learning differentiates between malicious applications and good behaviors within milliseconds, and classifies each artifact. In almost real time, as soon as an artifact is found to be malicious, it's blocked on the device.
4848

49-
Whenever a suspicious behavior is detected, an [alert](alerts-queue.md) is generated and is visible while the attack was detected and stopped; alerts, such as an "initial access alert," are triggered and appear in the [Microsoft Defender portal](/defender-xdr/microsoft-365-defender) (formerly Microsoft Defender XDR).
49+
Whenever a suspicious behavior is detected, an [alert](alerts-queue.md) is generated and is visible while the attack was detected and stopped; alerts, such as an "initial access alert," are triggered and appear in the [Microsoft Defender portal](/defender-xdr/microsoft-365-defender).
5050

5151
Client behavioral blocking is effective because it not only helps prevent an attack from starting, it can help stop an attack that has begun executing. And, with [feedback-loop blocking](feedback-loop-blocking.md) (another capability of behavioral blocking and containment), attacks are prevented on other devices in your organization.
5252

defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md

Lines changed: 38 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
author: denisebmsft
66
ms.author: deniseb
77
ms.localizationpriority: medium
8-
ms.date: 02/18/2024
8+
ms.date: 10/25/2024
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -19,31 +19,23 @@ search.appverid: met150
1919

2020
# Contextual file and folder exclusions
2121

22-
**Applies to:**
23-
24-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26-
27-
- Microsoft Defender for Business
28-
29-
- Microsoft Defender Antivirus
30-
31-
- Microsoft Defender for individuals
32-
3322
This article/section describes the contextual file and folder exclusions capability for Microsoft Defender Antivirus on Windows. This capability allows you to be more specific when you define under which context Microsoft Defender Antivirus shouldn't scan a file or folder, by applying restrictions.
3423

3524
## Overview
3625

37-
Exclusions are primarily intended to mitigate affects on performance. They come at the penalty of reduced protection value. These restrictions allow you to limit this protection reduction by specifying circumstances under which the exclusion should apply. Contextual exclusions aren't suitable for addressing false positives in a reliable way. If you encounter a false positive, you can submit files for analysis through the [Microsoft Defender XDR](https://security.microsoft.com/) portal (subscription required) or through the [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/filesubmission) website. For a temporary suppression method, consider creating a custom _allow_ indicator in [Microsoft Defender for Endpoint](indicator-file.md).
26+
Exclusions are primarily intended to mitigate affects on performance. They come at the penalty of reduced protection value. These restrictions allow you to limit this protection reduction by specifying circumstances under which the exclusion should apply. Contextual exclusions aren't suitable for addressing false positives in a reliable way. If you encounter a false positive, you can submit files for analysis through the [Microsoft Defender portal](https://security.microsoft.com/) (subscription required) or through the [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/filesubmission) website. For a temporary suppression method, consider creating a custom _allow_ indicator in [Microsoft Defender for Endpoint](indicator-file.md).
3827

3928
There are four restrictions you can apply to limit the applicability of an exclusion:
4029

41-
- **File/folder path type restriction**. You can restrict exclusions to only apply if the target is a file, or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, it will not apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion will apply.
30+
- **File/folder path type restriction**. You can restrict exclusions to only apply if the target is a file, or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, the exclusion doesn't apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion applies.
31+
4232
- **Scan type restriction**. Enables you to define the required scan type for an exclusion to apply. For example, you only want to exclude a certain folder from Full scans but not from a "resource" scan (targeted scan).
43-
- **Scan trigger type restriction**. You can use this restriction to specify that the exclusion should only apply when the scan was initiated by a specific event:
44-
- on demand
45-
- on access
46-
- or originating from behavioral monitoring
33+
34+
- **Scan trigger type restriction**. You can use this restriction to specify that the exclusion should only apply when the scan is initiated by a specific event, such as:
35+
- on demand;
36+
- on access; or
37+
- originating from behavioral monitoring.
38+
4739
- **Process restriction**. Enables you to define that an exclusion should only apply when a file or folder is being accessed by a specific process.
4840

4941
## Configuring restrictions
@@ -52,21 +44,23 @@ Restrictions are typically applied by adding the restriction type to the file or
5244

5345
| Restriction | TypeName | value |
5446
|:---|:---|:---|
55-
| File/folder | PathType | file <br> folder |
56-
| Scan type | ScanType | quick <br> full |
57-
| Scan trigger | ScanTrigger | OnDemand <br> OnAccess <br> BM |
58-
| Process | Process | "<image_path>" |
47+
| File/folder | `PathType` | `file` <br/> `folder` |
48+
| Scan type | `ScanType` | `quick` <br/> `full` |
49+
| Scan trigger | `ScanTrigger` | `OnDemand` <br/> `OnAccess` <br/> Behavior monitoring |
50+
| Process | `Process` | `<path>` |
5951

6052
### Requirements
6153

62-
This capability requires Microsoft Defender Antivirus:
54+
This capability requires Microsoft Defender Antivirus.
55+
56+
- Platform version: **4.18.2205.7** or later
57+
- Engine version: **1.1.19300.2** or later
6358

64-
- Platform: **4.18.2205.7** or later
65-
- Engine: **1.1.19300.2** or later
59+
See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
6660

6761
### Syntax
6862

69-
As a starting point, you may already have exclusions in place that you wish to make more specific. To form the exclusion string, first define the path to the file or folder to be excluded, then add the type name and associated value, as shown in the following example.
63+
As a starting point, you might already have exclusions in place that you wish to make more specific. To form the exclusion string, first define the path to the file or folder to be excluded, then add the type name and associated value, as shown in the following example.
7064

7165
`<PATH>\:{TypeName:value,TypeName:value}`
7266

@@ -75,28 +69,27 @@ Keep in mind that _all_ **types** and **values** are case sensitive.
7569
> [!NOTE]
7670
> Conditions inside `{}` MUST be true for the restriction to match. For example, if you specify two scan triggers this cannot be true, and the exclusion will not apply. To specify two restrictions of the same type, create two separate exclusions.
7771
78-
7972
### Examples
8073

81-
The following string excludes "c:\documents\design.doc" only if it's a file and only in on-access scans:
74+
The following string excludes `c:\documents\design.doc` only if it's a file and only in on-access scans:
8275

8376
`c:\documents\design.doc\:{PathType:file,ScanTrigger:OnAccess}`
8477

85-
The following string excludes "c:\documents\design.doc" only if it's scanned (on-access) due to it being accessed by a process having the image name "winword.exe":
78+
The following string excludes `c:\documents\design.doc` only if it's scanned (on-access), due to it being accessed by a process having the image name `winword.exe`:
8679

8780
`c:\documents\design.doc\:{Process:"winword.exe"}`
8881

89-
File and folder paths may contain wildcards, as in the following example:
82+
File and folder paths can contain wildcards, as in the following example:
9083

9184
`c:\*\*.doc\:{PathType:file,ScanTrigger:OnDemand}`
9285

93-
The process image path may contain wildcards, as in the following example:
86+
The process image path can contain wildcards, as in the following example:
9487

9588
`c:\documents\design.doc\:{Process:"C:\Program Files*\Microsoft Office\root\Office??\winword.exe"}`
9689

9790
### File/folder restriction
9891

99-
You can restrict exclusions to only apply if the target is a file or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, the exclusion won't apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion will apply.
92+
You can restrict exclusions to only apply if the target is a file or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, the exclusion doesn't apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion applies.
10093

10194
#### File/folder exclusions default behavior
10295

@@ -113,9 +106,7 @@ To ensure an exclusion only applies if the target is a folder, not a file you ca
113106

114107
#### Files
115108

116-
To make sure an exclusion only applies if the target is a file, not a folder you can use the PathType: file restriction.
117-
118-
Example:
109+
To make sure an exclusion only applies if the target is a file, not a folder you can use the PathType: file restriction. For example:
119110

120111
`C:\documents\*.mdb\:{PathType:file}`
121112

@@ -124,7 +115,7 @@ Example:
124115
By default, exclusions apply to all scan types:
125116

126117
- **resource**: a single file or folder is scanned in a targeted way (for example, right-click, Scan)
127-
- **quick**: common startup locations utilized by malware, memory and certain registry keys
118+
- **quick**: common startup locations utilized by malware, memory, and certain registry keys
128119
- **full**: includes quick scan locations and complete file system (all files and folders)
129120

130121
To mitigate performance issues, you can exclude a folder or a set of files from being scanned by a specific scan type. You can also define the required scan type for an exclusion to apply.
@@ -133,19 +124,19 @@ To exclude a folder from being scanned only during a full scan, specify a restri
133124

134125
`C:\documents\:{ScanType:full}`
135126

136-
To exclude a folder from being scanned only during a quick scan, specify a restriction type together with the file or folder exclusion:
127+
To exclude a folder from being scanned only during a quick scan, specify a restriction type together with the file or folder exclusion, as in the following example:
137128

138129
`C:\program.exe\:{ScanType:quick}`
139130

140-
If you want to make sure this exclusion only applies to a specific file and not a folder (c:\foo.exe could be a folder), also apply the PathType restriction:
131+
If you want to make sure this exclusion only applies to a specific file and not a folder (c:\foo.exe could be a folder), also apply the `PathType` restriction, as in the following example:
141132

142133
`C:\program.exe\:{ScanType:quick,PathType:file}`
143134

144135
### Scan trigger restriction
145136

146-
By default, basic exclusions apply to all scan triggers. ScanTrigger restriction enables you to specify that the exclusion should only apply when the scan was initiated by a specific event; on demand (including quick, full and targeted scans), on access or originating from behavioral monitoring (including memory scans).
137+
By default, basic exclusions apply to all scan triggers. ScanTrigger restriction enables you to specify that the exclusion should only apply when the scan was initiated by a specific event; on demand (including quick, full, and targeted scans), on access or originating from behavioral monitoring (including memory scans).
147138

148-
- **OnDemand**: a scan was triggered by a command or admin action. Remember that scheduled quick and full scans also fall under this category.
139+
- **OnDemand**: a scan that's triggered by a command or admin action. Remember that scheduled quick and full scans also fall under this category.
149140
- **OnAccess**: a file or folder is opened/written/read/modified (typically considered real-time protection)
150141
- **BM**: a behavioral trigger causes the behavioral monitoring to scan a specific file
151142

@@ -158,7 +149,6 @@ To exclude a file or folder and its contents from being scanned only when the fi
158149
This restriction allows you to define that an exclusion should only apply when a file or folder is being accessed by a specific process. A common scenario is when you want to avoid excluding the process as that avoidance would cause Defender Antivirus to ignore other operations by that process. Wildcards are supported in the process name/path.
159150

160151
> [!NOTE]
161-
>
162152
> Using a large amount of process exclusion restrictions on a machine can adversely affect performance. In addition, if an exclusion is restricted to a certain process or processes, other active processes (such as indexing, backup, updates) can still trigger file scans.
163153
164154
To exclude a file or folder only when accessed by a specific process, create a normal file or folder exclusion and add the process to restrict the exclusion to. For example:
@@ -169,5 +159,11 @@ To exclude a file or folder only when accessed by a specific process, create a n
169159

170160
After constructing your desired contextual exclusions, you can use your existing management tool to configure file and folder exclusions using the string you created.
171161

172-
See: [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)
162+
See [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md).
163+
164+
## See also
165+
166+
- [Exclusions overview](navigate-defender-endpoint-antivirus-exclusions.md)
167+
- [Common mistakes to avoid when defining exclusions](common-exclusion-mistakes-microsoft-defender-antivirus.md)
168+
173169
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-xdr/TOC.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -218,8 +218,14 @@
218218
href: advanced-hunting-modes.md
219219
- name: Generate KQL queries with Security Copilot
220220
href: advanced-hunting-security-copilot.md
221-
- name: Advanced hunting in the Microsoft Defender portal
222-
href: advanced-hunting-microsoft-defender.md
221+
- name: Hunt over Microsoft Sentinel data
222+
items:
223+
- name: Microsoft Sentinel data in advanced hunting
224+
href: advanced-hunting-microsoft-defender.md
225+
- name: Use functions, saved queries, and custom rules
226+
href: advanced-hunting-defender-use-custom-rules.md
227+
- name: Work with results containing Microsoft Sentinel data
228+
href: advanced-hunting-defender-results.md
223229
- name: Build queries using guided mode
224230
items:
225231
- name: Get started with query builder
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: Work with results containing Microsoft Sentinel data
3+
description: Work with advanced hunting in the portal unifying Defender XDR and Sentinel data
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: maccruz
10+
author: schmurky
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- m365initiative-m365-defender
17+
- tier1
18+
- usx-security
19+
ms.topic: conceptual
20+
appliesto:
21+
- Microsoft Defender XDR
22+
- Microsoft Sentinel in the Microsoft Defender portal
23+
ms.date: 08/07/2024
24+
---
25+
26+
# Work with advanced hunting results containing Microsoft Sentinel data
27+
28+
## Explore results
29+
30+
Results of queries that were run appear in the **Results** tab. You can export the results to a CSV file by selecting **Export**.
31+
32+
:::image type="content" source="/defender/media/advanced-hunting-unified-results.png" alt-text="Screenshot of advanced hunting results with options to expand result rows in the Microsoft Defender portal" lightbox="/defender/media/advanced-hunting-unified-results.png":::
33+
34+
You can also explore the results in-line with the following features:
35+
36+
- Expand a result by selecting the dropdown arrow at the left of each result
37+
- Where applicable, expand details for results that are in JSON or array format by selecting the dropdown arrow at the left of applicable result row for added readability
38+
- Open the side pane to see a record's details (concurrent with expanded rows)
39+
40+
You can also right-click on any result value in a row so that you can use it to:
41+
- Add more filters to the existing query
42+
- Copy the value for use in further investigation
43+
- Update the query to extend a JSON field to a new column
44+
45+
For Microsoft Defender XDR data, you can take further action by selecting the checkboxes to the left of each result row. Select **Link to incident** to link the selected results to an incident (read [Link query results to an incident](advanced-hunting-link-to-incident.md)) or **Take actions** to open the Take actions wizard (read [Take action on advanced hunting query results](advanced-hunting-take-action.md)).
46+

0 commit comments

Comments
 (0)