Skip to content

Commit 260fd19

Browse files
Merge pull request #2409 from MicrosoftDocs/main
Publish main to live, 01/10/25, 3:30 PM PT
2 parents f73e250 + 381015a commit 260fd19

File tree

43 files changed

+871
-350
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+871
-350
lines changed

defender-endpoint/attack-surface-reduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 05/02/2024
19+
ms.date: 01/10/2025
2020
---
2121

2222
# Attack surface reduction rules overview
@@ -79,7 +79,7 @@ For information about configuring per-rule exclusions, see the section titled **
7979

8080
## Warn mode for users
8181

82-
(**NEW**!) Prior to warn mode capabilities, attack surface reduction rules that are enabled could be set to either audit mode or block mode. With the new warn mode, whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
82+
Whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
8383

8484
Warn mode helps your organization have attack surface reduction rules in place without preventing users from accessing the content they need to perform their tasks.
8585

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/07/2025
18+
ms.date: 01/10/2025
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -45,7 +45,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
4545

4646
> [!NOTE]
4747
> Linux distribution using system manager supports both SystemV and Upstart.
48-
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
48+
> Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
4949
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
5050
5151
### System requirements
@@ -106,30 +106,30 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
106106
107107
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
108108

109-
|RTP, Quick, Full Scan| Custom Scan|
110-
|---|---|
111-
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112-
|`ecryptfs`|`Efs`|
113-
|`ext2`|`S3fs`|
114-
|`ext3`|`Blobfuse`|
115-
|`ext4`|`Lustr`|
116-
|`fuse`|`glustrefs`|
117-
|`fuseblk`|`Afs`|
118-
|`jfs`|`sshfs`|
119-
|`nfs` (v3 only)|`cifs`|
120-
|`overlay`|`smb`|
121-
|`ramfs`|`gcsfuse`|
122-
|`reiserfs`|`sysfs`|
123-
|`tmpfs`||
124-
|`udf`||
125-
|`vfat`||
126-
|`xfs`||
127-
109+
|RTP, Quick, Full Scan| Custom Scan|
110+
|---|---|
111+
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112+
|`ecryptfs`|`Efs`|
113+
|`ext2`|`S3fs`|
114+
|`ext3`|`Blobfuse`|
115+
|`ext4`|`Lustr`|
116+
|`fuse`|`glustrefs`|
117+
|`fuseblk`|`Afs`|
118+
|`jfs`|`sshfs`|
119+
|`nfs` (v3 only)|`cifs`|
120+
|`overlay`|`smb`|
121+
|`ramfs`|`gcsfuse`|
122+
|`reiserfs`|`sysfs`|
123+
|`tmpfs`||
124+
|`udf`||
125+
|`vfat`||
126+
|`xfs`||
127+
128128
> [!NOTE]
129-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
129+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient extended Berkeley Packet Filter (eBPF) technology.
130130
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, then Audit framework (`auditd`) must be enabled on your system.
131131
> If you're using Auditd, then system events captured by rules added to `/etc/audit/rules.d/` adds to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux are tagged with the `mdatp` key.
132-
132+
133133
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
134134

135135
### Installation instructions

defender-endpoint/minimum-requirements.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: pahuijbr
88
ms.localizationpriority: medium
9-
ms.date: 01/06/2025
9+
ms.date: 01/10/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -85,7 +85,7 @@ Supported versions of Windows include:
8585
- Windows 10 Education
8686
- Windows 10 Pro
8787
- Windows 10 Pro Education
88-
- Windows server
88+
- Windows Server
8989
- Windows Server 2012 R2
9090
- Windows Server 2016
9191
- Windows Server, version 1803 or later
@@ -130,23 +130,23 @@ To add anti-malware protection to these older operating systems, you can use [Sy
130130

131131
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
132132

133-
- Cores: Two minimum, four preferred
134-
- Memory: One GB minimum, four preferred
133+
- Cores: 2 minimum, 4 preferred
134+
135+
- Memory: 1GB minimum, 4 GB preferred
135136

136137
### Network and data storage and configuration requirements
137138

138139
When you run the onboarding wizard for the first time, you must choose where your Microsoft Defender for Endpoint-related information is stored: in the European Union, the United Kingdom, or the United States datacenter.
139140

140141
> [!NOTE]
141-
>
142142
> - You can't change your data storage location after the first-time setup.
143143
> - Review the [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data.
144144
145145
#### IP stack
146146

147-
IPv4 (Internet Protocol Version 4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
147+
Internet Protocol Version 4 (IPv4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
148148

149-
Alternatively, if you must use an IPv6-only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
149+
Alternatively, if you must use an Internet Protocol Version 6 (IPv6) only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
150150

151151
#### Internet connectivity
152152

defender-endpoint/troubleshoot-asr.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
audience: ITPro
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 11/05/2024
9+
ms.date: 01/10/2025
1010
ms.reviewer:
1111
manager: deniseb
1212
ms.custom: asr
@@ -25,11 +25,9 @@ search.appverid: met150
2525

2626

2727
**Applies to:**
28-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
3128

32-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
29+
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
30+
- [Microsoft Defender XDR](/defender-xdr)
3331

3432
When you use [attack surface reduction rules](attack-surface-reduction.md) you might run into issues, such as:
3533

@@ -72,7 +70,7 @@ Follow these instructions in [Use the demo tool to see how attack surface reduct
7270

7371
3. [Review the attack surface reduction rule event logs](attack-surface-reduction.md) to see if the rule would block the file or process if the rule were set to `Enabled`.
7472

75-
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
73+
If a rule isn't blocking a file or process that you're expecting it should block, first check to see if audit mode is enabled. Audit mode might be enabled for testing another feature, or by an automated PowerShell script, and might not be disabled after the tests were completed.
7674

7775
If you've tested the rule with the demo tool and with audit mode, and attack surface reduction rules are working on preconfigured scenarios, but the rule isn't working as expected, proceed to either of the following sections based on your situation:
7876

@@ -86,16 +84,16 @@ If the attack surface reduction rule is blocking something that it shouldn't blo
8684
To add an exclusion, see [Customize attack surface reduction](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules).
8785

8886
> [!IMPORTANT]
89-
> You can specify individual files and folders to be excluded, but you cannot specify individual rules.
90-
> This means any files or folders that are excluded will be excluded from all ASR rules.
87+
> You can specify individual files and folders to be excluded, but you can't specify individual rules.
88+
> This means any files or folders that are excluded are excluded from all ASR rules.
9189
9290
## Report a false positive or false negative
9391

9492
Use the [Microsoft Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/support/report-exploit-guard) to report a false negative or false positive for network protection. With a Windows E5 subscription, you can also [provide a link to any associated alert](alerts-queue.md).
9593

9694
## Collect diagnostic data for file submissions
9795

98-
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
96+
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
9997

10098
1. Open Command Prompt as an administrator and open the Windows Defender directory:
10199

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -444,7 +444,7 @@
444444
items:
445445
- name: AIR overview
446446
href: air-about.md
447-
- name: How automated investigation and response works
447+
- name: AIR examples
448448
href: air-examples.md
449449
- name: Review and approve (or reject) pending actions
450450
href: air-review-approve-pending-completed-actions.md

defender-office-365/address-compromised-users-quickly.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ When a user account is compromised, alerts are triggered. And in some cases, tha
4747
- [View details about automated investigations](#view-details-about-automated-investigations)
4848

4949
> [!IMPORTANT]
50-
> You must have appropriate permissions to perform the following tasks. See [Required permissions to use AIR capabilities](air-about.md#required-permissions-to-use-air-capabilities).
50+
> You must have appropriate permissions to perform the following tasks. For more information, see [Required permissions to use AIR capabilities](air-about.md#required-permissions-and-licensing-for-air).
5151
5252
Watch this short video to learn how you can detect and respond to user compromise in Microsoft Defender for Office 365 using Automated Investigation and Response (AIR) and compromised user alerts.
5353

@@ -81,7 +81,7 @@ To learn more, see [View details of an investigation](air-view-investigation-res
8181

8282
## Next steps
8383

84-
- [Review the required permissions to use AIR capabilities](air-about.md#required-permissions-to-use-air-capabilities)
84+
- [Review the required permissions to use AIR capabilities](air-about.md#required-permissions-and-licensing-for-air)
8585

8686
- [Find and investigate malicious email in Office 365](threat-explorer-investigate-delivered-malicious-email.md)
8787

0 commit comments

Comments
 (0)