Skip to content

Commit 273bc99

Browse files
authored
Merge branch 'main' into docs-editor/fixed-reported-inaccuracies-1730799503
2 parents 56d841a + ef9172c commit 273bc99

38 files changed

+248
-121
lines changed

ATADocs/docfx.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,10 @@
4646
"layout": "Conceptual",
4747
"breadcrumb_path": "/advanced-threat-analytics/bread/toc.json",
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
49-
"searchScope": ["ATA"]
49+
"searchScope": ["ATA"],
50+
"contributors_to_exclude": [
51+
"beccarobins"
52+
]
5053
},
5154
"markdownEngineName": "markdig"
5255
}

CloudAppSecurityDocs/docfx.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,10 @@
4242
"ms.author": "bagol",
4343
"ms.collection": "M365-security-compliance",
4444
"ms.service": "defender-for-cloud-apps",
45-
"ms.suite": "ems"
45+
"ms.suite": "ems",
46+
"contributors_to_exclude": [
47+
"beccarobins"
48+
]
4649
},
4750
"fileMetadata": {},
4851
"template": [],

defender-business/docfx.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
62-
"alekyaj"
62+
"alekyaj",
63+
"beccarobins"
6364
]
6465
},
6566
"fileMetadata": {},

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: deniseb
77
manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
10-
ms.date: 09/10/2024
10+
ms.date: 11/11/2024
1111
ms.collection:
1212
- m365-security
1313
- tier2
@@ -117,6 +117,8 @@ After you have onboarded devices, [run a detection test](run-detection-test.md).
117117

118118
The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is a central location where you can view onboarded devices, security recommendations, detected threats, alerts, and more. To get started, see [Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal).
119119

120+
> [!IMPORTANT]
121+
> If you decide not to renew your trial or purchase a subscription, make sure to offboard devices before your trial expires.
120122
121123
## See also
122124

defender-endpoint/device-discovery-faq.md

Lines changed: 51 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier3
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 03/23/2021
18+
ms.date: 11/12/2024
1919
---
2020

2121
# Device discovery frequently asked questions
@@ -65,11 +65,54 @@ The discovery engine distinguishes between network events that are received in t
6565
## What protocols are you capturing and analyzing?
6666

6767
By default, all onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 are capturing and analyzing the following protocols:
68-
ARP, CDP, DHCP, DHCPv6, IP (headers), LLDP, LLMNR, mDNS, MNDP, MSSQL, NBNS, SSDP, TCP (SYN headers), UDP (headers), WSD
68+
69+
- ARP
70+
- CDP
71+
- DHCP
72+
- DHCPv6
73+
- IP (headers)
74+
- LLDP
75+
- LLMNR
76+
- mDNS
77+
- MNDP
78+
- MSSQL
79+
- NBNS
80+
- SSDP
81+
- TCP (SYN headers)
82+
- UDP (headers)
83+
- WSD
6984

7085
## Which protocols do you use for active probing in Standard discovery?
7186
When a device is configured to run Standard discovery, exposed services are being probed by using the following protocols:
72-
ARP, FTP, HTTP, HTTPS, ICMP, LLMNR, NBNS, RDP, SIP, SMTP, SNMP, SSH, Telnet, UPNP, WSD, SMB, NBSS, IPP, PJL, RPC, mDNS, DHCP, AFP, CrestonCIP, IphoneSync, WinRM, VNC, SLP, LDAP
87+
88+
- AFP
89+
- ARP
90+
- DHCP
91+
- FTP
92+
- HTTP
93+
- HTTPS
94+
- ICMP
95+
- IphoneSync
96+
- IPP
97+
- LDAP
98+
- LLMNR
99+
- mDNS
100+
- NBNS
101+
- NBSS
102+
- PJL
103+
- RDP
104+
- RPC
105+
- SIP
106+
- SLP
107+
- SMB
108+
- SMTP
109+
- SNMP
110+
- SSH
111+
- Telnet
112+
- UPNP
113+
- VNC
114+
- WinRM
115+
- WSD
73116

74117
In addition, device discovery might also scan other commonly used ports to improve classification accuracy & coverage.
75118

@@ -88,9 +131,10 @@ As device discovery uses passive methods to discover devices in the network, any
88131

89132
Devices will actively be probed when changes in device characteristics are observed to make sure the existing information is up to date (typically, devices probed no more than once in a three-week period)
90133

91-
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it, what should I do?
134+
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it. What should I do?
92135

93136
The active probing scripts are signed by Microsoft and are safe. You can add the following path to your exclusion list:
137+
94138
`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps1`
95139

96140
## What is the amount of traffic being generated by the Standard discovery active probe?
@@ -101,13 +145,13 @@ Active probing can generate up to 50Kb of traffic between the onboarded device a
101145

102146
You may notice differences between the number of listed devices under "can be onboarded" in the device inventory, "onboard to Microsoft Defender for Endpoint" security recommendation, and "devices to onboard" dashboard widget.
103147

104-
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
148+
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
105149

106150
## Can I onboard unmanaged devices that were found?
107151

108152
Yes. You can onboard unmanaged devices manually. Unmanaged endpoints in your network introduce vulnerabilities and risks to your network. Onboarding them to the service can increase the security visibility on them.
109153

110-
## I've noticed that unmanaged device health state is always "Active", why is that?
154+
## I've noticed that unmanaged device health state is always "Active". Why is that?
111155

112156
Temporarily, unmanaged device health state is "Active" during the standard retention period of the device inventory, regardless of their actual state.
113157

@@ -138,4 +182,5 @@ The device discovery capabilities have been built to only discover and identify
138182
### You can exclude network lures from active probing
139183

140184
Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions ensure that those devices won't be actively probed and won't be alerted. Those devices are discovered using passive methods only (similar to Basic discovery mode).
185+
141186
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/docfx.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
62-
"alekyaj"
62+
"alekyaj",
63+
"beccarobins"
6364
]
6465
},
6566
"fileMetadata": {},

defender-endpoint/mac-preferences.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22
title: Set preferences for Microsoft Defender for Endpoint on Mac
33
description: Configure Microsoft Defender for Endpoint on Mac in enterprise organizations.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: denisebmsft
6+
ms.author: deniseb
77
manager: deniseb
8+
ms.reviewer: yongrhee
89
ms.localizationpriority: medium
910
audience: ITPro
1011
ms.collection:
@@ -14,7 +15,7 @@ ms.collection:
1415
ms.topic: how-to
1516
ms.subservice: macos
1617
search.appverid: met150
17-
ms.date: 08/15/2024
18+
ms.date: 11/11/2024
1819
---
1920

2021
# Set preferences for Microsoft Defender for Endpoint on macOS
@@ -681,7 +682,7 @@ The following configuration profile (or, in case of JAMF, a property list that c
681682
<key>PayloadOrganization</key>
682683
<string>Microsoft</string>
683684
<key>PayloadIdentifier</key>
684-
<string>
685+
<string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
685686
<key>PayloadDisplayName</key>
686687
<string>Microsoft Defender for Endpoint settings</string>
687688
<key>PayloadDescription</key>

defender-endpoint/mde-plugin-wsl.md

Lines changed: 39 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.custom:
1616
- partner-contribution
1717
audience: ITPro
18-
ms.date: 10/24/2024
18+
ms.date: 11/11/2024
1919
search.appverid: MET150
2020
---
2121

@@ -35,23 +35,19 @@ Windows Subsystem for Linux (WSL) 2, which replaces the previous version of WSL
3535

3636
Be aware of the following considerations before you start:
3737

38-
1. The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later, updates are supported through Windows Update across all rings. Updates through Windows Server Update services (WSUS), System Center Configuration Manager (SCCM) and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
38+
- The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later. Updates are supported through Windows Update across all rings. Updates through Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
3939

40-
2. It takes a few minutes for the plug-in to fully instantiate, and up to 30 minutes for a WSL2 instance to onboard itself. Short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Once any distribution has been running long enough (at least 30 minutes), it does show up.
40+
- It takes a few minutes for the plug-in to fully instantiate, and up to 30 minutes for a WSL2 instance to onboard itself. Short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). When any distribution has been running long enough (at least 30 minutes), it does show up.
4141

42-
3. Running a custom kernel and custom kernel command line is not supported. Although the plug-in does not block running in that configuration, it does not guarantee visibility within WSL when you're running a custom kernel and custom kernel command line. We recommend to block such configurations with help of [Microsoft Intune wsl settings](/windows/wsl/intune).
42+
- Running a custom kernel and custom kernel command line is not supported. Although the plug-in does not block running in that configuration, it does not guarantee visibility within WSL when you're running a custom kernel and custom kernel command line. We recommend blocking such configurations with [Microsoft Intune wsl settings](/windows/wsl/intune).
4343

44-
4. OS Distribution is displayed **None** in the **Device overview** page of a WSL device in the Microsoft Defender portal.
44+
- The plug-in is not supported on machines with an ARM64 processor.
4545

46-
5. The plug-in is not supported on machines with ARM64 processor.
47-
48-
6. The plug-in provides visibility into events from WSL, but other features like antimalware, threat and vulnerability management, and response commands are not available for the WSL logical device.
46+
- The plug-in provides visibility into events from WSL, but other features like antimalware, threat and vulnerability management, and response commands are not available for the WSL logical device.
4947

5048
## Software prerequisites
5149

52-
- WSL version 2.0.7.0 or later must be running with at least one active distro.
53-
54-
Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than `2.0.7.0`, run `wsl -–update –pre-release` to get the latest update.
50+
- WSL version `2.0.7.0` or later must be running with at least one active distro. Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than `2.0.7.0`, run `wsl -–update –pre-release` to get the latest update.
5551

5652
- The Windows client device must be onboarded to Defender for Endpoint.
5753

@@ -97,6 +93,7 @@ If your Windows Subsystem for Linux isn't installed yet, follow these steps:
9793

9894
> [!NOTE]
9995
> If `WslService` is running, it stops during the installation process. You do not need to onboard the subsystem separately. Instead, the plug-in automatically onboards to the tenant the Windows host is onboarded to.
96+
> Microsoft Defender for Endpoint update for plug-in for WSL [KB Update](https://support.microsoft.com/en-us/topic/microsoft-defender-for-endpoint-update-for-plug-in-for-wsl-9f4b2ddc-c47f-4c59-bd02-a3456c667966).
10097
10198
## Installation validation checklist
10299

@@ -143,9 +140,9 @@ For example, if your host machine has both `Winhttp proxy` and `Network & Intern
143140
> [!NOTE]
144141
> The `DefenderProxyServer` registry key is no longer supported. Follow the steps described earlier in this article to configure proxy in plug-in.
145142
146-
## Connectivity test for Defender running in WSL
143+
## Connectivity test for Defender for Endpoint running in WSL
147144

148-
The defender connectivity test is triggered whenever there is a proxy modification on your device and is scheduled to run every hour.
145+
The Defender for Endpoint connectivity test is triggered whenever there is a proxy modification on your device and is scheduled to run every hour.
149146

150147
On starting your wsl machine, wait for 5 minutes and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test). If successful, you can see that the connectivity test was a success. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from MDE plug-in for WSL to Defender for Endpoint service URLs is failing.
151148

@@ -255,6 +252,16 @@ DeviceProcessEvents
255252

256253
## Troubleshooting
257254

255+
### Installation failure
256+
257+
If you see an error on launching WSL, such as `A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND`, it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
258+
259+
1. In Control Panel, go to **Programs** > **Programs and Features**.
260+
261+
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right files in the expected directories.
262+
263+
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
264+
258265
### The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in five minutes."
259266

260267
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check.png" alt-text="Screenshot showing PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check.png":::
@@ -357,41 +364,39 @@ Collect the networking logs by following these steps:
357364

358365
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-overview.png" alt-text="Screenshot showing status in PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check-overview.png":::
359366

360-
2. Microsoft Defender Endpoint for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
367+
### WSL1 vs WSL2
361368

362-
1. Go to your [Microsoft Intune admin center](https://intune.microsoft.com).
369+
Microsoft Defender Endpoint plug-in for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
363370

364-
2. Go to **Devices** > **Configuration Profiles** > **Create** > **New Policy**.
371+
1. Go to your [Microsoft Intune admin center](https://intune.microsoft.com).
365372

366-
3. Select **Windows 10 and later** > **Settings catalog**.
373+
2. Go to **Devices** > **Configuration Profiles** > **Create** > **New Policy**.
367374

368-
4. Create a name for the new profile, and search for **Windows Subsystem for Linux** to see and add the full list of available settings.
375+
3. Select **Windows 10 and later** > **Settings catalog**.
369376

370-
5. Set the **Allow WSL1** setting to **Disabled**, to ensure that only WSL 2 distributions can be used.
377+
4. Create a name for the new profile, and search for **Windows Subsystem for Linux** to see and add the full list of available settings.
371378

372-
Alternately, if you want to keep using WSL 1, or not use the Intune Policy, you can selectively associate your installed distributions to run on WSL 2, by running the command in PowerShell:
379+
5. Set the **Allow WSL1** setting to **Disabled**, to ensure that only WSL 2 distributions can be used.
373380

374-
```powershell
375-
wsl --set-version <YourDistroName> 2
376-
```
381+
Alternately, if you want to keep using WSL 1, or not use the Intune Policy, you can selectively associate your installed distributions to run on WSL 2, by running the command in PowerShell:
377382

378-
To have WSL 2 as your default WSL version for new distributions to be installed in the system, run the following command in PowerShell:
383+
```powershell
384+
wsl --set-version <YourDistroName> 2
385+
```
386+
387+
To have WSL 2 as your default WSL version for new distributions to be installed in the system, run the following command in PowerShell:
379388

380-
```powershell
381-
wsl --set-default-version 2
382-
```
389+
```powershell
390+
wsl --set-default-version 2
391+
```
383392

384-
3. The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set `OverrideReleaseRing` to one of the following under registry and restart WSL:
393+
### Override Release ring
394+
395+
- The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set `OverrideReleaseRing` to one of the following under registry and restart WSL:
385396

386397
- **Name**: `OverrideReleaseRing`
387398
- **Type**: `REG_SZ`
388399
- **Value**: `Dogfood or External or InsiderFast or Production`
389400
- **Path**: `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Defender for Endpoint plug-in for WSL`
390401

391-
4. If you see an error on launching WSL, such as "A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND", it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
392-
393-
1. In Control Panel, go to **Programs** > **Programs and Features**.
394-
395-
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right files in the expected directories.
396402

397-
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
174 KB
Loading

0 commit comments

Comments
 (0)