Skip to content

Commit 288c529

Browse files
authored
Merge branch 'main' into WI360959-delete-page-tutorial-ueba
2 parents 995bd27 + cc2a7a0 commit 288c529

File tree

10 files changed

+66
-38
lines changed

10 files changed

+66
-38
lines changed

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: yongrhee
77
manager: deniseb
88
ms.service: defender-endpoint
99
ms.topic: overview
10-
ms.date: 02/28/2024
10+
ms.date: 01/24/2025
1111
ms.subservice: ngp
1212
ms.localizationpriority: medium
1313
ms.custom: partner-contribution
@@ -53,6 +53,7 @@ When the client encounters unknown threats, it sends metadata or the file itself
5353
|**Heuristics engine** <br/> Heuristic rules identify file characteristics that have similarities with known malicious characteristics to catch new threats or modified versions of known threats.|**Detonation-based ML engine** <br/> Suspicious files are detonated in a sandbox. Deep learning classifiers analyze the observed behaviors to block attacks.|
5454
|**Emulation engine** <br/> The emulation engine dynamically unpacks malware and examines how they would behave at runtime. The dynamic emulation of the content and scanning both the behavior during emulation and the memory content at the end of emulation defeat malware packers and expose the behavior of polymorphic malware.|**Reputation ML engine** <br/> Domain-expert reputation sources and models from across Microsoft are queried to block threats that are linked to malicious or suspicious URLs, domains, emails, and files. Sources include Windows Defender SmartScreen for URL reputation models and Defender for Office 365 for email attachment expert knowledge, among other Microsoft services through the Microsoft Intelligent Security Graph.|
5555
|**Network engine** <br/> Network activities are inspected to identify and stop malicious activities from threats.|**Smart rules engine** <br/> Expert-written smart rules identify threats based on researcher expertise and collective knowledge of threats.|
56+
|**CommandLine scanning engine** <br/> This engine scans the commandlines of all processes before they execute. If the commandline for a process is found to be malicious it is blocked from execution.|**CommandLine ML engine** <br/> Multiple advanced ML models scan the suspicious commandlines in the cloud. If a commandline is found to be malicious, cloud sends a signal to the client to block the corresponding process from starting.|
5657

5758
For more information, see [Microsoft 365 Defender demonstrates 100 percent protection coverage in the 2023 MITRE Engenuity ATT&CK&reg; Evaluations: Enterprise](https://www.microsoft.com/security/blog/2023/09/20/microsoft-365-defender-demonstrates-100-percent-protection-coverage-in-the-2023-mitre-engenuity-attck-evaluations-enterprise/).
5859

@@ -97,6 +98,6 @@ We focus on every industry.
9798

9899
### Do your detection/protection require a human analyst?
99100

100-
When you're pen-testing, you should demand where no human analysts are engaged on detect/protect, to see how the actual antivirus engine (prebreach) efficacy truly is, and a separate one where human analysts are engaged.You can add [Microsoft Defender Experts for XDR](/defender-xdr/dex-xdr-overview) a managed extended detection and response service to augment your SOC.
101+
When you're pen-testing, you should demand where no human analysts are engaged on detect/protect, to see how the actual antivirus engine (prebreach) efficacy truly is, and a separate one where human analysts are engaged. You can add [Microsoft Defender Experts for XDR](/defender-xdr/dex-xdr-overview) a managed extended detection and response service to augment your SOC.
101102

102103
The ***continuous iterative enhancement*** each of these engines to be increasingly effective at catching the latest strains of malware and attack methods. These enhancements show up in consistent [top scores in industry tests](/defender-xdr/top-scoring-industry-tests), but more importantly, translate to [threats and malware outbreaks](https://www.microsoft.com/security/blog/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign/) stopped and [more customers protected](https://www.microsoft.com/security/blog/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise/).

defender-endpoint/device-control-walkthroughs.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to work with device control in Defender for Endpoint.
44
author: denisebmsft
55
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 02/14/2024
7+
ms.date: 01/24/2025
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -36,7 +36,7 @@ By default, [device control](device-control-overview.md) is disabled and there a
3636

3737
Device control in Defender for Endpoint identifies a device based on its properties. Device properties are visible by selecting an entry in the report.
3838

39-
The **Device ID**, **Vendor ID** (VID), **Serial number**, and **Bus type** can all be used to identify a device (see [Device control policies in Microsoft Defender for Endpoint](device-control-policies.mddata is also available in [advanced hunting](/defender-xdr/advanced-hunting-overview), by searching for the `Plug and Play Device Connected action` (`PnPDeviceConnected`), as shown in the following example query:
39+
The **Device ID**, **Vendor ID** (VID), **Serial number**, and **Bus type** can all be used to identify a device (see [Device control policies in Microsoft Defender for Endpoint](device-control-policies.md)). Data is also available in [Advanced Hunting](/defender-xdr/advanced-hunting-overview), by searching for the Plug and Play Device Connected action (`PnPDeviceConnected`), as shown in the following example query:
4040

4141
```kusto
4242
@@ -62,7 +62,7 @@ DeviceControlState : Disabled
6262
6363
```
6464

65-
Change the device control state to be enabled* on a test device. Make sure the policy is applied by checking [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus), as illustrated in the following snippet:
65+
Change the device control state to be enabled on a test device. Make sure the policy is applied by checking [Get-MpComputerStatus](/powershell/module/defender/get-mpcomputerstatus), as illustrated in the following snippet:
6666

6767
```powershell
6868
@@ -184,7 +184,7 @@ The following screenshot shows the settings we used for our example:
184184

185185
By default, the sample uses the Global SID of `S-1-1-0`. Before deploying the policy, you can change the SID associated with the authorized USBs (writeable USBs) to `User1` and change the SID associated with the Read Only USBs to `User2`.
186186

187-
Once the policy is deployed, only User 1 has write access to the Authorized USBs, and only User 2 has read access to the ReadOnly USBs.
187+
Once the policy is deployed, only User 1 has write access to the Authorized USBs, and only User 2 has read access to the ReadOnly USBs.
188188

189189
Device control also supports group SIDs. Change the SID in the read-only policy to a group that contains `User2`. Once the policy is redeployed, the rules are the same for User 2 or any other user in that group.
190190

defender-endpoint/linux-update-mde-linux.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 12/16/2024
18+
ms.date: 01/24/2025
1919
---
2020

2121
# Schedule an update for Microsoft Defender for Endpoint on Linux
@@ -27,9 +27,9 @@ ms.date: 12/16/2024
2727

2828
To run an update on Microsoft Defender for Endpoint on Linux, see [Deploy updates for Microsoft Defender for Endpoint on Linux](linux-updates.md).
2929

30-
Linux (and Unix) have a tool called **crontab** (similar to Task Scheduler) to be able to run scheduled tasks.
30+
Linux and Unix have a tool called **crontab** (similar to Task Scheduler) to be able to run scheduled tasks.
3131

32-
## Pre-requisite
32+
## Prerequisite
3333

3434
> [!NOTE]
3535
> To get a list of all the time zones, run the following command:
@@ -53,7 +53,7 @@ sudo crontab -l > /var/tmp/cron_backup_201118.dat
5353
```
5454

5555
> [!NOTE]
56-
> Where 201118 == YYMMDD
56+
> In our example, `201118` == `YYMMDD`.
5757
5858
> [!TIP]
5959
> Do this before you edit or remove.
@@ -108,7 +108,9 @@ CRON_TZ=America/Los_Angeles
108108
> ```
109109
110110
> [!NOTE]
111-
> In the examples above, we are setting it to 00 minutes, 6 a.m.(hour in 24 hour format), any day of the month, any month, on Sundays.[$(date +\%d) -le 15] == Won't run unless it's equal or less than the 15th day (3rd week). Meaning it will run every 3rd Sundays(7) of the month at 6:00 a.m. Pacific (UTC -8).
111+
> In the previous examples, we specified `00` minutes, 6 a.m. (hour using the 24-hour format), any day of the month, any month, on Sundays.
112+
> `[$(date +\%d) -le 15]` doesn't run unless it's equal or less than the 15th day (third week).
113+
> This means the job runs at 6 a.m. every Sunday, but only if the day of the month is the 15th or earlier.
112114
113115
Press "Esc"
114116

defender-endpoint/live-response-command-examples.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/24/2025
1818
---
1919

2020
# Live response command examples
@@ -107,12 +107,12 @@ getfile c:\Users\user\Desktop\work.txt -auto
107107

108108
> [!NOTE]
109109
>
110-
> The following file types *cannot* be downloaded using this command from within Live Response:
110+
> The following file types *can't* be downloaded using this command from within Live Response:
111111
>
112112
> - [Reparse point files](/windows-hardware/drivers/ifs/reparse-points)
113113
> - [Sparse files](/windows-server/administration/windows-commands/fsutil-sparse)
114114
> - Empty files
115-
> - Virtual files, or files that are not fully present locally
115+
> - Virtual files, or files that aren't fully present locally
116116
>
117117
> These file types *are* supported by [PowerShell](/powershell/scripting/overview).
118118
>
@@ -199,6 +199,9 @@ remediate process 7960
199199
remediate list
200200
```
201201

202+
> [!NOTE]
203+
> Currently, `HKEY_USERS` reg hive isn't supported for `remediate`. This is a known issue, and we're looking into it.
204+
202205
## `run`
203206

204207
```console
@@ -214,9 +217,9 @@ run get-process-by-name.ps1 -parameters "-processName Registry"
214217
> [!NOTE]
215218
>
216219
> For long running commands such as '**run**' or '**getfile**', you may want to use the '**&**' symbol at the end of the command to perform that action in the background.
217-
> This will allow you to continue investigating the machine and return to the background command when done using '**fg**' [basic command](live-response.md#basic-commands).
220+
> This allows you to continue investigating the machine and return to the background command when done using '**fg**' [basic command](live-response.md#basic-commands).
218221
>
219-
> When passing parameters to a live response script, do not include the following forbidden characters: **';'**, **'&'**, **'|'**, **'!'**, and **'$'**.
222+
> When passing parameters to a live response script, don't include the following forbidden characters: **';'**, **'&'**, **'|'**, **'!'**, and **'$'**.
220223
221224
## `scheduledtask`
222225

defender-endpoint/live-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Before you can initiate a session on a device, make sure you fulfill the followi
6464

6565
- **Windows Server 2016** - with [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac)
6666
> [!NOTE]
67-
> For Windows Server 2012R2 or 2016 you must have the [Unified Agent](update-agent-mma-windows.md#update-mma-on-your-devices) installed, and it is recommended to patch to latest sensor version with KB5005292.
67+
> For Windows Server 2012 R2 or Windows Server 2016, you must have the [Unified Agent](update-agent-mma-windows.md#update-mma-on-your-devices) installed, and it is recommended to patch to latest sensor version with KB5005292. Live response doesn't work as expected for offline down-level servers onboarded using the streamlined method, because of the static proxy. Consider using a system proxy instead.
6868
6969
- **Windows Server 2019**
7070
- Version 1903 or (with [KB4515384](https://support.microsoft.com/help/4515384/windows-10-update-kb4515384)) later

defender-endpoint/mac-whatsnew.md

Lines changed: 24 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: deniseb
66
ms.author: deniseb
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 12/11/2024
9+
ms.date: 01/24/2025
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -46,7 +46,7 @@ For more information on Microsoft Defender for Endpoint on other operating syste
4646
- On macOS Sequoia (Version 15.0 - 15.1.1), users may encounter prompts about incoming network connections from applications when the native firewall is active.
4747

4848
![Screenshot showing prompts about incoming network connections](media/mac-whatsnew/image.png)
49-
49+
5050
If an end user encounters a prompt for Defender for Endpoint on macOS processes such as `wdavdaemon_enterprise` or `Microsoft Defender Helper`, the end user can safely choose the **Deny** option. This selection doesn't impact Defender for Endpoint's functionality. Enterprises can also add *Microsoft Defender* to allow [incoming connections](https://support.apple.com/en-ca/guide/deployment/dep8d306275f/web). This issue is fixed in macOS Sequoia 15.2.
5151

5252
## Sequoia support
@@ -64,6 +64,21 @@ If an end user encounters a prompt for Defender for Endpoint on macOS processes
6464

6565
Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md).
6666

67+
### Dec-2024 (Build: 101.24102.0018 | Release version: 20.124102.18.0)
68+
69+
| Build: | **101.24102.0018** |
70+
|--------------------|-----------------------|
71+
| Release version: | **20.124102.18.0** |
72+
| Engine version: | **1.1.24080.10** |
73+
| Signature version: | **1.419.298.0** |
74+
75+
##### What's new
76+
77+
- **Improved User/Group Permission Handling** - Added reporting in `mdatp-health` for user/group permission issues for Defender files. On restart Defender attempts to cure these issues.
78+
79+
- Bug and performance fixes.
80+
81+
6782
### Oct-2024 (Build: 101.24092.0004 | Release version: 20.124092.4.0)
6883

6984
| Build: | **101.24092.0004** |
@@ -98,15 +113,15 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
98113

99114
##### What's new
100115

101-
- Resolved the issue causing outdated vulnerability assessments impacting some MAC OSs devices
116+
- Resolved the issue causing outdated vulnerability assessments impacting some macOS devices
102117

103118
### Aug-2024 (Build: 101.24072.0006 | Release version: 20.124072.6.0)
104119

105120
| Build: | **101.24072.0006** |
106121
|--------------------|-----------------------|
107-
| Release version: | 20.124072.6.0 |
108-
| Engine version: | 1.1.24060.7 |
109-
| Signature version: | 1.417.325.0 |
122+
| Release version: | **20.124072.6.0** |
123+
| Engine version: | **1.1.24060.7** |
124+
| Signature version: | **1.417.325.0** |
110125

111126
##### What's new
112127

@@ -116,9 +131,9 @@ Behavior monitoring monitors process behavior to detect and analyze potential th
116131

117132
| Build: | **101.24062.0009** |
118133
|--------------------|-----------------------|
119-
| Release version: | 20.124062.9.0 |
120-
| Engine version: | 1.1.24050.7 |
121-
| Signature version: | 1.411.410.0 |
134+
| Release version: | **20.124062.9.0** |
135+
| Engine version: | **1.1.24050.7** |
136+
| Signature version: | **1.411.410.0** |
122137

123138
##### What's new
124139

defender-office-365/submissions-users-report-message-add-in-configure.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ manager: deniseb
88
audience: Admin
99
ms.reviewer: dhagarwal
1010
ms.topic: how-to
11-
ms.date: 09/27/2024
11+
ms.date: 01/24/2025
1212
ms.localizationpriority: medium
1313
search.appverid:
1414
- MET150
@@ -66,15 +66,10 @@ After the add-in is installed and enabled, users see the following icons based o
6666
6767
- **Outlook on the web**:
6868

69-
- <u>The Report Message add-in</u>:
69+
- <u>The Report Message or Report Phishing icons in Outlook on the web (formerly known as Outlook Web App or OWA)</u>:
7070

7171
> [!div class="mx-imgBorder"]
72-
> :::image type="content" source="media/owa-report-message-icon.png" alt-text="The Report Message add-in icon in Outlook on the web." lightbox="media/owa-report-message-icon.png":::
73-
74-
- <u>The Report Phishing add-in</u>:
75-
76-
> [!div class="mx-imgBorder"]
77-
> :::image type="content" source="media/OWA-ReportPhishing.png" alt-text="The Report Phishing add-in icon in Outlook on the web." lightbox="media/OWA-ReportPhishing.png":::
72+
> :::image type="content" source="media/owa-report-message-icon.png" alt-text="The Report Message or Report Phishing add-in icons in Outlook on the web." lightbox="media/owa-report-message-icon.png":::
7873
7974
## What do you need to know before you begin?
8075

@@ -185,7 +180,7 @@ Install and configure the Report Message or Report Phishing add-ins for the orga
185180
186181
### Get the Report Message or the Report Phishing add-ins for your Microsoft 365 GCC or GCC High organization
187182

188-
Admins in Microsoft 365 Government Community Cloud (GCC) or GCC High need to use the steps in this section to get the Report Message or Report Phishing add-ins for their organizations. These steps apply to Outlook and Outlook on the web (formerly known as Outlook Web App or OWA) and don't apply to Outlook for iOS and Android.
183+
Admins in Microsoft 365 Government Community Cloud (GCC) or GCC High need to use the steps in this section to get the Report Message or Report Phishing add-ins for their organizations. These steps apply to Outlook and Outlook on the web and don't apply to Outlook for iOS and Android.
189184

190185
> [!NOTE]
191186
> It could take up to 24 hours for the add-in to appear in your organization.

defender-vulnerability-management/fixed-reported-inaccuracies.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier2
1414
ms.localizationpriority: medium
1515
ms.topic: troubleshooting
16-
ms.date: 01/09/2025
16+
ms.date: 01/24/2025
1717
---
1818

1919
# Vulnerability support in Microsoft Defender Vulnerability Management
@@ -45,6 +45,17 @@ The following tables present the relevant vulnerability information organized by
4545
| - | Fixed inaccuracy in Overwolf vulnerability - CVE-2024-7834 | 08-Jan-25 |
4646
| 87255 | Fixed inaccuracy in GOG Galaxy vulnerability - CVE-2023-50914 | 08-Jan-25 |
4747
| 86948 | Fixed inaccuracy in Samsung Video Player vulnerability - CVE-2024-49404 | 08-Jan-25 |
48+
| 69723 | Fixed vulnerability detection in Adobe Campaign | 14-Jan-25 |
49+
| 83313 | Fixed inaccuracy in Debian Inetutils | 16-Jan-25 |
50+
| - | Fixed inaccuracy in RedHat Kernel-debug packages | 16-Jan-25 |
51+
| - | Defender Vulnerability Management doesn't currently support Nvidia Cuda Pilot | 20-Jan-25 |
52+
| - | Fixed inaccuracy in Mattermost Desktop vulnerability- CVE-2024-39613 | 21-Jan-25 |
53+
| - | Added Microsoft Defender Vulnerability Management support to BeyondTrust Privileged Remote Access | 21-Jan-25 |
54+
| - | Fixed inaccuracy in BeyondTrust Remote Support | 21-Jan-25 |
55+
| - | Fixed vulnerability detection in InfluxDB | 22-Jan-25 |
56+
| 68411 | Fixed inaccurate detections in WebM Project libwebp by excluding razer file path | 22-Jan-25 |
57+
| 77999 | Defender Vulnerability Management doesn't currently support these four ESET vulnerabilities: <br/>- CVE-2020-11446<br/>- CVE-2023-5594<br/>- CVE-2023-3160<br/>- CVE-2024-7400 | 22-Jan-25 |
58+
4859

4960
## November 2024
5061

@@ -54,6 +65,7 @@ The following tables present the relevant vulnerability information organized by
5465
| 78428 | Added Microsoft Defender Vulnerability Management support to TeamViewer vulnerabilities- CVE-2024-7479 and CVE-2024-7481 | 12-Nov-24 |
5566
| 80922 | Fixed inaccuracy in Kingsoft WPS office vulnerability - CVE-2024-7263 | 12-Nov-24 |
5667
| 78951 | Fixed inaccuracy in Kingsoft WPS Office vulnerability - CVE-2024-35205 | 12-Nov-24 |
68+
| - | Defender Vulnerability Management doesn't currently support CVE-2006-5745 | 12-Nov-24 |
5769

5870
## October 2024
5971

0 commit comments

Comments
 (0)