You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# EDR detection test for verifying device's onboarding and reporting services
@@ -33,7 +33,7 @@ ms.date: 08/01/2024
33
33
- macOS
34
34
- Microsoft Defender for Endpoint
35
35
- Microsoft Defender for Endpoint on Linux
36
-
- Microsoft Defender for Endpoint on macOS
36
+
<!---- Microsoft Defender for Endpoint on macOS--->
37
37
38
38
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
39
39
@@ -43,14 +43,13 @@ Run an EDR detection test to verify that the device is properly onboarded and re
43
43
44
44
1. Open a Command Prompt window
45
45
46
-
2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
46
+
2. At the prompt, copy and run the following command. The Command Prompt window closes automatically.
3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
52
+
3. If successful, the detection test is marked as completed and a new alert appears within a few minutes.
54
53
55
54
### Linux
56
55
@@ -64,7 +63,7 @@ curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
64
63
1. Extract the zip
65
64
66
65
```bash
67
-
unzip ~/Downloads/MDELinuxDIY.zip
66
+
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
68
67
```
69
68
70
69
1. And run the following command:
@@ -77,6 +76,7 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
77
76
78
77
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
79
78
79
+
<!---
80
80
### macOS
81
81
82
82
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,12 +129,16 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129
129
130
130
Look at the alert details and the device timeline, and perform the regular investigation steps.
131
131
132
-
Next steps that you can consider performing are to add AV exclusions as needed for application compatibility or performance:
132
+
--->
133
+
134
+
## Next steps
135
+
136
+
If you're experiencing issues with application compatibility or performance, you might consider adding exclusions. See the following articles for more information:
133
137
134
138
-[Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
135
139
-[Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-mac.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: macos
17
17
search.appverid: met150
18
-
ms.date: 05/08/2024
18
+
ms.date: 08/06/2024
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Mac
@@ -70,14 +70,17 @@ There are several methods and deployment tools that you can use to install and c
70
70
### System requirements
71
71
72
72
The three most recent major releases of macOS are supported.
73
+
73
74
- 14 (Sonoma), 13 (Ventura), 12 (Monterey)
75
+
74
76
> [!IMPORTANT]
75
77
> On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).
76
78
77
-
- Supported processors: x64 and ARM64.
79
+
- Supported processors: x64 and ARM64
80
+
78
81
- Disk space: 1GB
79
82
80
-
Beta versions of macOS aren't supported.
83
+
-Beta versions of macOS aren't supported.
81
84
82
85
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
83
86
@@ -119,6 +122,8 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
119
122
>
120
123
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
121
124
125
+
#### Test network connectivity
126
+
122
127
To test that a connection isn't blocked, open <https://x.cp.wd.microsoft.com/api/report> and <https://cdn.x.cp.wd.microsoft.com/ping> in a browser.
123
128
124
129
If you prefer the command line, you can also check the connection by running the following command in Terminal:
Copy file name to clipboardExpand all lines: defender-office-365/quarantine-faq.yml
+53-2Lines changed: 53 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ metadata:
6
6
ms.author: chrisda
7
7
author: chrisda
8
8
manager: deniseb
9
-
ms.date: 11/3/2023
9
+
ms.date: 08/05/2024
10
10
audience: ITPro
11
11
ms.topic: faq
12
12
@@ -81,6 +81,9 @@ sections:
81
81
82
82
If the quarantine policy requires users to request the release of messages or requires admins to release messages, an admin must [approve the release request](quarantine-admin-manage-messages-files.md#approve-or-deny-release-requests-from-users-for-quarantined-email) or [release the message](quarantine-admin-manage-messages-files.md#release-quarantined-email) before the message is available to users.
83
83
84
+
You can't customize quarantine policies in preset security policies.
85
+
86
+
84
87
- question: |
85
88
What messages can end users access in quarantine?
86
89
answer: |
@@ -93,7 +96,7 @@ sections:
93
96
- question: |
94
97
How can I prevent users from accessing quarantined messages?
95
98
answer: |
96
-
The default quarantine policy named AdminOnlyAccessPolicy prevents any user interaction with their quarantined messages. By default, this quarantine policy is used for messages that were quarantined as malware or high confidence phishing. In custom policies or the default policy for [protection features that support quarantining messages](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), admins can specify the AdminOnlyAccessPolicy as the quarantine policy to use.
99
+
The default quarantine policy named AdminOnlyAccessPolicy prevents any user interaction with their quarantined messages. By default, this quarantine policy is used for messages that were quarantined as malware or high confidence phishing. In custom policies or the default policy for [protection features that support quarantining messages](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), admins can specify the AdminOnlyAccessPolicy as the quarantine policy to use. You can prevent end users from accessing `security.microsoft.com/quarantine`.
97
100
98
101
- question: |
99
102
How do I find out why a message was quarantined?
@@ -111,6 +114,8 @@ sections:
111
114
112
115
When a message expires from quarantine, you can't recover it.
113
116
117
+
By default, messages from blocked senders are hidden from view in quarantine. Users need to select **Filter** and then deselect **Don't show blocked senders** to see all messages coming from blocked senders.
118
+
114
119
- question: |
115
120
A message was released from quarantine, but the original recipient can't find it. How can I determine what happened to the message?
116
121
answer: |
@@ -121,6 +126,10 @@ sections:
121
126
122
127
Verify that you aren't using third party filtering before you open a support ticket about these issues.
123
128
129
+
If a third party filter isn't preventing the message from reaching the user's Inbox, then admins can use force release functionality to release message (if the first release didn't work).
130
+
131
+
Admin should try to release the message to an alternate mailbox if the forced release doesn't work after third party filtering vendor is turned off.
132
+
124
133
- Inbox rules ([created by users in Outlook](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) or by admins using the **\*-InboxRule** cmdlets in Exchange Online PowerShell) can move or delete messages from the Inbox.
125
134
126
135
Admins can use [message trace](message-trace-defender-portal.md) to determine if a released message was delivered to the recipient's Inbox.
@@ -132,13 +141,17 @@ sections:
132
141
133
142
Verify that you aren't using third party filtering before you open a support ticket about this issue.
134
143
144
+
Admins can also use the audit log to see who released a message from Quarantine.
145
+
135
146
- question: |
136
147
Can I release or report more than one quarantined message at a time?
137
148
answer: |
138
149
In the Microsoft Defender portal, you can select and release up to 100 messages at a time.
139
150
140
151
Admins can use the [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage) and [Release-QuarantineMessage](/powershell/module/exchange/release-quarantinemessage) cmdlets in Exchange Online PowerShell or standalone EOP PowerShell to find and release quarantined messages in bulk, and to report false positives in bulk.
141
152
153
+
Admins can also bulk delete messages.
154
+
142
155
- question: |
143
156
Are wildcards supported when searching for quarantined messages? Can I search for quarantined messages for a specific domain?
144
157
answer: |
@@ -200,6 +213,8 @@ sections:
200
213
201
214
Also, the protection policies in [preset security policies](preset-security-policies.md) are always applied _before_ custom protection policies. A user who's defined in the Standard or Strict preset security policy will never get a customized protection policy where the quarantine policy is customized to turn on quarantine notifications. For more information, see [Policy settings in preset security policies](preset-security-policies.md#policy-settings-in-preset-security-policies)
202
215
216
+
Quarantine notifications aren't enabled for messages quarantined by Exchange mail flow rules (transport rules) or data loss prevention (DLP). These messages have the AdminOnly quarantine policy. Quarantine notifications are also no generated for messages with DefaultFullAccess quarantine policy.
217
+
203
218
- question: |
204
219
How do I customize quarantine notifications to add a custom logo?
205
220
answer: |
@@ -210,6 +225,8 @@ sections:
210
225
answer: |
211
226
See the permissions entry [here](quarantine-admin-manage-messages-files.md#what-do-you-need-to-know-before-you-begin).
212
227
228
+
Admins can release quarantined messages to external recipients that aren't in their organization.
229
+
213
230
> [!TIP]
214
231
> The ability to manage quarantined messages using [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) ended in February 2023 per MC447339.
215
232
>
@@ -224,3 +241,37 @@ sections:
224
241
I can't preview a quarantined Microsoft Teams message. What's going on?
225
242
answer: |
226
243
If a user deletes the message from the Teams client, the message is gone, so Preview isn't available in quarantine for the deleted message.
244
+
245
+
- question: |
246
+
I can't see the **Block sender** button or the **Approve release** button. What's going on?
247
+
answer: |
248
+
The **Block sender** action is disabled by default for quarantined messages. However, admins can create a custom quarantine policy to include the **Block sender** action for end users.
249
+
250
+
The **Approve release** button has been retired and replaced by the **Release** button.
251
+
252
+
- question: |
253
+
**Filter** and **Search** aren't working. What's going on?
254
+
answer: |
255
+
The **Search** box applies to loaded quarantine messages only.
256
+
257
+
To filter by Internet Message ID, you need to ensure that angle brackets `<>` are always inluded (even in PowerShell).
258
+
259
+
- question: |
260
+
Released quarantine messages are still showing up in Quarantine. What's going on?
261
+
answer: |
262
+
Released messages remain visible in quarantine unless they're explicitly deleted from quarantine.
263
+
264
+
- question: |
265
+
Release request alerts aren't being generated. What's going on?
266
+
answer: |
267
+
Audit logging needs to be enabled (it's on by default).
268
+
269
+
- question: |
270
+
Duplicate or multiple quarantine notifications are sent to the same user.
271
+
answer: |
272
+
Mutiple or duplicate quarantine notifications are sent if the SendFromAliasEnabled paraMETER value is True.
273
+
274
+
- question: |
275
+
I can't see all recipients of a quarantined message. What's going on?
276
+
answer: |
277
+
For quarantine messages with a large number of recipients, we don't show all of the recipients. However, admins can use **View message header** or **Preview message** to see all recipients.
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-query-results.md
+22Lines changed: 22 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,6 +111,28 @@ After running a query, select **Export** to save the results to local file. Your
111
111
-**Table view**—The query results are exported in tabular form as a Microsoft Excel workbook
112
112
-**Any chart**—The query results are exported as a JPEG image of the rendered chart
113
113
114
+
## Filter results
115
+
116
+
After running a query, select **Filter** to narrow down the results.
117
+
118
+
:::image type="content" source="/defender/media/add-filter1.png" alt-text="Screenshot of filters in advanced hunting." lightbox="/defender/media/add-filter1.png":::
119
+
120
+
To add a filter, select the data you want to filter for by selecting one or more of the check boxes. Then select **Add**.
121
+
122
+
:::image type="content" source="/defender/media/add-filter2.png" alt-text="Screenshot of filters dropdown in advanced hunting." lightbox="/defender/media/add-filter2.png":::
123
+
124
+
You can narrow the results down even further to specific data by selecting the newly added filter.
125
+
126
+
:::image type="content" source="/defender/media/add-filter3.png" alt-text="Screenshot of new filter pill in advanced hunting." lightbox="/defender/media/add-filter3.png":::
127
+
128
+
This opens a dropdown showing the possible filters you can use further. Select one or more of the check boxes, then select **Apply**.
129
+
130
+
:::image type="content" source="/defender/media/add-filter4.png" alt-text="Screenshot of new filter's dropdown in advanced hunting." lightbox="/defender/media/add-filter4.png":::
131
+
132
+
Confirm that you have added the filters that you wanted by checking the Filters section.
133
+
134
+
:::image type="content" source="/defender/media/add-filter5.png" alt-text="Screenshot of filters added advanced hunting." lightbox="/defender/media/add-filter5.png":::
135
+
114
136
## Drill down from query results
115
137
116
138
You can also explore the results in-line with the following features:
Copy file name to clipboardExpand all lines: defender-xdr/m365d-remediation-actions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
ms.topic: conceptual
17
17
ms.custom: autoir
18
18
ms.reviewer: evaldm, isco
19
-
ms.date: 02/17/2024
19
+
ms.date: 08/06/2024
20
20
---
21
21
22
22
# Remediation actions in Microsoft Defender XDR
@@ -27,7 +27,7 @@ ms.date: 02/17/2024
27
27
28
28
- Microsoft Defender XDR
29
29
30
-
During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. Automated investigations complete after remediation actions are taken, approved, or rejected.
30
+
During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. In addition, some types of remediation actions can occur automatically, whereas other types of remediation actions are taken manually by your organization's security team. When an automated investigation results in one or more remediation actions, the investigation completes only when the remediation actions are taken, approved, or rejected.
31
31
32
32
> [!IMPORTANT]
33
33
> Whether remediation actions are taken automatically or only upon approval depends on certain settings, such as automation levels. To learn more, see the following articles:
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -63,7 +63,7 @@ You can also get product updates and important notifications through the [messag
63
63
- (Preview) You can now filter your Microsoft Defender for Cloud alerts by the associated **alert subscription ID** in the Incidents and Alerts queues. For more information, see [Microsoft Defender for Cloud in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud.md).
64
64
65
65
66
-
66
+
- (GA) You can now **[filter your results](advanced-hunting-query-results.md#filter-results)** in advanced hunting so you can narrow down your investigation on specific data you want to focus on.
0 commit comments