Skip to content

Commit 28f81bc

Browse files
authored
Merge branch 'main' into permli
2 parents 0c082c1 + b0cb9b0 commit 28f81bc

File tree

11 files changed

+101
-19
lines changed

11 files changed

+101
-19
lines changed

defender-endpoint/edr-detection.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/01/2024
18+
ms.date: 08/06/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -33,7 +33,7 @@ ms.date: 08/01/2024
3333
- macOS
3434
- Microsoft Defender for Endpoint
3535
- Microsoft Defender for Endpoint on Linux
36-
- Microsoft Defender for Endpoint on macOS
36+
<!---- Microsoft Defender for Endpoint on macOS--->
3737

3838
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
3939

@@ -43,14 +43,13 @@ Run an EDR detection test to verify that the device is properly onboarded and re
4343

4444
1. Open a Command Prompt window
4545

46-
2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
46+
2. At the prompt, copy and run the following command. The Command Prompt window closes automatically.
4747

48+
```powershell
49+
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
50+
```
4851

49-
```powershell
50-
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
51-
```
52-
53-
3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
52+
3. If successful, the detection test is marked as completed and a new alert appears within a few minutes.
5453

5554
### Linux
5655

@@ -64,7 +63,7 @@ curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
6463
1. Extract the zip
6564

6665
```bash
67-
unzip ~/Downloads/MDE Linux DIY.zip
66+
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
6867
```
6968

7069
1. And run the following command:
@@ -77,6 +76,7 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
7776

7877
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
7978

79+
<!---
8080
### macOS
8181
8282
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,12 +129,16 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129129
130130
Look at the alert details and the device timeline, and perform the regular investigation steps.
131131
132-
Next steps that you can consider performing are to add AV exclusions as needed for application compatibility or performance:
132+
--->
133+
134+
## Next steps
135+
136+
If you're experiencing issues with application compatibility or performance, you might consider adding exclusions. See the following articles for more information:
133137

134138
- [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
135139
- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
136140
- [Manage suppression rules](manage-suppression-rules.md)
137141
- [Create indicators of compromise (IoC)](manage-indicators.md)
138142
- [Create and manage custom detections rules](/defender-xdr/custom-detection-rules)
139143

140-
Read through [Microsoft Defender for Endpoint Security Operations Guide](mde-sec-ops-guide.md).
144+
Also, see the [Microsoft Defender for Endpoint Security Operations Guide](mde-sec-ops-guide.md).

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 05/08/2024
18+
ms.date: 08/06/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Mac
@@ -70,14 +70,17 @@ There are several methods and deployment tools that you can use to install and c
7070
### System requirements
7171

7272
The three most recent major releases of macOS are supported.
73+
7374
- 14 (Sonoma), 13 (Ventura), 12 (Monterey)
75+
7476
> [!IMPORTANT]
7577
> On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).
7678
77-
- Supported processors: x64 and ARM64.
79+
- Supported processors: x64 and ARM64
80+
7881
- Disk space: 1GB
7982

80-
Beta versions of macOS aren't supported.
83+
- Beta versions of macOS aren't supported.
8184

8285
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
8386

@@ -119,6 +122,8 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
119122
>
120123
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
121124
125+
#### Test network connectivity
126+
122127
To test that a connection isn't blocked, open <https://x.cp.wd.microsoft.com/api/report> and <https://cdn.x.cp.wd.microsoft.com/ping> in a browser.
123128

124129
If you prefer the command line, you can also check the connection by running the following command in Terminal:

defender-office-365/quarantine-faq.yml

Lines changed: 53 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
ms.author: chrisda
77
author: chrisda
88
manager: deniseb
9-
ms.date: 11/3/2023
9+
ms.date: 08/05/2024
1010
audience: ITPro
1111
ms.topic: faq
1212

@@ -81,6 +81,9 @@ sections:
8181
8282
If the quarantine policy requires users to request the release of messages or requires admins to release messages, an admin must [approve the release request](quarantine-admin-manage-messages-files.md#approve-or-deny-release-requests-from-users-for-quarantined-email) or [release the message](quarantine-admin-manage-messages-files.md#release-quarantined-email) before the message is available to users.
8383
84+
You can't customize quarantine policies in preset security policies.
85+
86+
8487
- question: |
8588
What messages can end users access in quarantine?
8689
answer: |
@@ -93,7 +96,7 @@ sections:
9396
- question: |
9497
How can I prevent users from accessing quarantined messages?
9598
answer: |
96-
The default quarantine policy named AdminOnlyAccessPolicy prevents any user interaction with their quarantined messages. By default, this quarantine policy is used for messages that were quarantined as malware or high confidence phishing. In custom policies or the default policy for [protection features that support quarantining messages](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), admins can specify the AdminOnlyAccessPolicy as the quarantine policy to use.
99+
The default quarantine policy named AdminOnlyAccessPolicy prevents any user interaction with their quarantined messages. By default, this quarantine policy is used for messages that were quarantined as malware or high confidence phishing. In custom policies or the default policy for [protection features that support quarantining messages](quarantine-policies.md#step-2-assign-a-quarantine-policy-to-supported-features), admins can specify the AdminOnlyAccessPolicy as the quarantine policy to use. You can prevent end users from accessing `security.microsoft.com/quarantine`.
97100
98101
- question: |
99102
How do I find out why a message was quarantined?
@@ -111,6 +114,8 @@ sections:
111114
112115
When a message expires from quarantine, you can't recover it.
113116
117+
By default, messages from blocked senders are hidden from view in quarantine. Users need to select **Filter** and then deselect **Don't show blocked senders** to see all messages coming from blocked senders.
118+
114119
- question: |
115120
A message was released from quarantine, but the original recipient can't find it. How can I determine what happened to the message?
116121
answer: |
@@ -121,6 +126,10 @@ sections:
121126
122127
Verify that you aren't using third party filtering before you open a support ticket about these issues.
123128
129+
If a third party filter isn't preventing the message from reaching the user's Inbox, then admins can use force release functionality to release message (if the first release didn't work).
130+
131+
Admin should try to release the message to an alternate mailbox if the forced release doesn't work after third party filtering vendor is turned off.
132+
124133
- Inbox rules ([created by users in Outlook](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) or by admins using the **\*-InboxRule** cmdlets in Exchange Online PowerShell) can move or delete messages from the Inbox.
125134
126135
Admins can use [message trace](message-trace-defender-portal.md) to determine if a released message was delivered to the recipient's Inbox.
@@ -132,13 +141,17 @@ sections:
132141
133142
Verify that you aren't using third party filtering before you open a support ticket about this issue.
134143
144+
Admins can also use the audit log to see who released a message from Quarantine.
145+
135146
- question: |
136147
Can I release or report more than one quarantined message at a time?
137148
answer: |
138149
In the Microsoft Defender portal, you can select and release up to 100 messages at a time.
139150
140151
Admins can use the [Get-QuarantineMessage](/powershell/module/exchange/get-quarantinemessage) and [Release-QuarantineMessage](/powershell/module/exchange/release-quarantinemessage) cmdlets in Exchange Online PowerShell or standalone EOP PowerShell to find and release quarantined messages in bulk, and to report false positives in bulk.
141152
153+
Admins can also bulk delete messages.
154+
142155
- question: |
143156
Are wildcards supported when searching for quarantined messages? Can I search for quarantined messages for a specific domain?
144157
answer: |
@@ -200,6 +213,8 @@ sections:
200213
201214
Also, the protection policies in [preset security policies](preset-security-policies.md) are always applied _before_ custom protection policies. A user who's defined in the Standard or Strict preset security policy will never get a customized protection policy where the quarantine policy is customized to turn on quarantine notifications. For more information, see [Policy settings in preset security policies](preset-security-policies.md#policy-settings-in-preset-security-policies)
202215
216+
Quarantine notifications aren't enabled for messages quarantined by Exchange mail flow rules (transport rules) or data loss prevention (DLP). These messages have the AdminOnly quarantine policy. Quarantine notifications are also no generated for messages with DefaultFullAccess quarantine policy.
217+
203218
- question: |
204219
How do I customize quarantine notifications to add a custom logo?
205220
answer: |
@@ -210,6 +225,8 @@ sections:
210225
answer: |
211226
See the permissions entry [here](quarantine-admin-manage-messages-files.md#what-do-you-need-to-know-before-you-begin).
212227
228+
Admins can release quarantined messages to external recipients that aren't in their organization.
229+
213230
> [!TIP]
214231
> The ability to manage quarantined messages using [Exchange Online permissions](/exchange/permissions-exo/permissions-exo) ended in February 2023 per MC447339.
215232
>
@@ -224,3 +241,37 @@ sections:
224241
I can't preview a quarantined Microsoft Teams message. What's going on?
225242
answer: |
226243
If a user deletes the message from the Teams client, the message is gone, so Preview isn't available in quarantine for the deleted message.
244+
245+
- question: |
246+
I can't see the **Block sender** button or the **Approve release** button. What's going on?
247+
answer: |
248+
The **Block sender** action is disabled by default for quarantined messages. However, admins can create a custom quarantine policy to include the **Block sender** action for end users.
249+
250+
The **Approve release** button has been retired and replaced by the **Release** button.
251+
252+
- question: |
253+
**Filter** and **Search** aren't working. What's going on?
254+
answer: |
255+
The **Search** box applies to loaded quarantine messages only.
256+
257+
To filter by Internet Message ID, you need to ensure that angle brackets `<>` are always inluded (even in PowerShell).
258+
259+
- question: |
260+
Released quarantine messages are still showing up in Quarantine. What's going on?
261+
answer: |
262+
Released messages remain visible in quarantine unless they're explicitly deleted from quarantine.
263+
264+
- question: |
265+
Release request alerts aren't being generated. What's going on?
266+
answer: |
267+
Audit logging needs to be enabled (it's on by default).
268+
269+
- question: |
270+
Duplicate or multiple quarantine notifications are sent to the same user.
271+
answer: |
272+
Mutiple or duplicate quarantine notifications are sent if the SendFromAliasEnabled paraMETER value is True.
273+
274+
- question: |
275+
I can't see all recipients of a quarantined message. What's going on?
276+
answer: |
277+
For quarantine messages with a large number of recipients, we don't show all of the recipients. However, admins can use **View message header** or **Preview message** to see all recipients.

defender-xdr/advanced-hunting-query-results.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,28 @@ After running a query, select **Export** to save the results to local file. Your
111111
- **Table view**—The query results are exported in tabular form as a Microsoft Excel workbook
112112
- **Any chart**—The query results are exported as a JPEG image of the rendered chart
113113

114+
## Filter results
115+
116+
After running a query, select **Filter** to narrow down the results.
117+
118+
:::image type="content" source="/defender/media/add-filter1.png" alt-text="Screenshot of filters in advanced hunting." lightbox="/defender/media/add-filter1.png":::
119+
120+
To add a filter, select the data you want to filter for by selecting one or more of the check boxes. Then select **Add**.
121+
122+
:::image type="content" source="/defender/media/add-filter2.png" alt-text="Screenshot of filters dropdown in advanced hunting." lightbox="/defender/media/add-filter2.png":::
123+
124+
You can narrow the results down even further to specific data by selecting the newly added filter.
125+
126+
:::image type="content" source="/defender/media/add-filter3.png" alt-text="Screenshot of new filter pill in advanced hunting." lightbox="/defender/media/add-filter3.png":::
127+
128+
This opens a dropdown showing the possible filters you can use further. Select one or more of the check boxes, then select **Apply**.
129+
130+
:::image type="content" source="/defender/media/add-filter4.png" alt-text="Screenshot of new filter's dropdown in advanced hunting." lightbox="/defender/media/add-filter4.png":::
131+
132+
Confirm that you have added the filters that you wanted by checking the Filters section.
133+
134+
:::image type="content" source="/defender/media/add-filter5.png" alt-text="Screenshot of filters added advanced hunting." lightbox="/defender/media/add-filter5.png":::
135+
114136
## Drill down from query results
115137

116138
You can also explore the results in-line with the following features:

defender-xdr/m365d-remediation-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
ms.topic: conceptual
1717
ms.custom: autoir
1818
ms.reviewer: evaldm, isco
19-
ms.date: 02/17/2024
19+
ms.date: 08/06/2024
2020
---
2121

2222
# Remediation actions in Microsoft Defender XDR
@@ -27,7 +27,7 @@ ms.date: 02/17/2024
2727

2828
- Microsoft Defender XDR
2929

30-
During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. Automated investigations complete after remediation actions are taken, approved, or rejected.
30+
During and after an automated investigation in Microsoft Defender XDR, remediation actions are identified for malicious or suspicious items. Some kinds of remediation actions are taken on devices, also referred to as endpoints. Other remediation actions are taken on identities, accounts, and email content. In addition, some types of remediation actions can occur automatically, whereas other types of remediation actions are taken manually by your organization's security team. When an automated investigation results in one or more remediation actions, the investigation completes only when the remediation actions are taken, approved, or rejected.
3131

3232
> [!IMPORTANT]
3333
> Whether remediation actions are taken automatically or only upon approval depends on certain settings, such as automation levels. To learn more, see the following articles:

defender-xdr/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ You can also get product updates and important notifications through the [messag
6363
- (Preview) You can now filter your Microsoft Defender for Cloud alerts by the associated **alert subscription ID** in the Incidents and Alerts queues. For more information, see [Microsoft Defender for Cloud in Microsoft Defender XDR](microsoft-365-security-center-defender-cloud.md).
6464

6565

66-
66+
- (GA) You can now **[filter your results](advanced-hunting-query-results.md#filter-results)** in advanced hunting so you can narrow down your investigation on specific data you want to focus on.
6767

6868
## May 2024
6969

defender/media/add-filter1.png

47.1 KB
Loading

defender/media/add-filter2.png

81.9 KB
Loading

defender/media/add-filter3.png

9.96 KB
Loading

defender/media/add-filter4.png

12.4 KB
Loading

0 commit comments

Comments
 (0)