You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/machines-view-overview.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -288,6 +288,9 @@ You can sort the entries by clicking on an available column header. Select :::im
288
288
> - Narrow the width of appropriate columns.
289
289
> - Zoom out in your web browser.
290
290
291
+
> [!TIP]
292
+
> The API, UI, export, and AH interfaces all draw from a single authoritative data source. However, because each is powered by separate backend systems with different update frequencies, slight variations may appear across views—especially in short-term queries or recently reactivated devices. Each interface is optimized for its specific use case: export for large data retrieval, UI for fast interactive tasks like tag management, and AH for tracking device update history over time.
293
+
291
294
## Related articles
292
295
293
296
[Investigate devices in the Microsoft Defender for Endpoint Devices list](investigate-machines.md).
@@ -52,17 +52,34 @@ In this demonstration article, you have two engine choices to test AMSI:
52
52
```powershell
53
53
$testString = "AMSI Test Sample: " + "7e72c3ce-861b-4339-8740-0ac1484c1386"
54
54
Invoke-Expression $testString
55
-
```
55
+
```powershell
56
56
57
-
2. On your device, open PowerShell as an administrator.
57
+
1. On your device, open PowerShell as an administrator.
58
58
59
-
3. Type `Powershell -ExecutionPolicy Bypass AMSI_PoSh_script.ps1`, and then press **Enter**.
59
+
1. Type `Powershell -ExecutionPolicy Bypass AMSI_PoSh_script.ps1`, and then press **Enter**.
60
60
61
61
The result should be as follows:
62
62
63
-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-powershell-results.png" alt-text="Screenshot showing the results of the AMSI test sample. It should show a threat was detected." lightbox="media/mde-demonstrations-amsi/test-amsi-powershell-results.png":::
63
+
```powershell
64
+
Invoke-Expression : At line:1 char:1
65
+
66
+
+ AMSI Test Sample: 7e72c3ce-861b-4339-8740-8ac1484c1386
1. Save the following VBScript as `AMSI_vbscript.vbs`:
@@ -74,20 +91,63 @@ In this demonstration article, you have two engine choices to test AMSI:
74
91
WScript.Echo result
75
92
```
76
93
77
-
2. On your Windows Device, open Command Prompt as an administrator.
94
+
1. On your Windows Device, open Command Prompt as an administrator.
78
95
79
96
1. Type `wscript AMSI_vbscript.vbs`, and then press **Enter**.
80
97
81
98
The result should be as follows:
82
99
83
-
:::image type="content" source="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png" alt-text="Screenshot showing the AMSI test results. It should show that antivirus software blocked the script." lightbox="media/mde-demonstrations-amsi/test-amsi-vbscript-results.png":::
In your protection history, you should be able to see the following information:
89
119
90
-
:::image type="content" source="media/mde-demonstrations-amsi/verifying-results.png" alt-text="Screenshot showing the AMSI test results. The information should show that a threat was blocked and cleaned." lightbox="media/mde-demonstrations-amsi/verifying-results.png":::
### Get the list of Microsoft Defender Antivirus threats
93
153
@@ -101,17 +161,68 @@ You can view detected threats by using the Event log or PowerShell.
101
161
102
162
3. Look for `event ID 1116`. You should see the following information:
103
163
104
-
:::image type="content" source="media/mde-demonstrations-amsi/eventid1116.png" alt-text="Screenshot showing Event ID 1116, which says malware or unwanted software was detected." lightbox="media/mde-demonstrations-amsi/eventid1116.png":::
164
+
```powershell
165
+
166
+
Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
167
+
168
+
For more information please see the following: https://go.microsoft.com/fwlink/?linkid=37020&name=Virus:Win32/MpTest!amsi&t
169
+
170
+
Name: Virus:Win32/MpTest!amsi
171
+
172
+
ID: 2147694217
173
+
174
+
Severity: Severe
175
+
176
+
Category: Virus
177
+
178
+
Path: \Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or C:\Users\Admin\Desktop\AMSI_jscri
179
+
180
+
Detection Origin: Local machine or Unknown
181
+
182
+
Detection Type: Concrete
183
+
184
+
Detection Source: System
185
+
186
+
User: NT AUTHORITY\SYSTEM
105
187
106
-
##### Use PowerShell
188
+
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or C:\Windows\System32\cscript.exe or C:\Windows\Sy
:::image type="content" source="media/mde-demonstrations-amsi/get-mpthreat-results.png" alt-text="Screenshot showing the results of the Get-MpThreat command. It should show that an AMSI threat was detected." lightbox="media/mde-demonstrations-amsi/get-mpthreat-results.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-security-config-mgt.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ The following table lists errors and directions on what to try/check in order to
72
72
|`40`|Clock sync issue|The device was successfully onboarded to Microsoft Defender for Endpoint. However, there was an error in the security configuration management flow. Verify that the clock is set correctly and is synced on the device where the error occurs.|
73
73
|`43`|MDE and ConfigMgr|The device is managed using Configuration Manager and Microsoft Defender for Endpoint. Controlling policies through both channels may cause conflicts and undesired results. To avoid this, endpoint security policies should be isolated to a single control plane. |
74
74
|`2`|Device is not enrolled and has never been enrolled|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is not enrolled to be managed by Defender for Endpoint. For more information, see [Configure Microsoft Defender for Endpoint](/mem/intune/protect/mde-security-integration?pivots=mdssc-preview). |
75
-
|`4`|Device is managed by SCCM Agent|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is configured to be managed by SCCM. In order for the machine to be managed by MDE go to Settings > Endpoints > Configuration Management > Enforcement Scope and turn of the "Manage Security setting using Configuration Manager" toggle. For more information on co-existence with Configuration Manager, see [Defender for Endpoint integration with Configuration Manager](/mem/intune/protect/mde-security-integration#co-existence-with-microsoft-endpoint-configuration-manager). |
75
+
|`4`|Device is managed by SCCM Agent|The device was successfully onboarded to Microsoft Defender for Endpoint. However, it is configured to be managed by SCCM. In order for the machine to be managed by MDE go to Settings > Endpoints > Configuration Management > Enforcement Scope and turn off the "Manage Security setting using Configuration Manager" toggle. For more information on co-existence with Configuration Manager, see [Defender for Endpoint integration with Configuration Manager](/mem/intune/protect/mde-security-integration#co-existence-with-microsoft-endpoint-configuration-manager). |
Copy file name to clipboardExpand all lines: defender-endpoint/whats-new-in-microsoft-defender-endpoint.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ author: limwainstein
8
8
ms.reviewer: noamhadash, pahuijbr, yongrhee
9
9
ms.localizationpriority: medium
10
10
ms.date: 08/20/2025
11
-
manager: orspodek
11
+
manager: bagol
12
12
audience: ITPro
13
13
ms.collection:
14
14
- m365-security
@@ -44,7 +44,8 @@ Learn more:
44
44
45
45
|Feature |Preview/GA |Description |
46
46
|---------|------------|-------------|
47
-
|[Microsoft Defender Core service](/defender-endpoint/microsoft-defender-core-service-overview)|GA |- Microsoft Defender Core service, now in GA, helps with the stability and performance of Microsoft Defender Antivirus.<br>- Support for Azure Stack HCI OS is rolling out across commercial and government clouds.|
47
+
|Azure Stack HCI OS support (version 23H2 and later) |Preview |Added support for Azure Stack HCI OS, version 23H2 and later. Support for Azure Stack HCI OS is rolling out across commercial and government clouds. |
48
+
|[Microsoft Defender Core service](/defender-endpoint/microsoft-defender-core-service-overview)|GA |Microsoft Defender Core service, now in GA, helps with the stability and performance of Microsoft Defender Antivirus.|
0 commit comments