Skip to content

Commit 2ac3710

Browse files
committed
Learn Editor: Update indicator-file.md
1 parent cbf0701 commit 2ac3710

File tree

1 file changed

+19
-21
lines changed

1 file changed

+19
-21
lines changed

defender-endpoint/indicator-file.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -32,58 +32,56 @@ search.appverid: met150
3232
> [!TIP]
3333
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
3434
35-
Prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization.
35+
> [!IMPORTANT]
36+
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
37+
38+
> [!NOTE]
39+
> For this feature to work on Windows Server 2016 and Windows Server 2012 R2, those devices must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2).
40+
> Custom file indicators with the Allow, Block and Remediate actions are now also available in the [enhanced antimalware engine capabilities for macOS and Linux](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enhanced-antimalware-engine-capabilities-for-linux-and-macos/ba-p/3292003).
41+
42+
File indicators prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization.
3643

3744
There are three ways you can create indicators for files:
3845

3946
- By creating an indicator through the settings page
4047
- By creating a contextual indicator using the add indicator button from the file details page
4148
- By creating an indicator through the [Indicator API](api/ti-indicator.md)
4249

43-
> [!NOTE]
44-
> For this feature to work on Windows Server 2016 and Windows Server 2012 R2, those devices must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2).
45-
> Custom file indicators with the Allow, Block and Remediate actions are now also available in the [enhanced antimalware engine capabilities for macOS and Linux](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enhanced-antimalware-engine-capabilities-for-linux-and-macos/ba-p/3292003).
50+
4651

4752
## Before you begin
4853

4954
Understand the following prerequisites before you create indicators for files:
5055

51-
### Windows prerequisites
52-
53-
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
5456
- [Behavior Monitoring is enabled](behavior-monitor.md)
5557

5658
- [Cloud-based protection is turned on](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
5759

5860
- [Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
5961

62+
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
63+
64+
### Windows prerequisites
65+
66+
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
6067
- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions)
6168

6269
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.
6370

6471
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
65-
66-
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
72+
73+
> [!NOTE]
74+
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
6775
6876
### macOS prerequisites
6977

7078
- [File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
7179

7280
### linux prerequisites
7381

74-
- Available in Defender for Endpoint version 101.85.27 or later.
75-
76-
- [File hash computation is enabled] from the portal or in the managed JSON (/defender-endpoint/linux-preferences#configure-file-hash-computation-feature)
82+
- Available in Defender for Endpoint version 101.85.27 or later.
7783

78-
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web.
79-
80-
> [!NOTE]
81-
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
82-
83-
84-
85-
> [!IMPORTANT]
86-
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
84+
- [File hash computation is enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) from the portal or in the managed JSON
8785

8886
## Create an indicator for files from the settings page
8987

0 commit comments

Comments
 (0)