You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
30
30
31
-
Behavior Monitoring in Microsoft Defender Antivirus monitors process behavior to detect and analyze potential threats based on the behavior of applications, services, and files. Rather than relying solely on content matching, which identifies known malware patterns, behavior monitoring focuses on observing how software behaves in real-time.
31
+
Behavior monitoring in Microsoft Defender Antivirus monitors process behavior to detect and analyze potential threats based on the behavior of applications, services, and files. Rather than relying solely on content matching, which identifies known malware patterns, behavior monitoring focuses on observing how software behaves in real-time.
32
32
33
33
## Scenario requirements and setup
34
34
35
-
- This demonstration only runs on macOS
35
+
- Windows 11, Windows 10, Windows 8.1, Windows 7 SP1
36
+
37
+
- Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012, and Windows Server 2008 R2
38
+
39
+
- macOS
40
+
36
41
-[Microsoft Defender Real-time protection is enabled](#verify-microsoft-defender-real-time-protection-is-enabled)
42
+
37
43
-[Behavior Monitoring is enabled](#enable-behavior-monitoring-for-microsoft-defender-for-endpoint)
38
44
45
+
## Windows
46
+
47
+
### Verify Microsoft Defender real-time protection is enabled
48
+
49
+
To verify real-time protection is enabled, open PowerShell as an administrator, and then run the following command:
When real-time protection is enabled, the result shows a value of `True`.
56
+
57
+
### Enable Behavior Monitoring for Microsoft Defender for Endpoint
58
+
59
+
For more information on how to enable Behavior Monitoring for Defender for Endpoint, see [how to enable Behavior Monitoring](/defender-endpoint/behavior-monitor).
60
+
61
+
### Demonstration of how Behavior Monitoring works in Windows and Windows Server
62
+
63
+
To demonstrate how Behavior Monitoring blocks a payload, run the following PowerShell command:
hidden : The term 'hidden' is not recognized as the name of a cmdlet, function, script, script file, or operable program. Check the spelling of the name, or if a path was included, verify that the path is correct and try again.
In the [Microsoft Defender portal](https://security.microsoft.com), you should see information like this:
105
+
106
+
`Suspicious 'BmTestOfflineUI' behavior was blocked`
107
+
108
+
When you select it, you see the alert tree that has the following information:
109
+
110
+
`Defender detected and terminated active 'Behavior:Win32/BmTestOfflineUI' in process 'powershell.exe' during behavior monitoring`
111
+
112
+
## macOS
113
+
39
114
### Verify Microsoft Defender Real-time protection is enabled
40
115
41
116
To verify real-time protection (RTP) is enabled, open a terminal window and copy and execute the following command:
42
117
43
-
```bash
44
-
mdatp health --field real_time_protection_enabled
45
-
```
118
+
```bash
119
+
mdatp health --field real_time_protection_enabled
120
+
```
46
121
47
122
When RTP is enabled, the result shows a value of 1.
48
123
49
124
### Enable Behavior Monitoring for Microsoft Defender for Endpoint
50
125
51
-
For more information on how to enable Behavior Monitoring for Defender for Endpoint, see [Deployment instructions](behavior-monitor-macos.md#deployment-instructions).
126
+
For more information on how to enable behavior monitoring for Defender for Endpoint, see [Deployment instructions](behavior-monitor-macos.md#deployment-instructions).
52
127
53
128
### Demonstration of how Behavior Monitoring works
54
129
@@ -63,7 +138,8 @@ To demonstrate how Behavior Monitoring blocks a payload:
63
138
sleep 5
64
139
```
65
140
66
-
2. Save as BM_test.sh
141
+
2. Save as `BM_test.sh`.
142
+
67
143
3. Run the following command to make the bash script executable:
68
144
69
145
```bash
@@ -72,30 +148,32 @@ To demonstrate how Behavior Monitoring blocks a payload:
72
148
73
149
4. Run the bash script:
74
150
75
-
```bash
76
-
sudo bash BM_test.sh
77
-
```
151
+
```bash
152
+
sudo bash BM_test.sh
153
+
```
78
154
79
-
The result shows:
155
+
The result should look like this
80
156
81
-
zsh: killed sudo bash BM_test.sh
157
+
`zsh: killed sudo bash BM_test.sh`
82
158
83
-
The file was quarantined by Defender for Endpoint on macOS. Use the following command to list all the detected threats:
159
+
The file was quarantined by Defender for Endpoint on macOS. Use the following command to list all the detected threats:
84
160
85
-
```bash
86
-
mdatp threat list
87
-
```
161
+
```bash
162
+
mdatp threat list
163
+
```
88
164
89
-
The result shows:
165
+
The result shows information like this:
90
166
91
-
ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
167
+
```console
168
+
ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
92
169
93
-
Name: Behavior: MacOS/MacOSChangeFileTest
170
+
Name: Behavior: MacOS/MacOSChangeFileTest
94
171
95
-
Type: "behavior"
172
+
Type: "behavior"
96
173
97
-
Detection time: Tue May 7 20:23:41 2024
174
+
Detection time: Tue May 7 20:23:41 2024
98
175
99
-
Status: "quarantined"
176
+
Status: "quarantined"
177
+
```
100
178
101
-
If you have Microsoft Defender for Endpoint P2/P1 or Microsoft Defender for Business, go to the [Microsoft Defender XDR portal](https://security.microsoft.com), and you'll see an alert named: "Suspicious 'MacOSChangeFileTest' behavior was blocked."
179
+
If you have Microsoft Defender for Endpoint P2/P1 or Microsoft Defender for Business, go to the [Microsoft Defender portal](https://security.microsoft.com), and you see an alert titled, *Suspicious 'MacOSChangeFileTest' behavior was blocked*.
Copy file name to clipboardExpand all lines: defender-office-365/air-custom-reporting.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,8 +30,6 @@ appliesto:
30
30
31
31
With [Microsoft Defender for Office 365](mdo-about.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about [automated investigations](air-about.md) with such a solution, you can use the Office 365 Management Activity API.
32
32
33
-
With [Microsoft Defender for Office 365](mdo-about.md), you get [detailed information about automated investigations](air-view-investigation-results.md). However, some organizations also use a custom or third-party reporting solution. If your organization wants to integrate information about automated investigations with such a solution, you can use the Office 365 Management Activity API.
34
-
35
33
|Resource|Description|
36
34
|:---|:---|
37
35
|[Office 365 Management APIs overview](/office/office-365-management-api/office-365-management-apis-overview)|The Office 365 Management Activity API provides information about various user, admin, system, and policy actions and events from Microsoft 365 and Microsoft Entra activity logs.|
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-cloudappevents-table.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier3
17
17
ms.topic: reference
18
-
ms.date: 12/29/2023
18
+
ms.date: 06/09/2024
19
19
---
20
20
21
21
# CloudAppEvents
@@ -65,6 +65,8 @@ For information on other tables in the advanced hunting schema, [see the advance
65
65
|`AdditionalFields`|`dynamic`| Additional information about the entity or event |
66
66
|`LastSeenForUser`|`string`| Shows how many days back the attribute was recently in use by the user in days (i.e. ISP, ActionType etc.) |
67
67
|`UncommonForUser`|`string`| Lists the attributes in the event that are uncommon for the user, using this data to help rule out false positives and find out anomalies |
68
+
|`AuditSource`|`string`| Audit data source, including one of the following: <br>- Defender for Cloud Apps access control <br>- Defender for Cloud Apps session control <br>- Defender for Cloud Apps app connector |
69
+
|`SessionData`|`dynamic`| The Defender for Cloud Apps session ID for access or session control. For example: `{InLineSessionId:"232342"}`|
0 commit comments