Skip to content

Commit 2d0569e

Browse files
committed
Merge branch 'main' into ASTQR-chrisda
2 parents 8ec11db + c9e141c commit 2d0569e

File tree

97 files changed

+817
-504
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+817
-504
lines changed

defender-endpoint/android-configure.md

Lines changed: 14 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -61,36 +61,32 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
6161

6262
1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
6363

64-
> [!div class="mx-imgBorder"]
65-
> ![Image of how to create a policy.](media/android-mem.png)
66-
64+
> [!div class="mx-imgBorder"]
6765
1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
6866

69-
> [!div class="mx-imgBorder"]
70-
> ![Image of policy details.](media/appconfigdetails.png)
71-
67+
> [!div class="mx-imgBorder"]
68+
> ![Screenshot of policy details.](media/appconfigdetails.png)
69+
7270
1. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'1'** to enable Network Protection. (Network protection is disabled by default)
7371

74-
> [!div class="mx-imgBorder"]
75-
> ![Image of how to select enable network protection policy](media/selectnp.png)
76-
77-
> [!div class="mx-imgBorder"]
78-
> ![Image of add configuration policy.](media/npvalue.png)
79-
72+
> [!div class="mx-imgBorder"]
73+
> ![Screenshot of how to select enable network protection policy](media/selectnp.png)
74+
75+
> [!div class="mx-imgBorder"]
76+
> ![Screenshot of add configuration policy.](media/npvalue.png)
77+
8078
1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
8179

8280
To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.
8381

8482
**Example of Thumbprint format to add**: `50 30 06 09 1d 97 d4 f5 ae 39 f7 cb e7 92 7d 7d 65 2d 34 31, 503006091d97d4f5ae39f7cbe7927d7d652d3431`
8583

86-
> [!IMPORTANT]
84+
> [!IMPORTANT]
8785
> Certificate SHA-1 Thumbprint characters should be with either white space separated, or non separated.
8886
>
8987
> This format is invalid: `50:30:06:09:1d:97:d4:f5:ae:39:f7:cb:e7:92:7d:7d:65:2d:34:31`
9088
91-
Any other separation characters are invalid.
92-
93-
> ![Image of trusted CA certificate.](media/trustca.png)
89+
Any other separation characters are invalid.
9490

9591
1. For other configurations related to Network protection, add the following keys and appropriate corresponding value.
9692

@@ -119,26 +115,6 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
119115

120116
> [!NOTE]
121117
> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
122-
123-
## Configure Low Touch Onboarding
124-
125-
Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is simply required to provide a reduced set of permissions to complete onboarding.
126-
127-
Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:
128-
129-
1. Push the Defender app to target user group by following these [steps](android-intune.md#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app).
130-
2. Push a VPN profile to the user's device by following the instructions [here](android-intune.md#auto-setup-of-always-on-vpn).
131-
3. In Apps > Application configuration policies, select Managed Devices.
132-
4. Provide a name to uniquely identify the policy. Select 'Android Enterprise' as the Platform, the required Profile type and 'Microsoft Defender: Antivirus' as the targeted app. Click on Next.
133-
5. Add runtime permissions. Select Location access (fine)(This permission is not supported for Android 13 and above), POST_NOTIFICATIONS and change the Permission state to 'Auto grant'.
134-
6. Under configuration settings, select 'Use Configuration designer' and click on Add.
135-
7. Select Low touch onboarding and User UPN. For User UPN, change the Value type to 'Variable' and Configuration value to 'User Principal Name' from the drop down Enable Low touch onboarding by changing the configuration value to 1.
136-
>[!div class="mx-imgBorder"]
137-
>![Image of low touch onboarding configuration policy.](media/low-touch-user-upn.png)
138-
139-
8. Assign the policy to the target user group.
140-
9. Review and create the policy.
141-
142118
## Privacy Controls
143119

144120
Following privacy controls are available for configuring the data that is sent by Defender for Endpoint from Android devices:
@@ -347,11 +323,11 @@ Use the following steps to configure the Device tags:
347323
5. Click Next and assign this policy to targeted devices and users.
348324

349325

350-
> [!NOTE]
326+
> [!NOTE]
351327
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
352-
353328
## Related articles
354329

355330
- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)
331+
356332
- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
357333
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/get-all-vulnerabilities.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -94,21 +94,22 @@ Here is an example of the response.
9494
"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Vulnerabilities",
9595
"value": [
9696
{
97-
"id": "CVE-2019-0608",
98-
"name": "CVE-2019-0608",
99-
"description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.",
100-
"severity": "Medium",
101-
"cvssV3": 4.3,
97+
"id": "CVE-2024-7256",
98+
"name": "CVE-2024-7256",
99+
"description": "Summary: Google Chrome is vulnerable to a security bypass due to insufficient data validation in Dawn. An attacker can exploit this vulnerability by tricking a user into visiting a malicious website, allowing them to bypass security restrictions. Impact: If successfully exploited, this vulnerability could allow a remote attacker to bypass security restrictions in Google Chrome. Remediation: Apply the latest patches and updates provided by the respective vendors. Generated by AI",
100+
"severity": "High",
101+
"cvssV3": 8,
102102
"cvssVector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
103-
"exposedMachines": 4,
104-
"publishedOn": "2019-10-08T00:00:00Z",
105-
"updatedOn": "2019-12-16T16:20:00Z",
103+
"exposedMachines": 23,
104+
"publishedOn": "2024-07-30T00:00:00Z",
105+
"updatedOn": "2024-07-31T00:00:00Z",
106+
"firstDetected": "2024-07-31T01:55:47Z",
106107
"publicExploit": false,
107108
"exploitVerified": false,
108109
"exploitInKit": false,
109110
"exploitTypes": [],
110111
"exploitUris": [],
111-
"CveSupportability": "supported",
112+
"cveSupportability": "Supported",
112113
"tags": [],
113114
"epss": 0.632
114115
}

defender-endpoint/cloud-protection-microsoft-antivirus-sample-submission.md

Lines changed: 14 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.reviewer: mkaminska, yongrhee
99
manager: deniseb
1010
ms.subservice: ngp
1111
ms.topic: conceptual
12-
ms.date: 02/18/2024
12+
ms.date: 08/20/2024
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -54,37 +54,25 @@ Microsoft Defender Antivirus and cloud protection automatically block most new,
5454

5555
3. High-precision antivirus, detecting common malware through generic and heuristic techniques.
5656

57-
1. Advanced cloud-based protection is provided for cases when Microsoft Defender Antivirus running on the endpoint needs more intelligence to verify the intent of a suspicious file.
57+
4. Advanced cloud-based protection is provided for cases when Microsoft Defender Antivirus running on the endpoint needs more intelligence to verify the intent of a suspicious file.
5858

5959
1. In the event Microsoft Defender Antivirus can't make a clear determination, file metadata is sent to the cloud protection service. Often within milliseconds, the cloud protection service can determine based on the metadata as to whether the file is malicious or not a threat.
6060

6161
- The cloud query of file metadata can be a result of behavior, mark of the web, or other characteristics where a clear verdict isn't determined.
62-
- A small metadata payload is sent, with the goal of reaching a verdict of malware or not a threat. The metadata doesn't include personally identifiable information (PII). Information such as filenames, are hashed.
62+
- A small metadata payload is sent, with the goal of reaching a verdict of malware or not a threat. The metadata doesn't include personal data, such as personally identifiable information (PII). Information such as filenames, are hashed.
6363
- Can be synchronous or asynchronous. For synchronous, the file won't open until the cloud renders a verdict. For asynchronous, the file opens while cloud protection performs its analysis.
6464
- Metadata can include PE attributes, static file attributes, dynamic and contextual attributes, and more (see [Examples of metadata sent to the cloud protection service](#examples-of-metadata-sent-to-the-cloud-protection-service)).
6565

66-
1. After examining the metadata, if Microsoft Defender Antivirus cloud protection can't reach a conclusive verdict, it can request a sample of the file for further inspection. This request honors the settings configuration for sample submission:
67-
68-
1. **Send safe samples automatically**
69-
- Safe samples are samples considered to not commonly contain PII data like: .bat, .scr, .dll, .exe.
70-
- If file is likely to contain PII, the user gets a request to allow file sample submission.
71-
- This option is the default on Windows, macOS, and Linux.
72-
73-
1. **Always Prompt**
74-
- If configured, the user is always prompted for consent before file submission
75-
- This setting isn't available in macOS and Linux cloud protection
76-
77-
3. **Send all samples automatically**
78-
- If configured, all samples are sent automatically
79-
- If you would like sample submission to include macros embedded in Word docs, you must choose "Send all samples automatically"
80-
- This setting isn't available on macOS cloud protection
81-
82-
1. **Do not send**
83-
- Prevents "block at first sight" based on file sample analysis
84-
- "Don't send" is the equivalent to the "Disabled" setting in macOS policy and "None" setting in Linux policy.
85-
- Metadata is sent for detections even when sample submission is disabled
86-
87-
1. After files are submitted to cloud protection, the submitted files can be **scanned**, **detonated**, and processed through **big data analysis** **machine-learning** models to reach a verdict. Turning off cloud-delivered protection limits analysis to only what the client can provide through local machine-learning models, and similar functions.
66+
2. After examining the metadata, if Microsoft Defender Antivirus cloud protection can't reach a conclusive verdict, it can request a sample of the file for further inspection. This request honors the setting configuration for sample submission, as described in the following table:
67+
68+
| Setting | Description |
69+
|---|---|
70+
| **Send safe samples automatically** | - Safe samples are samples considered to not commonly contain PII data. Examples include `.bat`, `.scr`, `.dll`, and `.exe`. <br/>- If file is likely to contain PII, the user gets a request to allow file sample submission.<br/>- This option is the default configuration on Windows, macOS, and Linux. |
71+
| **Always Prompt** | - If configured, the user is always prompted for consent before file submission<br/>- This setting isn't available in macOS and Linux cloud protection |
72+
| **Send all samples automatically** | - If configured, all samples are sent automatically<br/>- If you would like sample submission to include macros embedded in Word docs, you must choose **Send all samples automatically**<br/>- This setting isn't available on macOS cloud protection |
73+
| **Do not send** | - Prevents "block at first sight" based on file sample analysis<br/>- "Don't send" is the equivalent to the "Disabled" setting in macOS policy and "None" setting in Linux policy.<br/>- Metadata is sent for detections even when sample submission is disabled |
74+
75+
3. After files are submitted to cloud protection, the submitted files can be **scanned**, **detonated**, and processed through **big data analysis** **machine-learning** models to reach a verdict. Turning off cloud-delivered protection limits analysis to only what the client can provide through local machine-learning models, and similar functions.
8876

8977
> [!IMPORTANT]
9078
> [Block at first sight (BAFS)](configure-block-at-first-sight-microsoft-defender-antivirus.md) provides detonation and analysis to determine whether a file or process is safe. BAFS can delay the opening of a file momentarily until a verdict is reached. If you disable sample submission, BAFS is also disabled, and file analysis is limited to metadata only. We recommend keeping sample submission and BAFS enabled. To learn more, see [What is "block at first sight"?](configure-block-at-first-sight-microsoft-defender-antivirus.md#what-is-block-at-first-sight)
@@ -132,7 +120,7 @@ For more information, see the following resources:
132120

133121
- [Azure Compliance Offerings](/azure/storage/common/storage-compliance-offerings)
134122
- [Service Trust Portal](https://servicetrust.microsoft.com)
135-
- [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md#data-storage-location)
123+
- [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md)
136124

137125
## Other file sample submission scenarios
138126

0 commit comments

Comments
 (0)