Skip to content

Commit 2de923b

Browse files
committed
Merge branch 'main' into QuarRB-chrisda
2 parents 82da5da + e361fd6 commit 2de923b

37 files changed

+427
-161
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -643,6 +643,8 @@
643643
href: schedule-antivirus-scans-powershell.md
644644
- name: Schedule scans using WMI
645645
href: schedule-antivirus-scans-wmi.md
646+
- name: Full scan best practices
647+
href: mdav-scan-best-practices.md
646648
- name: Use limited periodic scanning in Microsoft Defender Antivirus
647649
href: limited-periodic-scanning-microsoft-defender-antivirus.md
648650
- name: Protect Dev Drive using performance mode

defender-endpoint/android-intune.md

Lines changed: 96 additions & 61 deletions
Large diffs are not rendered by default.

defender-endpoint/attack-surface-reduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,8 @@ ms.date: 05/02/2024
3131
**Platforms**
3232
- Windows
3333

34-
> [!TIP]
35-
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268615), which helps you utilize essential tools and automated features such as attack surface reduction and next-generation protection. When signed in to the Microsoft 365 admin center, this guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268522).
34+
[!INCLUDE [MDE automated setup guide](../includes/mde-automated-setup-guide.md)]
35+
3636
## Why attack surface reduction rules are important
3737

3838
Your organization's attack surface includes all the places where an attacker could compromise your organization's devices or networks. Reducing your attack surface means protecting your organization's devices and network, which leaves attackers with fewer ways to perform attacks. Configuring attack surface reduction rules in Microsoft Defender for Endpoint can help!

defender-endpoint/configure-server-endpoints.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,7 @@ This article describes how to onboard specific Windows servers to Microsoft Defe
3838

3939
For guidance on how to download and use Windows Security Baselines for Windows servers, see [Windows Security Baselines](/windows/device-security/windows-security-baselines).
4040

41-
> [!TIP]
42-
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268615), which helps you utilize essential tools and automated features such as attack surface reduction and next-generation protection. When signed in to the Microsoft 365 admin center, this guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268522).
41+
[!INCLUDE [MDE automated setup guide](../includes/mde-automated-setup-guide.md)]
4342

4443
## Windows Server onboarding overview
4544

defender-endpoint/defender-compatibility.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@ The Microsoft Defender for Endpoint agent depends on Microsoft Defender Antiviru
3535
3636
For optimal protection, configure the following settings for devices that are onboarded to Defender for Endpoint, whether Microsoft Defender Antivirus is the active antimalware solution or not:
3737

38-
- Security intelligence updates (which also updates the scan engine)
39-
- Platform Update updates
38+
- [Security intelligence updates](microsoft-defender-antivirus-updates.md#security-intelligence-updates) (which also updates the scan engine)
39+
- [Platform updates](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions)
4040

4141
For more information, see [Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).
4242

defender-endpoint/device-timeline-event-flag.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.date: 11/06/2023
2424

2525
**Applies to:**
2626
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender XDR](/defender-xdr)
27+
2828

2929
> [!NOTE]
3030
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)

defender-endpoint/linux-support-offline-security-intelligence-update.md

Lines changed: 21 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- mde-linux
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 03/12/2024
17+
ms.date: 05/17/2024
1818
---
1919

2020
# Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux
@@ -67,7 +67,6 @@ Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
6767
- Defender for Endpoint version "101.24022.0001" or higher needs to be installed on the Linux endpoints.
6868
- The Linux endpoints need to have connectivity to the Mirror Server.
6969
- The Linux endpoint must be running any of the Defender for Endpoint supported distributions.
70-
7170
- The Mirror Server can be either an HTTP/ HTTPS server or a network share server. For example, an NFS Server.
7271
- The Mirror Server needs to have access to the following URLs:
7372
- `https://github.com/microsoft/mdatp-xplat.git`
@@ -85,6 +84,7 @@ Fig. 2: Process flow diagram on the Linux endpoint for security intelligence upd
8584

8685
> [!NOTE]
8786
> This configuration may vary depending on the number of requests that are served and the load each server must process.
87+
8888
## Configuring the Mirror Server
8989

9090
> [!NOTE]
@@ -138,7 +138,7 @@ The `settings.json` file consists of a few variables that the user can configure
138138
| Field Name | Value | Description |
139139
|--------------------------|--------|--------------------------------------------------------|
140140
| `downloadFolder` | string | Maps to the location where the script downloads the files to |
141-
| `downloadLinuxUpdates` | bool | When set to true, the script downloads the Linux specific updates to the `downloadFolder` |
141+
| `downloadLinuxUpdates` | bool | When set to `true`, the script downloads the Linux specific updates to the `downloadFolder` |
142142
| `logFilePath` | string | Sets up the diagnostic logs at a given folder. This file can be shared with Microsoft for debugging the script if there are any issues |
143143
| `downloadMacUpdates` | bool | The script downloads the Mac specific updates to the `downloadFolder` |
144144
| `downloadPreviewUpdates` | bool | Downloads the preview version of the updates available for the specific OS |
@@ -189,17 +189,21 @@ Once the Mirror Server is set up, we need to propagate this URL to the Linux end
189189
"offlineDefinitionUpdateUrl": "http://172.22.199.67:8000/linux/production/",
190190
"offlineDefintionUpdateFallbackToCloud":false,
191191
"offlineDefinitionUpdate": "enabled"
192-
}
192+
},
193+
"features": {
194+
"offlineDefinitionUpdateVerifySig": "enabled"
195+
}
193196
}
194197
```
195198

196199
| Field Name | Values | Comments |
197200
|-------------------------------------------|----------------------|-----------------------------------------------------|
198-
| `automaticDefinitionUpdateEnabled` | True / False | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively |
199-
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds) |
200-
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up |
201-
| `offlineDefinitionUpdate` | enabled / disabled | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
202-
| `offlineDefinitionUpdateFallbackToCloud` | True / False | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
201+
| `automaticDefinitionUpdateEnabled` | `True` / `False` | Determines the behavior of Defender for Endpoint attempting to perform updates automatically, is turned on or off respectively. |
202+
| `definitionUpdatesInterval` | Numeric | Time of interval between each automatic update of signatures (in seconds). |
203+
| `offlineDefinitionUpdateUrl` | String | URL value generated as part of the Mirror Server set up. |
204+
| `offlineDefinitionUpdate` | `enabled` / `disabled` | When set to `enabled`, the offline security intelligence update feature is enabled, and vice versa. |
205+
| `offlineDefinitionUpdateFallbackToCloud` | `True` / `False` | Determine Defender for Endpoint security intelligence update approach when offline Mirror Server fails to serve the update request. If set to true, the update is retried via the Microsoft cloud when offline security intelligence update failed, else vice versa. |
206+
| `offlineDefinitionUpdateVerifySig` | `enabled` / `disabled` | When set to `enabled`, downloaded definitions are verified on the endpoints, else vice versa. |
203207

204208
> [!NOTE]
205209
> As of today the offline security intelligence update feature can be configured on Linux endpoints via managed json only. Integration with security settings management on the security portal is in our roadmap.
@@ -212,9 +216,9 @@ To test if the settings are applied correctly on the Linux endpoints, run the fo
212216
mdatp health --details definitions
213217
```
214218

215-
For example, a sample output would look like:
219+
A sample output would look like the following code snippet:
216220

217-
```console
221+
```output
218222
user@vm:~$ mdatp health --details definitions
219223
automatic_definition_update_enabled : true [managed]
220224
definitions_updated : Mar 14, 2024 at 12:13:17 PM
@@ -262,8 +266,8 @@ offline_definition_update_fallback_to_cloud : false[managed]
262266

263267
### Issues: MDATP update failure
264268

265-
- Update stuck or update didn't trigger
266-
- Update failed
269+
- Update stuck, or update didn't trigger.
270+
- Update failed.
267271

268272
### Common Troubleshooting Steps
269273

@@ -294,10 +298,12 @@ offline_definition_update_fallback_to_cloud : false[managed]
294298
### Known Issues:
295299

296300
Offline signature update might fail in the following scenario:
297-
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
301+
302+
You enabled the feature, applied the signature updates, then disabled the feature to apply further signature updates from cloud, and subsequently re-enabled the feature for additional signature updates.
298303

299304
Mitigation steps:
300-
The fix for this will be available in the upcoming release.
305+
306+
A fix for this issue is planned to release soon.
301307

302308
## Useful Links
303309

defender-endpoint/linux-whatsnew.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: dansimp
66
author: dansimp
77
ms.reviewer: kumasumit, gopkr
88
ms.localizationpriority: medium
9-
ms.date: 05/16/2024
9+
ms.date: 05/24/2024
1010
manager: dansimp
1111
audience: ITPro
1212
ms.collection:
@@ -65,6 +65,14 @@ There are multiple fixes and new changes in this release:
6565
- Stability and performance improvements.
6666
- Other bug fixes.
6767

68+
**Known Issues**
69+
70+
- There's a known issue with enrolling devices to MDE Security Management using "Device Tagging" mechanism in 24032.007 using mdatp_managed.json. To mitigate this issue, use the following mdatp CLI command to tag devices:
71+
72+
```bash
73+
sudo mdatp edr tag set --name GROUP --value MDE-Management
74+
```
75+
6876
</details>
6977

7078
<details>

0 commit comments

Comments
 (0)