Skip to content

Commit 2e3e975

Browse files
authored
Merge branch 'main' into docs-editor/troubleshoot-performance-issue-1738102016
2 parents 872339d + b76e57b commit 2e3e975

File tree

2 files changed

+63
-21
lines changed

2 files changed

+63
-21
lines changed

defender-endpoint/device-control-deploy-manage-gpo.md

Lines changed: 43 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Deploy and manage device control in Microsoft Defender for Endpoint with Group Policy
33
description: Learn how to deploy and manage device control in Defender for Endpoint using Group Policy
4-
author: denisebmsft
5-
ms.author: deniseb
4+
author: emmwalshh
5+
ms.author: ewalsh
66
manager: deniseb
7-
ms.date: 01/09/2025
7+
ms.date: 01/31/2025
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -43,7 +43,7 @@ If you're using Group Policy to manage Defender for Endpoint settings, you can u
4343
4444
## Set default enforcement
4545

46-
You can set default access such as, `Deny` or `Allow` for all device control features, such as `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, and `PrinterDevices`.
46+
You can set default access, such as `Deny` or `Allow` for all device control features including `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, and `PrinterDevices`.
4747

4848
:::image type="content" source="media/set-default-enforcement-deny-gp.png" alt-text="Screenshot of set default enforcement." lightbox="media/set-default-enforcement-deny-gp.png":::
4949

@@ -87,12 +87,12 @@ To configure the device types that a device control policy is applied, follow th
8787

8888
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy groups**.
8989

90-
2. In the **Define device control policy groups** window, specify the network share file path containing the XML groups data.
90+
2. In the **Defined device control policy groups** window, specify the network share file path containing the XML groups data.
9191

9292
You can create different group types. Here's one group example XML file for any removable storage and CD-ROM, Windows portable devices, and approved USBs group: [XML file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Group%20Policy/Scenario%202%20GPO%20Removable%20Storage%20Group.xml)
9393

9494
> [!NOTE]
95-
> Comments using XML comment notation `<!--COMMENT-->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
95+
> Comments using XML comment notation `<!--COMMENT-->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the frontline of the XML file.
9696

9797
## Define Policies
9898

@@ -101,7 +101,7 @@ You can create different group types. Here's one group example XML file for any
101101

102102
1. Create one XML file for access policy rule.
103103

104-
2. Use the properties in removable storage access policy rule(s) to create an XML for each group's removable storage access policy rule.
104+
2. Use the properties in removable storage access policy rules to create an XML for each group's removable storage access policy rule.
105105

106106
Ensure root node of the XML is PolicyRules, for example, the following XML:
107107

@@ -121,10 +121,45 @@ You can create different group types. Here's one group example XML file for any
121121

122122
2. In the **Define device control policy rules** window, select **Enabled**, and then specify the network share file path containing the XML rules data.
123123

124+
## Validating XML files
125+
126+
Mpcmdrun built in functionality to validate XML files that are used for GPO deployments. This feature enables customers to detect any syntax errors the DC engine might encounter while parsing the settings. To perform this validation, administrators should copy the following PowerShell script and provide the appropriate file path for their XML files containing the Device Control rules and groups.
127+
128+
```
129+
#Path to PolicyRules xml. Provide the filepath of the device control rules XML file
130+
$RulesXML="C:\Policies\PolicyRules.xml"
131+
132+
#Path to Groups XML. Provide the filepath of the device control groups XML file
133+
$GroupsXML="C:\Policies\Groups.xml"
134+
135+
#Retrieve the install path from Defender
136+
$DefenderPath=(Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Windows Defender" -Name "InstallLocation").InstallLocation
137+
138+
#Test PolicyRules
139+
& $DefenderPath\mpcmdrun.exe -devicecontrol -testpolicyxml $RulesXML -rules
140+
141+
#Test Groups
142+
& $DefenderPath\mpcmdrun.exe -devicecontrol -testpolicyxml $GroupsXML -groups
143+
```
144+
145+
146+
If there are no errors, the following output will be printed in the PowerShell console:
147+
148+
149+
```
150+
DC policy rules parsing succeeded
151+
Verifying absolute rules data against the original data
152+
Rules verified with success
153+
DC policy groups parsing succeeded
154+
Verifying absolute groups data against the original data
155+
Groups verified with success
156+
Has Group Dependency Loop: no
157+
```
158+
124159
> [!NOTE]
125160
> To capture evidence of files being copied or printed, use [Endpoint DLP.](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
126161
>
127-
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
162+
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the frontline of the XML file.
128163
129164
## See also
130165

defender-endpoint/linux-exclusions.md

Lines changed: 20 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
33
description: Provide and validate exclusions for Microsoft Defender for Endpoint on Linux. Exclusions can be set for files, folders, and processes.
44
ms.service: defender-endpoint
5-
ms.author: deniseb
6-
author: denisebmsft
5+
ms.author: ewalsh
6+
author: emmwalshh
77
ms.reviewer: gopkr, ardeshmukh
88
ms.localizationpriority: medium
99
manager: deniseb
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/14/2024
18+
ms.date: 01/31/2025
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -39,22 +39,26 @@ You can exclude certain files, folders, processes, and process-opened files from
3939
Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization. Global exclusions are useful for mitigating performance issues caused by Defender for Endpoint on Linux.
4040

4141
> [!WARNING]
42-
> Defining exclusions lowers the protection offered by Defender for Endpoint on Linux. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
42+
> Defining exclusions lowers the protection offered by Defender for Endpoint on Linux. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
4343
4444
## Supported exclusion scopes
4545

4646
As described in an earlier section, we support two exclusion scopes: antivirus (`epp`) and global (`global`) exclusions.
4747

48-
Antivirus exclusions can be used to exclude trusted files and processes from real-time protection while still having EDR visibility. Global exclusions are applied at sensor level and to mute the events that match exclusion conditions very early in the flow, before any processing is done, thus stopping all EDR alerts and antivirus detections.
48+
Antivirus exclusions can be used to exclude trusted files and processes from real-time protection while still having EDR visibility. Global exclusions are applied at sensor level and to mute the events that match exclusion conditions early in the flow, before any processing is done, thus stopping all EDR alerts and antivirus detections.
4949

5050
> [!NOTE]
51-
> Global (`global`) is a new exclusion scope that we are introducing in addition to antivirus (`epp`) exclusion scopes that are already supported by Microsoft.
51+
> Global (`global`) is a new exclusion scope that we're introducing in addition to antivirus (`epp`) exclusion scopes that are already supported by Microsoft.
5252
5353
| Exclusion Category | Exclusion Scope | Description |
5454
| --- | --- | --- |
5555
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus (AV) scans and on-demand scans.|
5656
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)* | Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
5757

58+
> [!IMPORTANT]
59+
> Global exclusions don't apply to network protection, so alerts generated by network protection will still be visible.
60+
> To exclude processes from network protection, please use `mdatp network-protection exclusion`
61+
5862
## Supported exclusion types
5963

6064
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
@@ -73,15 +77,15 @@ File, folder, and process exclusions support the following wildcards:
7377

7478
> [!NOTE]
7579
> File path needs to be present before adding or removing file exclusions with scope as global.
76-
> Wildcards are not supported while configuring global exclusions.
80+
> Wildcards aren't supported while configuring global exclusions.
7781
7882
Wildcard|Description|Examples|
7983
---|---|---
8084
\*|Matches any number of any characters including none <br/> *(note if this wildcard isn't used at the end of the path then it substitutes only one folder)* | `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It doesn't include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` only includes any files in its subdirectories such as `/var/abc/`, but not files directly inside `/var`.
8185
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
8286

8387
> [!NOTE]
84-
> For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
88+
> For antivirus exclusions, when using the * wildcard at the end of the path, it matches all files and subdirectories under the parent of the wildcard.
8589
8690
## How to configure the list of exclusions
8791

@@ -153,7 +157,7 @@ mdatp exclusion
153157
154158
Examples:
155159

156-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
160+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
157161

158162
```bash
159163
mdatp exclusion extension add --name .txt
@@ -253,14 +257,14 @@ Examples:
253257
- Add an exclusion for a folder with a wildcard in it:
254258

255259
> [!NOTE]
256-
> Wildcards are not supported while configuring global exclusions.
260+
> Wildcards aren't supported while configuring global exclusions.
257261
258262
```bash
259263
mdatp exclusion folder add --path "/var/*/tmp"
260264
```
261265
262266
> [!NOTE]
263-
> This will only exclude paths under */var/\*/tmp/*, but not folders which are siblings of *tmp*; for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
267+
> This excludes paths under */var/\*/tmp/*, but not folders which are siblings of *tmp*; for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
264268
265269
```bash
266270
mdatp exclusion folder add --path "/var/" --scope epp
@@ -272,7 +276,7 @@ Examples:
272276
```
273277
274278
> [!NOTE]
275-
> This will exclude all paths whose parent is */var/*; for example, */var/this-subfolder/and-this-subfolder-as-well*.
279+
> This excludes all paths whose parent is */var/*; for example, */var/this-subfolder/and-this-subfolder-as-well*.
276280
277281
```console
278282
Folder exclusion configured successfully
@@ -317,12 +321,15 @@ Examples:
317321
318322
```bash
319323
mdatp exclusion process add --name cat --scope epp
320-
mdatp exclusion process add --name dog --scope global
324+
mdatp exclusion process add --name /usr/bin/dog --scope global
321325
```
322326
323327
```console
324328
Process exclusion configured successfully
325329
```
330+
331+
> [!NOTE]
332+
> Use full path for process exclusion with `global` scope.
326333
327334
## Validate exclusions lists with the EICAR test file
328335

0 commit comments

Comments
 (0)