You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-gpo.md
+43-8Lines changed: 43 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
2
title: Deploy and manage device control in Microsoft Defender for Endpoint with Group Policy
3
3
description: Learn how to deploy and manage device control in Defender for Endpoint using Group Policy
4
-
author: denisebmsft
5
-
ms.author: deniseb
4
+
author: emmwalshh
5
+
ms.author: ewalsh
6
6
manager: deniseb
7
-
ms.date: 01/09/2025
7
+
ms.date: 01/31/2025
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -43,7 +43,7 @@ If you're using Group Policy to manage Defender for Endpoint settings, you can u
43
43
44
44
## Set default enforcement
45
45
46
-
You can set default access such as,`Deny` or `Allow` for all device control features, such as`RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, and `PrinterDevices`.
46
+
You can set default access, such as `Deny` or `Allow` for all device control features including`RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, and `PrinterDevices`.
47
47
48
48
:::image type="content" source="media/set-default-enforcement-deny-gp.png" alt-text="Screenshot of set default enforcement." lightbox="media/set-default-enforcement-deny-gp.png":::
49
49
@@ -87,12 +87,12 @@ To configure the device types that a device control policy is applied, follow th
87
87
88
88
1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy groups**.
89
89
90
-
2. In the **Define device control policy groups** window, specify the network share file path containing the XML groups data.
90
+
2. In the **Defined device control policy groups** window, specify the network share file path containing the XML groups data.
91
91
92
92
You can create different group types. Here's one group example XML file for any removable storage and CD-ROM, Windows portable devices, and approved USBs group: [XML file](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Group%20Policy/Scenario%202%20GPO%20Removable%20Storage%20Group.xml)
93
93
94
94
> [!NOTE]
95
-
> Comments using XML comment notation `<!--COMMENT-->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
95
+
> Comments using XML comment notation `<!--COMMENT-->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the frontline of the XML file.
96
96
97
97
## Define Policies
98
98
@@ -101,7 +101,7 @@ You can create different group types. Here's one group example XML file for any
101
101
102
102
1. Create one XML file for access policy rule.
103
103
104
-
2. Use the properties in removable storage access policy rule(s) to create an XML for each group's removable storage access policy rule.
104
+
2. Use the properties in removable storage access policy rules to create an XML for each group's removable storage access policy rule.
105
105
106
106
Ensure root node of the XML is PolicyRules, for example, the following XML:
107
107
@@ -121,10 +121,45 @@ You can create different group types. Here's one group example XML file for any
121
121
122
122
2. In the **Define device control policy rules** window, select **Enabled**, and then specify the network share file path containing the XML rules data.
123
123
124
+
## Validating XML files
125
+
126
+
Mpcmdrun built in functionality to validate XML files that are used for GPO deployments. This feature enables customers to detect any syntax errors the DC engine might encounter while parsing the settings. To perform this validation, administrators should copy the following PowerShell script and provide the appropriate file path for their XML files containing the Device Control rules and groups.
127
+
128
+
```
129
+
#Path to PolicyRules xml. Provide the filepath of the device control rules XML file
130
+
$RulesXML="C:\Policies\PolicyRules.xml"
131
+
132
+
#Path to Groups XML. Provide the filepath of the device control groups XML file
If there are no errors, the following output will be printed in the PowerShell console:
147
+
148
+
149
+
```
150
+
DC policy rules parsing succeeded
151
+
Verifying absolute rules data against the original data
152
+
Rules verified with success
153
+
DC policy groups parsing succeeded
154
+
Verifying absolute groups data against the original data
155
+
Groups verified with success
156
+
Has Group Dependency Loop: no
157
+
```
158
+
124
159
> [!NOTE]
125
160
> To capture evidence of files being copied or printed, use [Endpoint DLP.](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
126
161
>
127
-
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
162
+
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the frontline of the XML file.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-exclusions.md
+20-13Lines changed: 20 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
3
3
description: Provide and validate exclusions for Microsoft Defender for Endpoint on Linux. Exclusions can be set for files, folders, and processes.
4
4
ms.service: defender-endpoint
5
-
ms.author: deniseb
6
-
author: denisebmsft
5
+
ms.author: ewalsh
6
+
author: emmwalshh
7
7
ms.reviewer: gopkr, ardeshmukh
8
8
ms.localizationpriority: medium
9
9
manager: deniseb
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 10/14/2024
18
+
ms.date: 01/31/2025
19
19
---
20
20
21
21
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -39,22 +39,26 @@ You can exclude certain files, folders, processes, and process-opened files from
39
39
Exclusions can be useful to avoid incorrect detections on files or software that are unique or customized to your organization. Global exclusions are useful for mitigating performance issues caused by Defender for Endpoint on Linux.
40
40
41
41
> [!WARNING]
42
-
> Defining exclusions lowers the protection offered by Defender for Endpoint on Linux. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you are confident are not malicious.
42
+
> Defining exclusions lowers the protection offered by Defender for Endpoint on Linux. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
43
43
44
44
## Supported exclusion scopes
45
45
46
46
As described in an earlier section, we support two exclusion scopes: antivirus (`epp`) and global (`global`) exclusions.
47
47
48
-
Antivirus exclusions can be used to exclude trusted files and processes from real-time protection while still having EDR visibility. Global exclusions are applied at sensor level and to mute the events that match exclusion conditions very early in the flow, before any processing is done, thus stopping all EDR alerts and antivirus detections.
48
+
Antivirus exclusions can be used to exclude trusted files and processes from real-time protection while still having EDR visibility. Global exclusions are applied at sensor level and to mute the events that match exclusion conditions early in the flow, before any processing is done, thus stopping all EDR alerts and antivirus detections.
49
49
50
50
> [!NOTE]
51
-
> Global (`global`) is a new exclusion scope that we are introducing in addition to antivirus (`epp`) exclusion scopes that are already supported by Microsoft.
51
+
> Global (`global`) is a new exclusion scope that we're introducing in addition to antivirus (`epp`) exclusion scopes that are already supported by Microsoft.
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)*| Excludes content from antivirus (AV) scans and on-demand scans.|
56
56
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)*| Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
57
57
58
+
> [!IMPORTANT]
59
+
> Global exclusions don't apply to network protection, so alerts generated by network protection will still be visible.
60
+
> To exclude processes from network protection, please use `mdatp network-protection exclusion`
61
+
58
62
## Supported exclusion types
59
63
60
64
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
@@ -73,15 +77,15 @@ File, folder, and process exclusions support the following wildcards:
73
77
74
78
> [!NOTE]
75
79
> File path needs to be present before adding or removing file exclusions with scope as global.
76
-
> Wildcards are not supported while configuring global exclusions.
80
+
> Wildcards aren't supported while configuring global exclusions.
77
81
78
82
Wildcard|Description|Examples|
79
83
---|---|---
80
84
\*|Matches any number of any characters including none <br/> *(note if this wildcard isn't used at the end of the path then it substitutes only one folder)* | `/var/*/tmp` includes any file in `/var/abc/tmp` and its subdirectories, and `/var/def/tmp` and its subdirectories. It doesn't include `/var/abc/log` or `/var/def/log` <p> <p> `/var/*/` only includes any files in its subdirectories such as `/var/abc/`, but not files directly inside `/var`.
81
85
?|Matches any single character|`file?.log` includes `file1.log` and `file2.log`, but not`file123.log`
82
86
83
87
> [!NOTE]
84
-
> For antivirus exclusions, when using the * wildcard at the end of the path, it will match all files and subdirectories under the parent of the wildcard.
88
+
> For antivirus exclusions, when using the * wildcard at the end of the path, it matches all files and subdirectories under the parent of the wildcard.
85
89
86
90
## How to configure the list of exclusions
87
91
@@ -153,7 +157,7 @@ mdatp exclusion
153
157
154
158
Examples:
155
159
156
-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
160
+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
157
161
158
162
```bash
159
163
mdatp exclusion extension add --name .txt
@@ -253,14 +257,14 @@ Examples:
253
257
- Add an exclusion fora folder with a wildcardin it:
254
258
255
259
> [!NOTE]
256
-
> Wildcards are not supported while configuring global exclusions.
260
+
> Wildcards aren't supported while configuring global exclusions.
257
261
258
262
```bash
259
263
mdatp exclusion folder add --path "/var/*/tmp"
260
264
```
261
265
262
266
> [!NOTE]
263
-
> This will only exclude paths under */var/\*/tmp/*, but not folders which are siblings of *tmp*;for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
267
+
> This excludes paths under */var/\*/tmp/*, but not folders which are siblings of *tmp*; for example, */var/this-subfolder/tmp*, but not */var/this-subfolder/log*.
0 commit comments