You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/health-alerts.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Microsoft Defender for Identity health issues
3
3
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4
-
ms.date: 07/09/2024
4
+
ms.date: 01/16/2025
5
5
ms.topic: how-to
6
6
---
7
7
@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191
191
|----|----|----|----|----|
192
192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193
193
194
+
### Auditing for AD CS servers is not enabled as required
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199
+
194
200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/behaviors.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
26
26
27
27
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
28
28
29
-
|Alert name |Policy name |
30
-
|---------|---------|
31
-
|**Activity from infrequent country**|Activity from infrequent country/region |
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ This procedure describes how to deploy your machine with Ubuntu. The deployment
105
105
106
106
1. Change to root privileges using `sudo -i`.
107
107
108
-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108
+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/discovery-docker-ubuntu.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ The following steps describe the deployment in Ubuntu. The deployment steps for
105
105
export https_proxy='<IP>:<PORT>'
106
106
```
107
107
108
-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108
+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
Copy file name to clipboardExpand all lines: CloudAppSecurityDocs/siem.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ Integrating with your SIEM is accomplished in three steps:
84
84
85
85
### Step 2: Download the JAR file and run it on your server
86
86
87
-
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the [software license terms](https://go.microsoft.com/fwlink/?linkid=862491), download the .zip file and unzip it.
87
+
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the software license terms, download the .zip file and unzip it.
Copy file name to clipboardExpand all lines: defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md
+18-11Lines changed: 18 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: ewalsh
8
8
ms.custom: nextgen
9
9
ms.reviewer: ksarens
10
10
manager: deniseb
11
-
ms.date: 01/15/2025
11
+
ms.date: 01/16/2025
12
12
ms.subservice: ngp
13
13
ms.topic: how-to
14
14
ms.collection:
@@ -32,7 +32,7 @@ search.appverid: met150
32
32
You can perform various functions in Microsoft Defender Antivirus using the dedicated command-line tool **mpcmdrun.exe**. This utility is useful when you want to automate Microsoft Defender Antivirus tasks. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. Run it from a command prompt.
33
33
34
34
> [!TIP]
35
-
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the Start menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
35
+
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the **Start** menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
36
36
37
37
The MpCmdRun utility uses the following syntax:
38
38
@@ -52,29 +52,36 @@ In our example, the MpCmdRun utility starts a full antivirus scan on the device.
52
52
53
53
|Command|Description|
54
54
|---|---|
55
-
|`-?`**or**`-h`|Displays all available options for the MpCmdRun tool|
55
+
|`-?`**or**`-h`|Displays all available options for the MpCmdRun tool.|
56
56
|`-Scan [-ScanType [<value>]] [-File <path> [-DisableRemediation] [-BootSectorScan] [-CpuThrottling]] [-Timeout <days>] [-Cancel]`|Scans for malicious software. Values for **ScanType** are:<p>**0** Default, according to your configuration<p>**1** Quick scan<p>**2** Full scan<p>**3** File and directory custom scan.<p>CpuThrottling runs according to policy configurations.|
|`-CaptureNetworkTrace -Path <path>`|Captures all the network input into the Network Protection service and saves it to a file at `<path>`. <br/>Supply an empty path to stop tracing.|
59
59
|`-GetFiles [-SupportLogLocation <path>]`|Collects support information. See [collecting diagnostic data](collect-diagnostic-data.md).|
60
60
|`-GetFilesDiagTrack`|Same as `-GetFiles`, but outputs to temporary DiagTrack folder.|
61
61
|`-RemoveDefinitions [-All]`|Restores the installed security intelligence to a previous backup copy or to the original default set.|
62
62
|`-RemoveDefinitions [-DynamicSignatures]`|Removes only the dynamically downloaded security intelligence.|
63
63
|`-RemoveDefinitions [-Engine]`|Restores the previous installed engine.|
64
-
|`-SignatureUpdate [-UNC \|-MMPC]`|Checks for new security intelligence updates.|
|`-CheckExclusion -path <path>`|Checks whether a path is excluded.|
70
+
|`-TDT [-on|-off|-default]`|Disable or Enable TDT feature or sets it to default. If no option is specified, it retrieves the current status.|
71
+
|`-OSCA`|Prints OS Copy Acceleration feature status.|
72
+
|`-DeviceControl -TestPolicyXml <FilePath> [-Rules | -Groups]`|Validate xml policy groups and rules.|
73
+
|`-TrustCheck -File <FilePath>`|Checks trust status of a file.|
70
74
|`-ValidateMapsConnection`|Verifies that your network can communicate with the Microsoft Defender Antivirus cloud service. This command will only work on Windows 10, version 1703 or higher.|
75
+
|`-ListCustomASR`|List the custom Azure Site Recovery rules present on this device.|
76
+
|`-DisplayECSConnection`|Displays URLs that Defender Core service uses to establish connection to ECS.|
77
+
|`-HeapSnapshotConfig <-Enable|-Disable> [-Pid <ProcessID>]`|Enable or Disable heap snapshot (tracing) configuration for process. Replace `<ProcessID>` with the actual process ID.|
71
78
|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
72
79
|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
73
80
74
81
> [!NOTE]
75
-
> For the "Scan" command, the following are the default timeout values for Quick or Full scans where the scan will stop at that time by default.
76
-
- Scheduled Full Scans or MpCmdRun -scan: 7 day limit
77
-
- Scheduled Quick Scans or MpCmdRun -scan: 1 day limit
82
+
> For the `Scan` command, the following are the default time out values for Quick or Full scans where the scan will stop at that time by default.
83
+
> - Scheduled Full Scans or MpCmdRun -scan: Seven day limit
84
+
> - Scheduled Quick Scans or MpCmdRun -scan: One day limit
78
85
79
86
80
87
## Common errors in running commands via mpcmdrun.exe
@@ -83,7 +90,7 @@ The following table lists common errors that can occur while using the MpCmdRun
83
90
84
91
|Error message|Possible reason|
85
92
|---|---|
86
-
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> Note that in Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
93
+
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> In Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
87
94
|**0x80070667**|You're running the `-ValidateMapsConnection` command from a computer that is Windows 10 version 1607 or older, or Windows Server 2016 or older. Run the command from a machine that is Windows 10 version 1703 or newer, or Windows Server 2019 or newer.|
88
95
|**MpCmdRun is not recognized as an internal or external command, operable program, or batch file.**|The tool must be run from either `%ProgramFiles%\Windows Defender` or `C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2012.4-0` (where `2012.4-0` might differ since platform updates are monthly except for March)|
89
96
|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80070005 httpcode=450)**|The command was attempted using insufficient privileges. Use the command prompt (cmd.exe) as an administrator.|
@@ -98,7 +105,7 @@ The following table lists common errors that can occur while using the MpCmdRun
98
105
-[Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
99
106
-[Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md)
100
107
-[Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)
101
-
-[Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
108
+
-[Reference articles for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
102
109
-[Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
103
110
-[macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
104
111
-[Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
Copy file name to clipboardExpand all lines: defender-endpoint/live-response.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,11 +122,11 @@ The dashboard also gives you access to:
122
122
## Initiate a live response session on a device
123
123
124
124
> [!NOTE]
125
-
> Live response actions initiated from the Device page are not available in the machineactions API.
125
+
> Live response actions initiated from the Device page are not available in the MachineActions API.
126
126
127
-
1. Sign in to Microsoft Defender portal.
127
+
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com).
128
128
129
-
2. Navigate to **Endpoints > Device inventory** and select a device to investigate. The devices page opens.
129
+
2. Navigate to **Endpoints** > **Device inventory** and select a device to investigate. The devices page opens.
130
130
131
131
3. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the device.
132
132
@@ -235,17 +235,20 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
235
235
236
236
#### To upload a file in the library
237
237
238
-
1. Click **Upload file to library**.
238
+
> [!NOTE]
239
+
> There are restrictions on the characters that can be uploaded to the library. Use alphanumeric characters and some symbols (specifically, `-`, `_`, or `.`).
240
+
241
+
1. Select **Upload file to library**.
239
242
240
-
2.Click**Browse** and select the file.
243
+
2.Select**Browse** and select the file.
241
244
242
245
3. Provide a brief description.
243
246
244
247
4. Specify if you'd like to overwrite a file with the same name.
245
248
246
249
5. If you'd like to be, know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description.
247
250
248
-
6.Click**Confirm**.
251
+
6.Select**Confirm**.
249
252
250
253
7. (Optional) To verify that the file was uploaded to the library, run the `library` command.
251
254
@@ -254,7 +257,7 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
254
257
Anytime during a session, you can cancel a command by pressing CTRL + C.
255
258
256
259
> [!WARNING]
257
-
> Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled.
260
+
> Using this shortcut doesn't stop the command in the agent side. It only cancels the command in the Microsoft Defender portal. So, changing operations such as "remediate" may continue, even if the command is canceled.
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 12/18/2024
6
+
ms.date: 01/16/2025
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -56,7 +56,7 @@ The following table summarizes network protection areas of coverage.
56
56
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
57
57
> On Windows, network protection doesn't monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58
58
59
-
Here are a few important points to keep in mind:
59
+
### Known issues & limitations
60
60
61
61
- IP is supported for all three protocols (`TCP`, `HTTP`, and `HTTPS` (TLS)).
62
62
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
0 commit comments