Skip to content

Commit 2ecfc37

Browse files
Merge branch 'main' into pilot-deploy-freshness
2 parents c9ea59e + 5928d19 commit 2ecfc37

File tree

54 files changed

+459
-199
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+459
-199
lines changed

ATPDocs/health-alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Identity health issues
33
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4-
ms.date: 07/09/2024
4+
ms.date: 01/16/2025
55
ms.topic: how-to
66
---
77

@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191191
|----|----|----|----|----|
192192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193193

194+
### Auditing for AD CS servers is not enabled as required
195+
196+
|Alert|Description|Resolution|Severity|Displayed in|
197+
|----|----|----|----|----|
198+
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199+
194200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
195201

196202
| Alert| Description |Resolution|Severity|Displayed in|

CloudAppSecurityDocs/behaviors.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
2626

2727
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
2828

29-
|Alert name |Policy name |
30-
|---------|---------|
31-
|**Activity from infrequent country** |Activity from infrequent country/region  |
32-
|**Impossible travel activity** |Impossible travel |
33-
|**Mass delete** |Unusual file deletion activity (by user) |
34-
|**Mass download** |Unusual file download (by user) |
35-
|**Mass share** |Unusual file share activity (by user) |
36-
|**Multiple delete VM activities** |Multiple delete VM activities |
37-
|**Multiple failed login attempts** |Multiple failed sign-in attempts |
38-
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |
39-
|**Multiple VM creation activities** |Multiple VM creation activities |
40-
|**Suspicious administrative activity** |Unusual administrative activity (by user) |
41-
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |
42-
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |
43-
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |
44-
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |
29+
|Alert name |Policy name |ActionType (Hunting)|
30+
|---------|---------|---------|
31+
|**Activity from infrequent country** |Activity from infrequent country/region  |ActivityFromInfrequentCountry|
32+
|**Impossible travel activity** |Impossible travel |ImpossibleTravelActivity|
33+
|**Mass delete** |Unusual file deletion activity (by user) |MassDelete|
34+
|**Mass download** |Unusual file download (by user) |MassDownload|
35+
|**Mass share** |Unusual file share activity (by user) |MassShare|
36+
|**Multiple delete VM activities** |Multiple delete VM activities |MultipleDeleteVmActivities|
37+
|**Multiple failed login attempts** |Multiple failed sign-in attempts |MultipleFailedLoginAttempts|
38+
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |MultiplePowerBiReportSharingActivities|
39+
|**Multiple VM creation activities** |Multiple VM creation activities |MultipleVmCreationActivities|
40+
|**Suspicious administrative activity** |Unusual administrative activity (by user) |SuspiciousAdministrativeActivity|
41+
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |SuspiciousImpersonatedActivity|
42+
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |SuspiciousOauthAppFileDownloadActivities|
43+
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |SuspiciousPowerBiReportSharing|
44+
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |UnusualAdditionOfCredentialsToAnOauthApp|
4545

4646

4747
## Defender for Cloud Apps' transition from alerts to behaviors

CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ This procedure describes how to deploy your machine with Ubuntu. The deployment
105105

106106
1. Change to root privileges using `sudo -i`.
107107

108-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
109109

110110
#### [CentOS](#tab/centos)
111111

CloudAppSecurityDocs/discovery-docker-ubuntu.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The following steps describe the deployment in Ubuntu. The deployment steps for
105105
export https_proxy='<IP>:<PORT>'
106106
```
107107

108-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
109109

110110
### [CentOS](#tab/centos)
111111

CloudAppSecurityDocs/siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Integrating with your SIEM is accomplished in three steps:
8484
8585
### Step 2: Download the JAR file and run it on your server
8686

87-
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the [software license terms](https://go.microsoft.com/fwlink/?linkid=862491), download the .zip file and unzip it.
87+
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the software license terms, download the .zip file and unzip it.
8888

8989
1. Run the extracted file on your server:
9090

defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: ewalsh
88
ms.custom: nextgen
99
ms.reviewer: ksarens
1010
manager: deniseb
11-
ms.date: 01/15/2025
11+
ms.date: 01/16/2025
1212
ms.subservice: ngp
1313
ms.topic: how-to
1414
ms.collection:
@@ -32,7 +32,7 @@ search.appverid: met150
3232
You can perform various functions in Microsoft Defender Antivirus using the dedicated command-line tool **mpcmdrun.exe**. This utility is useful when you want to automate Microsoft Defender Antivirus tasks. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. Run it from a command prompt.
3333

3434
> [!TIP]
35-
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the Start menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
35+
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the **Start** menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
3636
3737
The MpCmdRun utility uses the following syntax:
3838

@@ -52,29 +52,36 @@ In our example, the MpCmdRun utility starts a full antivirus scan on the device.
5252

5353
|Command|Description|
5454
|---|---|
55-
|`-?` **or** `-h`|Displays all available options for the MpCmdRun tool|
55+
|`-?` **or** `-h`|Displays all available options for the MpCmdRun tool.|
5656
|`-Scan [-ScanType [<value>]] [-File <path> [-DisableRemediation] [-BootSectorScan] [-CpuThrottling]] [-Timeout <days>] [-Cancel]`|Scans for malicious software. Values for **ScanType** are:<p>**0** Default, according to your configuration<p>**1** Quick scan<p>**2** Full scan<p>**3** File and directory custom scan.<p>CpuThrottling runs according to policy configurations.|
57-
|`-Trace [-Grouping #] [-Level #]`|Starts diagnostic tracing|
57+
|`-Trace [-Grouping #] [-Level #]`|Starts diagnostic tracing.|
5858
|`-CaptureNetworkTrace -Path <path>`|Captures all the network input into the Network Protection service and saves it to a file at `<path>`. <br/>Supply an empty path to stop tracing.|
5959
|`-GetFiles [-SupportLogLocation <path>]`|Collects support information. See [collecting diagnostic data](collect-diagnostic-data.md).|
6060
|`-GetFilesDiagTrack`|Same as `-GetFiles`, but outputs to temporary DiagTrack folder.|
6161
|`-RemoveDefinitions [-All]`|Restores the installed security intelligence to a previous backup copy or to the original default set.|
6262
|`-RemoveDefinitions [-DynamicSignatures]`|Removes only the dynamically downloaded security intelligence.|
6363
|`-RemoveDefinitions [-Engine]`|Restores the previous installed engine.|
64-
|`-SignatureUpdate [-UNC \|-MMPC]`|Checks for new security intelligence updates.|
65-
|`-Restore [-ListAll \|[[-Name <name>] [-All] \|[-FilePath <filePath>]] [-Path <path>]]`|Restores or lists quarantined item(s).|
64+
|`-SignatureUpdate [-UNC |-MMPC]`|Checks for new security intelligence updates.|
65+
|`-Restore [-ListAll |[[-Name <name>] [-All] |[-FilePath <filePath>]] [-Path <path>]]`|Restores or lists quarantined items.|
6666
|`-AddDynamicSignature [-Path]`|Loads dynamic security intelligence.|
6767
|`-ListAllDynamicSignatures`|Lists the loaded dynamic security intelligence.|
6868
|`-RemoveDynamicSignature [-SignatureSetID]`|Removes dynamic security intelligence.|
6969
|`-CheckExclusion -path <path>`|Checks whether a path is excluded.|
70+
|`-TDT [-on|-off|-default]`|Disable or Enable TDT feature or sets it to default. If no option is specified, it retrieves the current status.|
71+
|`-OSCA`|Prints OS Copy Acceleration feature status.|
72+
|`-DeviceControl -TestPolicyXml <FilePath> [-Rules | -Groups]`|Validate xml policy groups and rules.|
73+
|`-TrustCheck -File <FilePath>`|Checks trust status of a file.|
7074
|`-ValidateMapsConnection`|Verifies that your network can communicate with the Microsoft Defender Antivirus cloud service. This command will only work on Windows 10, version 1703 or higher.|
75+
|`-ListCustomASR`|List the custom Azure Site Recovery rules present on this device.|
76+
|`-DisplayECSConnection`|Displays URLs that Defender Core service uses to establish connection to ECS.|
77+
|`-HeapSnapshotConfig <-Enable|-Disable> [-Pid <ProcessID>]`|Enable or Disable heap snapshot (tracing) configuration for process. Replace `<ProcessID>` with the actual process ID.|
7178
|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
7279
|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
7380

7481
> [!NOTE]
75-
> For the "Scan" command, the following are the default timeout values for Quick or Full scans where the scan will stop at that time by default.
76-
- Scheduled Full Scans or MpCmdRun -scan: 7 day limit
77-
- Scheduled Quick Scans or MpCmdRun -scan: 1 day limit
82+
> For the `Scan` command, the following are the default time out values for Quick or Full scans where the scan will stop at that time by default.
83+
> - Scheduled Full Scans or MpCmdRun -scan: Seven day limit
84+
> - Scheduled Quick Scans or MpCmdRun -scan: One day limit
7885
7986

8087
## Common errors in running commands via mpcmdrun.exe
@@ -83,7 +90,7 @@ The following table lists common errors that can occur while using the MpCmdRun
8390

8491
|Error message|Possible reason|
8592
|---|---|
86-
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> Note that in Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
93+
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> In Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
8794
|**0x80070667**|You're running the `-ValidateMapsConnection` command from a computer that is Windows 10 version 1607 or older, or Windows Server 2016 or older. Run the command from a machine that is Windows 10 version 1703 or newer, or Windows Server 2019 or newer.|
8895
|**MpCmdRun is not recognized as an internal or external command, operable program, or batch file.**|The tool must be run from either `%ProgramFiles%\Windows Defender` or `C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2012.4-0` (where `2012.4-0` might differ since platform updates are monthly except for March)|
8996
|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80070005 httpcode=450)**|The command was attempted using insufficient privileges. Use the command prompt (cmd.exe) as an administrator.|
@@ -98,7 +105,7 @@ The following table lists common errors that can occur while using the MpCmdRun
98105
- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
99106
- [Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md)
100107
- [Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)
101-
- [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
108+
- [Reference articles for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
102109
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
103110
- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
104111
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)

defender-endpoint/live-response.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -122,11 +122,11 @@ The dashboard also gives you access to:
122122
## Initiate a live response session on a device
123123

124124
> [!NOTE]
125-
> Live response actions initiated from the Device page are not available in the machineactions API.
125+
> Live response actions initiated from the Device page are not available in the MachineActions API.
126126
127-
1. Sign in to Microsoft Defender portal.
127+
1. Sign in to [Microsoft Defender portal](https://security.microsoft.com).
128128

129-
2. Navigate to **Endpoints > Device inventory** and select a device to investigate. The devices page opens.
129+
2. Navigate to **Endpoints** > **Device inventory** and select a device to investigate. The devices page opens.
130130

131131
3. Launch the live response session by selecting **Initiate live response session**. A command console is displayed. Wait while the session connects to the device.
132132

@@ -235,17 +235,20 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
235235

236236
#### To upload a file in the library
237237

238-
1. Click **Upload file to library**.
238+
> [!NOTE]
239+
> There are restrictions on the characters that can be uploaded to the library. Use alphanumeric characters and some symbols (specifically, `-`, `_`, or `.`).
240+
241+
1. Select **Upload file to library**.
239242

240-
2. Click **Browse** and select the file.
243+
2. Select **Browse** and select the file.
241244

242245
3. Provide a brief description.
243246

244247
4. Specify if you'd like to overwrite a file with the same name.
245248

246249
5. If you'd like to be, know what parameters are needed for the script, select the script parameters check box. In the text field, enter an example and a description.
247250

248-
6. Click **Confirm**.
251+
6. Select **Confirm**.
249252

250253
7. (Optional) To verify that the file was uploaded to the library, run the `library` command.
251254

@@ -254,7 +257,7 @@ You can have a collection of PowerShell and Bash scripts that can run on devices
254257
Anytime during a session, you can cancel a command by pressing CTRL + C.
255258

256259
> [!WARNING]
257-
> Using this shortcut will not stop the command in the agent side. It will only cancel the command in the portal. So, changing operations such as "remediate" may continue, while the command is canceled.
260+
> Using this shortcut doesn't stop the command in the agent side. It only cancels the command in the Microsoft Defender portal. So, changing operations such as "remediate" may continue, even if the command is canceled.
258261
259262
## Run a script
260263

defender-endpoint/network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 12/18/2024
6+
ms.date: 01/16/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -56,7 +56,7 @@ The following table summarizes network protection areas of coverage.
5656
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
5757
> On Windows, network protection doesn't monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
5858
59-
Here are a few important points to keep in mind:
59+
### Known issues & limitations
6060

6161
- IP is supported for all three protocols (`TCP`, `HTTP`, and `HTTPS` (TLS)).
6262
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.

0 commit comments

Comments
 (0)