Skip to content

Commit 30851e1

Browse files
authored
Merge pull request #1912 from MicrosoftDocs/main
Publish main to live, Friday 10:30AM PST, 11/15
2 parents 05a656b + ba115cf commit 30851e1

8 files changed

+205
-30
lines changed

.acrolinx-config.edn

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{:changed-files-limit 60
22
:allowed-branchname-matches ["main" "release-.*"]
3-
:allowed-filename-matches ["ATADocs/" "CloudAppSecurityDocs/" "exposure-management/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
3+
:allowed-filename-matches ["ATADocs/" "CloudAppSecurityDocs/" "defender/" "defender-business/" "defender-endpoint/" "defender-for-cloud/" "defender-for-iot/" "defender-office-365/" "defender-vulnerability-management/" "defender-xdr/" "exposure-management/" "unified-secops-platform/"] ;; Can be overridden in repo-specific edn file. This is an allow list that identifies which folders contain the files Acrolinx will check. Separate multiple folders as follows ["folder/" "folder2"]
44

55
:use-gh-statuses true
66

defender-endpoint/android-whatsnew.md

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: reference
1515
ms.subservice: android
1616
search.appverid: met150
17-
ms.date: 08/26/2024
17+
ms.date: 11/15/2024
1818
---
1919

2020
# What's new in Microsoft Defender for Endpoint on Android
@@ -27,6 +27,19 @@ ms.date: 08/26/2024
2727

2828
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
2929

30+
**Ending support for Device Administrator enrolled devices**
31+
32+
Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33+
34+
**For devices with access to GMS**
35+
36+
After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways: 
37+
38+
- Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39+
- Intune and Defender for Endpoint technical support will no longer support these devices.
40+
41+
For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
42+
3043
**Aug-2024 (version: 1.0.6812.0101)**
3144

3245
- Network Protection feature is enabled by default for all users
@@ -115,7 +128,7 @@ Notify your users and helpdesk (as applicable) that users will need to accept th
115128

116129
2. Tap **Begin**.
117130

118-
3. Tap the toggle for **Allow access to manage all files.**
131+
1. Tap the toggle for **Allow access to manage all files.**
119132

120133
4. The device is now protected.
121134

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 60 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 12/18/2020
18+
ms.date: 11/15/2024
1919
---
2020

2121
# Evaluate exploit protection
@@ -31,7 +31,56 @@ ms.date: 12/18/2020
3131
3232
[Exploit protection](exploit-protection.md) helps protect devices from malware that uses exploits to spread and infect other devices. Mitigation can be applied to either the operating system or to an individual app. Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection. (The EMET has reached its end of support.)
3333

34-
In audit, you can see how mitigation works for certain apps in a test environment. This shows what *would* have happened if you enabled exploit protection in your production environment. This way, you can verify that exploit protection doesn't adversely affect your line-of-business apps, and see which suspicious or malicious events occur.
34+
In audit, you can see how mitigation works for certain apps in a test environment. This shows what *would* happen if you enable exploit protection in your production environment. This way, you can verify that exploit protection doesn't adversely affect your line-of-business apps, and see which suspicious or malicious events occur.
35+
36+
## Generic guidelines
37+
38+
Exploit protection mitigations work at a low level in the operating system, and some kinds of software that perform similar low-level operations might have compatibility issues when they're configured to be protected by using exploit protection.
39+
40+
#### What kinds of Software shouldn't be protected by exploit protection?
41+
42+
- Anti-malware and intrusion prevention or detection software
43+
- Debuggers
44+
- Software that handles digital rights management (DRM) technologies (that is, video games)
45+
- Software that use anti-debugging, obfuscation, or hooking technologies
46+
47+
#### What type of applications should you consider enabling exploit protection?
48+
49+
Applications that receive or handle untrusted data.
50+
51+
#### What type of processes are out of scope for exploit protection?
52+
53+
Services
54+
55+
- System services
56+
- Network services
57+
58+
## Application compatibility list
59+
60+
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
61+
62+
| Product | Exploit protection mitigation |
63+
| -------- | -------- |
64+
| .NET 2.0/3.5 | EAF/IAF |
65+
| 7-Zip Console/GUI/File Manager | EAF |
66+
| AMD 62xx processors | EAF |
67+
| Avecto (Beyond Trust) Power Broker | EAF, EAF+, Stack Pivot |
68+
| Certain AMD (ATI) video drivers | System ASLR=AlwaysOn |
69+
| DropBox | EAF |
70+
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
71+
| Google Chrome | EAF+ |
72+
| Immidio Flex+ | Cell 4 |
73+
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
74+
| Microsoft PowerPoint | EAF |
75+
| Microsoft Teams | EAF+ |
76+
| Oracle Javaǂ | Heapspray |
77+
| Pitney Bowes Print Audit 6 | SimExecFlow |
78+
| Siebel CRM version is 8.1.1.9 | SEHOP |
79+
| Skype | EAF |
80+
| SolarWinds Syslogd Manager | EAF |
81+
| Windows Media Player | MandatoryASLR, EAF|
82+
83+
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
3584

3685
## Enable exploit protection for testing
3786

@@ -45,12 +94,14 @@ You can set mitigations in a testing mode for specific programs by using the Win
4594

4695
3. Go to **Program settings** and choose the app you want to apply protection to:
4796

48-
1. If the app you want to configure is already listed, select it and then select **Edit**
49-
2. If the app isn't listed at the top of the list select **Add program to customize**. Then, choose how you want to add the app.
50-
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
51-
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
97+
1. If the app you want to configure is already listed, select it and then select **Edit**.
98+
99+
2. If the app isn't listed at the top of the list select **Add program to customize**. Then, choose how you want to add the app.
52100

53-
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in test mode only. You'll be notified if you need to restart the process, app, or Windows.
101+
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
102+
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
103+
104+
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** applies the mitigation in test mode only. You're notified if you need to restart the process, app, or Windows.
54105

55106
5. Repeat this procedure for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
56107

@@ -93,7 +144,7 @@ You can disable **audit mode** by replacing `-Enable` with `-Disable`.
93144

94145
## Review exploit protection audit events
95146

96-
To review which apps would have been blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.<br/><br/>
147+
To review which apps would be blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.
97148

98149
|Feature|Provider/source|Event ID|Description|
99150
|---|---|--|---|
@@ -110,4 +161,5 @@ To review which apps would have been blocked, open Event Viewer and filter for t
110161
- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
111162
- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
112163
- [Troubleshoot exploit protection](troubleshoot-exploit-protection-mitigations.md)
164+
113165
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/run-analyzer-macos.md

Lines changed: 30 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: macos
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 11/01/2024
12+
ms.date: 11/15/2024
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -86,50 +86,62 @@ The tool currently requires Python version 3 or later to be installed on your de
8686
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool to the Mac machine you're investigating.
8787

8888
If you're using a terminal, download the tool by running the following command:
89-
89+
9090
```bash
9191
wget --quiet -O XMDEClientAnalyzer.zip https://aka.ms/XMDEClientAnalyzer
92-
```
93-
94-
2. Verify the download.
92+
```
93+
94+
1. Verify the download.
9595

9696
| OS | Command |
9797
|--|--|
98-
| Linux | `echo '84C9718FF3D29DA0EEE650FB2FC0625549A05CD1228AC253DBB92C8B1D9F1D11 XMDEClientAnalyzer.zip' | sha256sum -c` |
99-
| macOS | `echo '84C9718FF3D29DA0EEE650FB2FC0625549A05CD1228AC253DBB92C8B1D9F1D11 XMDEClientAnalyzer.zip' | shasum -a 256 -c` |
100-
101-
3. Extract the contents of `XMDEClientAnalyzer.zip` on the machine.
98+
| Linux | `echo '84C9718FF3D29DA0EEE650FB2FC0625549A05CD1228AC253DBB92C8B1D9F1D11 XMDEClientAnalyzer.zip'| sha256sum -c` |
99+
| macOS | `echo '84C9718FF3D29DA0EEE650FB2FC0625549A05CD1228AC253DBB92C8B1D9F1D11 XMDEClientAnalyzer.zip'| shasum -a 256 -c` |
100+
101+
1. Extract the contents of `XMDEClientAnalyzer.zip` on the machine.
102102

103103
If you're using a terminal, extract the files by using the following command:
104-
104+
105105
```bash
106106
unzip -q XMDEClientAnalyzer.zip -d XMDEClientAnalyzer
107107
```
108-
109-
4. Change directory to the extracted location.
108+
109+
1. Change directory to the extracted location.
110110
111111
```bash
112112
cd XMDEClientAnalyzer
113113
```
114-
115-
5. Give the tool executable permission:
114+
115+
1. Give the tool executable permission:
116116
117117
```bash
118118
chmod a+x mde_support_tool.sh
119119
```
120-
121-
6. Run as a nonroot user to install required dependencies:
120+
121+
1. Run as a nonroot user to install required dependencies:
122122
123123
```bash
124124
./mde_support_tool.sh
125125
```
126+
127+
1. When you download files on macOS, it automatically adds a new extended attribut called com.apple.quarantine which is scanned by Gatekeeper. Before running, you will want to remove this extended attribute:
128+
129+
```bash
130+
xattr -c MDESupportTools
131+
```
132+
133+
Otherwise you might get the following warning:
134+
135+
"You might get a "MDESupportTool" Not Opened
136+
137+
Apple could not verify "MDESupportTool" is free of malware that may harm your Mac or compromise your privacy"
126138
127139
1. To collect actual diagnostic package and generate the result archive file, run again as root:
128140
129-
```bash
141+
```bash
130142
sudo ./mde_support_tool.sh -d
131143
```
132-
144+
133145
## Command line options
134146
135147
### Primary command lines

defender-xdr/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -302,6 +302,8 @@
302302
href: advanced-hunting-cloudappevents-table.md
303303
- name: CloudAuditEvents
304304
href: advanced-hunting-cloudauditevents-table.md
305+
- name: CloudProcessEvents
306+
href: advanced-hunting-cloudprocessevents-table.md
305307
- name: DeviceEvents
306308
href: advanced-hunting-deviceevents-table.md
307309
- name: DeviceFileCertificateInfo
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
title: CloudProcessEvents table in the advanced hunting schema
3+
description: Learn about the CloudProcessEvents table in the advanced hunting schema, which contains information about process events in multicloud hosted environments.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: maccruz
10+
author: schmurky
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 11/11/2024
22+
---
23+
24+
# CloudProcessEvents (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
**Applies to:**
29+
- Microsoft Defender XDR
30+
31+
The `CloudProcessEvents` table in the [advanced hunting](advanced-hunting-overview.md) schema contains information about process events in multicloud hosted environments such as Azure Kubernetes Service, Amazon Elastic Kubernetes Service, and Google Kubernetes Engine. Use this reference to construct queries that return information from this table.
32+
33+
> [!IMPORTANT]
34+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
35+
36+
For information on other tables in the advanced hunting schema, [see the advanced hunting reference](advanced-hunting-schema-tables.md).
37+
38+
| Column name | Data type | Description |
39+
|-------------|-----------|-------------|
40+
| `Timestamp` | `datetime` | Date and time when the event was recorded |
41+
| `AzureResourceId` | `string` | Unique identifier of the Azure resource associated with the process |
42+
| `AwsResourceName` | `string` | Unique identifier specific to Amazon Web Services devices, containing the Amazon resource name|
43+
| `GcpFullResourceName` | `string` | Unique identifier specific to Google Cloud Platform devices, containing a combination of zone and ID for GCP |
44+
| `ContainerImageName` | `string` | UThe container image name or ID, if it exists |
45+
| `KubernetesNamespace` | `string` | The Kubernetes namespace name |
46+
| `KubernetesPodName` | `string` | The Kubernetes pod name |
47+
| `KubernetesResource` | `string` | Identifier value that includes namespace, resource type and name |
48+
| `ContainerName` | `string` | Name of the container in Kubernetes or another runtime environment |
49+
| `ContainerId` | `string` | The container identifier in Kubernetes or another runtime environment|
50+
| `ActionType` | `string` | Type of activity that triggered the event. See the in-portal schema reference for details.|
51+
| `FileName` | `string` | Name of the file that the recorded action was applied to |
52+
| `FolderPath` | `string` | Folder containing the file that the recorded action was applied to|
53+
| `ProcessId` | `long` | Process ID (PID) of the newly created process |
54+
| `ProcessName` | `string` | The name of the process |
55+
| `ParentProcessName` | `string` | The name of the parent process |
56+
| `ParentProcessId` | `string` | The process ID (PID) of the parent process|
57+
| `ProcessCommandLine` | `string` | Command line used to create the new process|
58+
| `ProcessCreationTime` | `datetime` | Date and time the process was created |
59+
| `ProcessCurrentWorkingDirectory` | `string` | Current working directory of the running process |
60+
| `AccountName` | `string` | User name of the account |
61+
| `LogonId` | `long` | Identifier for a logon session. This identifier is unique on the same pod or container between restarts. |
62+
| `InitiatingProcessId` | `string` | Process ID (PID) of the process that initiated the event |
63+
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
64+
65+
66+
## Sample queries
67+
68+
You can use this table to get detailed information on processes invoked in a cloud environment. The information is useful in hunting scenarios and can discover threats that can be observed through process details, like malicious processes or command-line signatures.
69+
70+
You can also investigate security alerts provided by Defender for Cloud that make use of the cloud process events data in advanced hunting to understand details in the process tree for processes that include a security alert.
71+
72+
### Process events by command-line arguments
73+
To hunt for process events including a given term (represented by "x" in the query below) in the command-line arguments:
74+
75+
```kusto
76+
CloudProcessEvents | where ProcessCommandLine has "x"
77+
```
78+
79+
### Rare process events for a pod in a Kuberentes cluster
80+
To investigate unusual process events invoked as part of a pod in a Kubernetes cluster:
81+
82+
```kusto
83+
CloudProcessEvents | where AzureResourceId = "x" and KubernetesNamespace = "y" and KubernetesPodName = "z" | summarize count() by ProcessName | top 10 by count_ asc
84+
```
85+
86+
## Related topics
87+
88+
- [Advanced hunting overview](advanced-hunting-overview.md)
89+
- [Learn the query language](advanced-hunting-query-language.md)
90+
- [Use shared queries](advanced-hunting-shared-queries.md)
91+
- [Hunt across devices, emails, apps, and identities](advanced-hunting-query-emails-devices.md)
92+
- [Understand the schema](advanced-hunting-schema-tables.md)
93+
- [Apply query best practices](advanced-hunting-best-practices.md)
94+

defender-xdr/advanced-hunting-schema-tables.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,8 @@ The following reference lists all the tables in the schema. Each table name link
6161
| **[BehaviorEntities](advanced-hunting-behaviorentities-table.md)** (Preview) | Behavior data types in Microsoft Defender for Cloud Apps (not available for GCC) |
6262
| **[BehaviorInfo](advanced-hunting-behaviorinfo-table.md)** (Preview) | Alerts from Microsoft Defender for Cloud Apps (not available for GCC) |
6363
| **[CloudAppEvents](advanced-hunting-cloudappevents-table.md)** | Events involving accounts and objects in Office 365 and other cloud apps and services |
64-
| **[CloudAuditEvents](advanced-hunting-cloudauditevents-table.md)** | Cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud |
64+
| **[CloudAuditEvents](advanced-hunting-cloudauditevents-table.md)** (Preview) | Cloud audit events for various cloud platforms protected by the organization's Microsoft Defender for Cloud |
65+
| **[CloudProcessEvents](advanced-hunting-cloudprocessevents-table.md)** (Preview)| Cloud process events for various cloud platforms protected by the organization's Microsoft Defender for Containers |
6566
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection |
6667
| **[DeviceFileCertificateInfo](advanced-hunting-DeviceFileCertificateInfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |
6768
| **[DeviceFileEvents](advanced-hunting-devicefileevents-table.md)** | File creation, modification, and other file system events |

0 commit comments

Comments
 (0)