Skip to content

Commit 34ae60c

Browse files
authored
Merge branch 'main' into patch-5
2 parents d302415 + faddeb7 commit 34ae60c

12 files changed

+71
-72
lines changed

defender-endpoint/behavior-monitor-macos.md

Lines changed: 40 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
9-
ms.date: 01/02/2025
9+
ms.date: 05/15/2025
1010
ms.subservice: ngp
1111
audience: ITPro
1212
ms.collection:
@@ -116,18 +116,7 @@ The following sections describe each of these methods in detail.
116116
<dict>
117117
<key>behaviorMonitoring</key>
118118
<string>enabled</string>
119-
<key>behaviorMonitoringConfigurations</key>
120-
<dict>
121-
<key>blockExecution</key>
122-
<string>enabled</string>
123-
<key>notifyForks</key>
124-
<string>enabled</string>
125-
<key>forwardRtpToBm</key>
126-
<string>enabled</string>
127-
<key>avoidOpenCache</key>
128-
<string>enabled</string>
129-
</dict>
130-
</dict>
119+
</dict>
131120
</dict>
132121
</array>
133122
</dict>
@@ -162,22 +151,11 @@ The following sections describe each of these methods in detail.
162151
<key>behaviorMonitoring</key>
163152
<string>enabled</string>
164153
</dict>
165-
<key>features</key>
166-
<dict>
167-
<key>behaviorMonitoring</key>
168-
<string>enabled</string>
169-
<key>behaviorMonitoringConfigurations</key>
170-
<dict>
171-
<key>blockExecution</key>
172-
<string>enabled</string>
173-
<key>notifyForks</key>
174-
<string>enabled</string>
175-
<key>forwardRtpToBm</key>
176-
<string>enabled</string>
177-
<key>avoidOpenCache</key>
178-
<string>enabled</string>
179-
</dict>
180-
</dict>
154+
<key>features</key>
155+
<dict>
156+
<key>behaviorMonitoring</key>
157+
<string>enabled</string>
158+
</dict>
181159
</dict>
182160
</plist>
183161
```
@@ -219,14 +197,42 @@ sudo mdatp threat list
219197

220198
```
221199

222-
### Frequently Asked Questions (FAQ)
200+
### Frequently asked questions (FAQ)
201+
202+
#### What if I see an increase in CPU utilization or memory utilization?
203+
204+
Disable behavior monitoring and see if the issue goes away. If the issue doesn't go away, it isn't related to behavior monitoring.
205+
206+
If the issue goes away, re-enable behavior monitoring and use behavior monitoring statistics to identify and exclude processes generating excessive events:
207+
208+
```bash
209+
sudo mdatp config behavior-monitoring-statistics --value enabled
210+
```
211+
212+
Repro the issue and then execute:
213+
214+
```bash
215+
sudo mdatp diagnostic behavior-monitoring-statistics --sort
216+
```
217+
218+
This command lists processes running on the machine which are reporting behavior monitoring events to the engine process. The more events, the more CPU/memory impact that process has.
223219

224-
#### What if I see an increase in cpu utilization or memory utilization?
220+
Exclude identified processes using:
225221

226-
Disable behavior monitoring and see if the issue goes away.
222+
```bash
223+
sudo mdatp exclusion process add --path <path to process with lots of events>
224+
```
225+
226+
> [!IMPORTANT]
227+
> Please verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
228+
229+
Once done, disable behavior monitoring statistics:
230+
231+
```bash
232+
sudo mdatp config behavior-monitoring-statistics --value disabled
233+
```
227234

228-
- If the issue doesn't go away, it isn't related to behavior monitoring.
229-
- If the issue goes away, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
235+
If the issue persists, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
230236

231237
## Network real-time inspection for macOS
232238

defender-endpoint/enable-network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 05/13/2025
6+
ms.date: 05/15/2025
77
ms.topic: conceptual
88
author: emmwalshh
99
ms.author: ewalsh
@@ -192,7 +192,7 @@ Use the following procedure to enable network protection on domain-joined comput
192192

193193
| Windows Server version | Commands |
194194
|---|---|
195-
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
195+
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
196196
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
197197

198198
> [!IMPORTANT]

defender-endpoint/gov.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -158,6 +158,7 @@ These are the known gaps:
158158
|Microsoft Secure Score|![Yes](media/svg/check-yes.svg)<br/>See note following this table|![Yes](media/svg/check-yes.svg)|![Yes](media/svg/check-yes.svg)|
159159
|Microsoft Threat Experts|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
160160
|Microsoft Defender for Endpoint Security Configuration Management|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
161+
|Microsoft Defender for IoT enterprise IoT security|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|![No](media/svg/check-no.svg)|
161162

162163
> [!NOTE]
163164
> While Microsoft Secure Score is available for GCC, GCC High and DoD customers, there are some security recommendations that aren't available.

defender-endpoint/indicator-file.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 03/04/2025
9+
ms.date: 05/16/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -58,7 +58,7 @@ Understand the following prerequisites before you create indicators for files:
5858
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
5959
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
6060
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, Windows Server 2022, and Windows Server 2025.
61-
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
61+
- File hash computation is enabled by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\Enable File Hash Computation` to **Enabled**. Or, you can run the following PowerShell command: `Set-MpPreference -EnableFileHashComputation $true`
6262

6363
> [!NOTE]
6464
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
@@ -91,9 +91,6 @@ Understand the following prerequisites before you create indicators for files:
9191
- Action: Specify the action to be taken and provide a description.
9292
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
9393

94-
> [!NOTE]
95-
> Device Group creation is supported in both Defender for Endpoint Plan 1 and Plan 2
96-
9794
5. Review the details in the Summary tab, then select **Save**.
9895

9996
## Create a contextual indicator from the file details page
@@ -124,7 +121,7 @@ The current supported actions for file IOC are allow, audit and block, and remed
124121
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
125122

126123
> [!IMPORTANT]
127-
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
124+
> - Typically, file blocks are enforced and removed within 15 minutes, average 30 minutes but can take upwards of 2 hours.
128125
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash
129126
IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
130127
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
@@ -147,7 +144,7 @@ Timestamp > ago(30d)
147144

148145
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
149146

150-
Here are other thread names that can be used in the sample query:
147+
Here are other threat names that can be used in the sample query:
151148

152149
Files:
153150

@@ -201,9 +198,13 @@ Microsoft Defender Vulnerability Management's block vulnerable application featu
201198
## See also
202199

203200
- [Create indicators](indicators-overview.md)
201+
204202
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
203+
205204
- [Create indicators based on certificates](indicator-certificates.md)
205+
206206
- [Manage indicators](indicator-manage.md)
207+
207208
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
208209

209210
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/run-analyzer-linux.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: linux
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 05/14/2025
12+
ms.date: 05/15/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -45,7 +45,7 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
4545
2. Verify the download.
4646

4747
```bash
48-
echo '4D3073F252667AC87F1229163677CB6843E0454AC4F33A526D7F55DDAA5E09E3 XMDEClientAnalyzerBinary.zip' | sha256sum -c
48+
echo '24F0A3BFC9B2CF41893A1C867AE6D1B6B79250F24D15DBA0B080B7083F78CA81 XMDEClientAnalyzerBinary.zip' | sha256sum -c
4949
```
5050

5151
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.

defender-endpoint/run-analyzer-macos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: defender-endpoint
99
ms.subservice: macos
1010
ms.localizationpriority: medium
1111
ms.topic: troubleshooting-general
12-
ms.date: 05/14/2025
12+
ms.date: 05/15/2025
1313
ms.custom: partner-contribution
1414
ms.collection:
1515
- m365-security
@@ -43,7 +43,7 @@ If you're experiencing reliability or device health issues with Microsoft Defend
4343
2. Verify the download.
4444

4545
```bash
46-
echo '4D3073F252667AC87F1229163677CB6843E0454AC4F33A526D7F55DDAA5E09E3 XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
46+
echo '24F0A3BFC9B2CF41893A1C867AE6D1B6B79250F24D15DBA0B080B7083F78CA81 XMDEClientAnalyzerBinary.zip' | shasum -a 256 -c
4747
```
4848

4949
3. Extract the contents of `XMDEClientAnalyzerBinary.zip` on the machine.

defender-office-365/anti-spam-protection-about.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ These settings aren't configured in the default anti-spam policy by default, or
145145

146146
² For **High confidence phishing**, the **Move message to Junk Email folder** action is effectively deprecated. Although you might be able to select the **Move message to Junk Email folder** action, high confidence phishing messages are always quarantined (equivalent to selecting **Quarantine message**).
147147

148-
³ You can use this value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments.
148+
³ You can use this value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments only (not in Exchange Online).
149149

150150
⁴ If the spam filtering verdict quarantines messages by default (**Quarantine message** is already selected when you get to the page), the default quarantine policy name is shown in the **Select quarantine policy** box. If you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. For more information about the quarantine policies that are used by default for spam filter verdicts, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
151151

defender-xdr/advanced-hunting-overview.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,8 +65,13 @@ Also, your access to endpoint data is determined by role-based access control (R
6565
## Data freshness and update frequency
6666
Advanced hunting data can be categorized into two distinct types, each consolidated differently.
6767

68-
- **Event or activity data**—populates tables about alerts, security events, system events, and routine assessments. Advanced hunting receives this data almost immediately after the sensors that collect them successfully transmit them to the corresponding cloud services. For example, you can query event data from healthy sensors on workstations or domain controllers almost immediately after they are available on Microsoft Defender for Endpoint and Microsoft Defender for Identity.
69-
- **Entity data**—populates tables with information about users and devices. This data comes from both relatively static data sources and dynamic sources, such as Active Directory entries and event logs. To provide fresh data, tables are updated with any new information every 15 minutes, adding rows that might not be fully populated. Every 24 hours, data is consolidated to insert a record that contains the latest, most comprehensive data set about each entity.
68+
### **Event or activity data**
69+
Event or activity data populates tables about alerts, security events, system events, and routine assessments. Advanced hunting receives this data almost immediately after the sensors that collect them successfully transmit them to the corresponding cloud services. For example, you can query event data from healthy sensors on workstations or domain controllers almost immediately after they are available on Microsoft Defender for Endpoint and Microsoft Defender for Identity.
70+
71+
To collect even more event properties, you have the option of turning on [aggregated reporting](/defender-endpoint/aggregated-reporting).
72+
73+
### **Entity data**
74+
Entity data populates tables with information about users and devices. This data comes from both relatively static data sources and dynamic sources, such as Active Directory entries and event logs. To provide fresh data, tables are updated with any new information every 15 minutes, adding rows that might not be fully populated. Every 24 hours, data is consolidated to insert a record that contains the latest, most comprehensive data set about each entity.
7075

7176

7277
## Time zone

defender-xdr/configure-attack-disruption.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ audience: ITPro
99
ms.topic: how-to
1010
ms.service: defender-xdr
1111
ms.localizationpriority: medium
12-
ms.date: 04/25/2025
12+
ms.date: 05/15/2025
1313
ms.collection:
1414
- m365-security
1515
- tier2
@@ -45,6 +45,8 @@ The following are prerequisites for configuring automatic attack disruption in M
4545
The Minimum Sense Agent version required for the **Contain User** action to work is v10.8470. You can identify the Sense Agent version on a device by running the following PowerShell command:
4646

4747
> Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Advanced Threat Protection\' -Name "InstallLocation"
48+
> or
49+
> Get-ItemProperty -Path 'Registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status' -Name "MsSenseDllVersion"
4850
4951
#### Automation setting for your organizations devices
5052

defender-xdr/custom-detection-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -170,7 +170,7 @@ Once you click **Save**, the selected rules' frequency gets updated to Continuou
170170
You can run a query continuously as long as:
171171

172172
- The query references one table only.
173-
- The query uses an operator from the list of supported KQL operators. **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**
173+
- The query uses an operator from the list of **[Supported KQL features](/azure/azure-monitor/essentials/data-collection-transformations-structure#supported-kql-features)**. (For `matches regex`, regular expressions must be encoded as string literals and follow the string quoting rules. For example, the regular expression `\A` is represented in KQL as `"\\A"`. The extra backslash indicates that the other backslash is part of the regular expression `\A`.)
174174
- The query doesn't use joins, unions, or the `externaldata` operator.
175175
- The query doesn't include any comments line/information.
176176

0 commit comments

Comments
 (0)