Skip to content

Commit 38736c0

Browse files
Merge branch 'main' into austinmc-case-manage
2 parents ce2da61 + be7b867 commit 38736c0

File tree

8 files changed

+85
-65
lines changed

8 files changed

+85
-65
lines changed

defender-endpoint/defender-endpoint-false-positives-negatives.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -212,9 +212,11 @@ To define exclusions across Microsoft Defender for Endpoint, perform the followi
212212

213213
- [Create "allow" indicators for Microsoft Defender for Endpoint](#indicators-for-defender-for-endpoint)
214214
- [Define exclusions for Microsoft Defender Antivirus](#exclusions-for-microsoft-defender-antivirus)
215+
- For Attack Surface Reduction Rule exclusions [Configure attack surface reduction per-rule exclusions](/defender-endpoint/attack-surface-reduction-rules-deployment-test#configure-attack-surface-reduction-per-rule-exclusions) or you can leverage [ASR rule only exclusions](/defender-endpoint/enable-attack-surface-reduction#exclude-files-and-folders-from-attack-surface-reduction-rules)
215216

216217
> [!NOTE]
217218
> Microsoft Defender Antivirus exclusions apply only to antivirus protection, not across other Microsoft Defender for Endpoint capabilities. To exclude files broadly, use [custom indicators](indicators-overview.md) for Microsoft Defender for Endpoint and exclusions for Microsoft Defender Antivirus.
219+
> ASR Rules can leverage ASR Rule Exclusions - where the exclusions apply to all ASR Rules; ASR per Rule Exclusions; Defender AV exclusions; as well as allow indicators defined in Custom Indicators.
218220

219221
The procedures in this section describe how to define indicators and exclusions.
220222

defender-endpoint/evaluate-mdav-using-gp.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -180,13 +180,13 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
180180
| --- | --- |
181181
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
182182
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
183-
| Allow Network Protection Down Level | Network protection is enabled downlevel |
184-
| Allow Datagram Processing On Win Server | Datagram processing on Windows Server is enabled |
185-
| Disable DNS over TCP parsing | DNS over TCP parsing is enabled |
186-
| Disable HTTP parsing | HTTP parsing is enabled |
187-
| Disable SSH parsing | SSH parsing is enabled |
188-
| Disable TLS parsing | TLS parsing is enabled |
189-
| Enable DNS Sinkhole | DNS Sinkhole is enabled |
183+
184+
To enable Network Protection for Windows Servers, for now, please use Powershell:
185+
186+
| OS | Powershell cmdlet |
187+
| --- | --- |
188+
| Windows Server 2012 R2Windows Server 2022 and later | set-MpPreference -AllowNetworkProtectionOnWinServer $true |
189+
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
190190

191191
## Attack Surface Reduction Rules
192192

@@ -207,7 +207,7 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
207207
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ( \[PREVIEW\] Block use of copied or impersonated system tools) | 1 (Block) |
208208
| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) |
209209
| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) |
210-
| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Webshell creation for Servers) | 1 (Block) |
210+
| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Web shell creation for Servers) | 1 (Block) |
211211
| 3b576869-a4ec-4529-8536-b80a7769e899<br><br>**Note:** (Block Office applications from creating executable content) | 1 (Block) |
212212
| b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4<br><br>**Note:** (Block untrusted and unsigned processes that run from USB) | 1 (Block) |
213213
| 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84<br><br>**Note:** (Block Office applications from injecting code into other processes) | 1 (Block) |

defender-endpoint/indicator-certificates.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: asr
1717
search.appverid: met150
18-
ms.date: 07/31/2024
18+
ms.date: 01/23/2025
1919
---
2020

2121
# Create indicators based on certificates
@@ -33,28 +33,28 @@ ms.date: 07/31/2024
3333
3434
You can create indicators for certificates. Some common use cases include:
3535

36-
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
37-
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.
36+
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) but need to allow behaviors from signed applications by adding the certificate in the allowlist.
37+
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Microsoft Defender Antivirus prevents file executions (block and remediate), and automated investigation and remediation behaves the same.
3838

3939
## Before you begin
4040

41-
It's important to understand the following requirements prior to creating indicators for certificates:
41+
It's important to understand the following requirements before creating indicators for certificates:
4242

43-
- This feature is available if your organization uses Microsoft Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
44-
- The Antimalware client version must be 4.18.1901.x or later.
43+
- This feature is available if your organization uses Microsoft Defender Antivirus (in active mode) and cloud-based protection is enabled. For more information, see [Manage cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
44+
- The anti-malware client version must be `4.18.1901.x` or later.
4545
- Supported on machines on Windows 10, version 1703 or later, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2, and Windows Server 2022.
4646

4747
> [!NOTE]
48-
> Windows Server 2016 and Windows Server 2012 R2 will need to be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2) for this feature to work.
48+
> Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2) for this feature to work.
4949
5050
- The virus and threat protection definitions must be up to date.
5151
- This feature currently supports entering .CER or .PEM file extensions.
5252

5353
> [!IMPORTANT]
5454
>
5555
> - A valid leaf certificate is a signing certificate that has a valid certification path and must be chained to the Root Certificate Authority (CA) trusted by Microsoft. Alternatively, a custom (self-signed) certificate can be used as long as it's trusted by the client (Root CA certificate is installed under the Local Machine 'Trusted Root Certification Authorities').
56-
> - The children or parent of the allow/block certificate IOCs are not included in the allow/block IoC functionality, only leaf certificates are supported.
57-
> - Microsoft signed certificates cannot be blocked.
56+
> - The children or parent of the allow/block certificate IOCs aren't included in the allow/block IoC functionality, only leaf certificates are supported.
57+
> - Microsoft signed certificates can't be blocked.
5858
5959
## Create an indicator for certificates from the settings page:
6060

@@ -66,11 +66,12 @@ It's important to understand the following requirements prior to creating indica
6666
2. Select **Add indicator**.
6767

6868
3. Specify the following details:
69-
- Indicator - Specify the entity details and define the expiration of the indicator.
70-
- Action - Specify the action to be taken and provide a description.
71-
- Scope - Define the scope of the machine group.
7269

73-
4. Review the details in the Summary tab, then click **Save**.
70+
- **Indicator**: Specify the entity details and define the expiration of the indicator.
71+
- **Action**: Specify the action to be taken and provide a description.
72+
- **Scope**: Define the scope of the machine group.
73+
74+
4. Review the details on the **Summary** tab, and then select **Save**.
7475

7576
## Related articles
7677

@@ -79,4 +80,5 @@ It's important to understand the following requirements prior to creating indica
7980
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
8081
- [Manage indicators](indicator-manage.md)
8182
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
83+
8284
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)