You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ATPDocs/deploy/remote-calls-sam.md
+1-8Lines changed: 1 addition & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,18 +8,11 @@ ms.topic: how-to
8
8
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
9
9
10
10
> [!IMPORTANT]
11
-
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. This changewill happen automatically by the specified dates. No admin action is required.
11
+
> The remote collection of local administrators group members from endpoints using SAM-R queriesin Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. The change will occur automatically by the specified date, and no administrative action is required.
12
12
>
13
13
14
14
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
15
15
16
-
> [!NOTE]
17
-
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
18
-
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
19
-
>
20
-
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
21
-
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).
22
-
23
16
This article describes the configuration changes required to allow the Defender for Identity Directory Services Account (DSA) to perform the SAM-R queries.
Copy file name to clipboardExpand all lines: ATPDocs/understand-lateral-movement-paths.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,13 @@ ms.topic: conceptual
7
7
8
8
# Understand and investigate Lateral Movement Paths (LMPs) with Microsoft Defender for Identity
9
9
10
+
> [!IMPORTANT]
11
+
> The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. The change will occur automatically by the specified date, and no administrative action is required.
12
+
>
13
+
10
14
Lateral movement is when an attacker uses non-sensitive accounts to gain access to sensitive accounts throughout your network. Lateral movement is used by attackers to identify and gain access to the sensitive accounts and machines in your network that share stored sign-in credentials in accounts, groups and machines. Once an attacker makes successful lateral moves towards your key targets, the attacker can also take advantage and gain access to your domain controllers. Lateral movement attacks are carried out using many of the methods described in [Microsoft Defender for Identity Security Alerts](alerts-overview.md).
11
15
12
-
A key component of Microsoft Defender for Identity's security insights are Lateral Movement Paths or LMPs. Defender for Identity LMPs are visual guides that help you quickly understand and identify exactly how attackers can move laterally inside your network. The purpose of lateral movements within the cyber-attack kill chain are for attackers to gain and compromise your sensitive accounts using non-sensitive accounts. Compromising your sensitive accounts gets them another step closer to their ultimate goal, domain dominance. To stop these attacks from being successful, Defender for Identity LMPs give you easy to interpret, direct visual guidance on your most vulnerable, sensitive accounts. LMPs help you mitigate and prevent those risks in the future, and close attacker access before they achieve domain dominance.
16
+
A key component of Microsoft Defender for Identity's security insights is Lateral Movement Paths or LMPs. Defender for Identity LMPs are visual guides that help you quickly understand and identify exactly how attackers can move laterally inside your network. The purpose of lateral movements within the cyber-attack kill chain are for attackers to gain and compromise your sensitive accounts using non-sensitive accounts. Compromising your sensitive accounts gets them another step closer to their ultimate goal, domain dominance. To stop these attacks from being successful, Defender for Identity LMPs give you easy to interpret, direct visual guidance on your most vulnerable, sensitive accounts. LMPs help you mitigate and prevent those risks in the future, and close attacker access before they achieve domain dominance.
Copy file name to clipboardExpand all lines: ATPDocs/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ For updates about versions and features released six months ago or earlier, see
25
25
## May 2025
26
26
27
27
### Local administrators collection (using SAM-R queries) feature will be disabled
28
-
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored. This change will happen automatically by the specified dates. No admin action is required.
28
+
The remote collection of local administrators group members from endpoints using SAM-R queriesin Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change will occur automatically by the specified date, and no administrative action is required.
Copy file name to clipboardExpand all lines: defender-endpoint/behavior-monitor-macos.md
+40-34Lines changed: 40 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
6
6
manager: deniseb
7
7
ms.service: defender-endpoint
8
8
ms.topic: overview
9
-
ms.date: 01/02/2025
9
+
ms.date: 05/15/2025
10
10
ms.subservice: ngp
11
11
audience: ITPro
12
12
ms.collection:
@@ -116,18 +116,7 @@ The following sections describe each of these methods in detail.
116
116
<dict>
117
117
<key>behaviorMonitoring</key>
118
118
<string>enabled</string>
119
-
<key>behaviorMonitoringConfigurations</key>
120
-
<dict>
121
-
<key>blockExecution</key>
122
-
<string>enabled</string>
123
-
<key>notifyForks</key>
124
-
<string>enabled</string>
125
-
<key>forwardRtpToBm</key>
126
-
<string>enabled</string>
127
-
<key>avoidOpenCache</key>
128
-
<string>enabled</string>
129
-
</dict>
130
-
</dict>
119
+
</dict>
131
120
</dict>
132
121
</array>
133
122
</dict>
@@ -162,22 +151,11 @@ The following sections describe each of these methods in detail.
162
151
<key>behaviorMonitoring</key>
163
152
<string>enabled</string>
164
153
</dict>
165
-
<key>features</key>
166
-
<dict>
167
-
<key>behaviorMonitoring</key>
168
-
<string>enabled</string>
169
-
<key>behaviorMonitoringConfigurations</key>
170
-
<dict>
171
-
<key>blockExecution</key>
172
-
<string>enabled</string>
173
-
<key>notifyForks</key>
174
-
<string>enabled</string>
175
-
<key>forwardRtpToBm</key>
176
-
<string>enabled</string>
177
-
<key>avoidOpenCache</key>
178
-
<string>enabled</string>
179
-
</dict>
180
-
</dict>
154
+
<key>features</key>
155
+
<dict>
156
+
<key>behaviorMonitoring</key>
157
+
<string>enabled</string>
158
+
</dict>
181
159
</dict>
182
160
</plist>
183
161
```
@@ -219,14 +197,42 @@ sudo mdatp threat list
219
197
220
198
```
221
199
222
-
### Frequently Asked Questions (FAQ)
200
+
### Frequently asked questions (FAQ)
201
+
202
+
#### What if I see an increase in CPU utilization or memory utilization?
203
+
204
+
Disable behavior monitoring and see if the issue goes away. If the issue doesn't go away, it isn't related to behavior monitoring.
205
+
206
+
If the issue goes away, re-enable behavior monitoring and use behavior monitoring statistics to identify and exclude processes generating excessive events:
This command lists processes running on the machine which are reporting behavior monitoring events to the engine process. The more events, the more CPU/memory impact that process has.
223
219
224
-
#### What if I see an increase in cpu utilization or memory utilization?
220
+
Exclude identified processes using:
225
221
226
-
Disable behavior monitoring and see if the issue goes away.
222
+
```bash
223
+
sudo mdatp exclusion process add --path <path to process with lots of events>
224
+
```
225
+
226
+
> [!IMPORTANT]
227
+
> Please verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
228
+
229
+
Once done, disable behavior monitoring statistics:
Copy file name to clipboardExpand all lines: defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Exclude files from Microsoft Defender Antivirus scans based on thei
4
4
ms.service: defender-endpoint
5
5
ms.subservice: ngp
6
6
ms.localizationpriority: medium
7
-
ms.date: 01/27/2025
7
+
ms.date: 05/19/2025
8
8
author: emmwalshh
9
9
ms.author: ewalsh
10
10
ms.topic: conceptual
@@ -38,10 +38,9 @@ You can define exclusions for Microsoft Defender Antivirus that apply to [schedu
38
38
-[Exclusions for files that are opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)
39
39
40
40
> [!IMPORTANT]
41
-
> Microsoft Defender Antivirus exclusions do apply to some Microsoft Defender for Endpoint capabilities, such as [attack surface reduction rules](attack-surface-reduction.md). Some Microsoft Defender Antivirus exclusions are applicable to some ASR rule exclusions. See [Attack surface reduction rules reference - Microsoft Defender Antivirus exclusions and ASR rules](attack-surface-reduction-rules-reference.md#microsoft-defender-antivirus-exclusions-and-asr-rules).
42
-
> Files that you exclude using the methods described in this article can still trigger Endpoint Detection and Response (EDR) alerts and other detections.
43
-
> To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](indicators-overview.md).
44
-
> Variables, such as `%USERPROFILE%` aren't interpreted in exclusion settings. We recommend using an explicit path format.
41
+
> - Microsoft Defender Antivirus exclusions do apply to some Microsoft Defender for Endpoint capabilities, such as [attack surface reduction rules](attack-surface-reduction.md). Some Microsoft Defender Antivirus exclusions are applicable to some ASR rule exclusions. See [Attack surface reduction rules reference - Microsoft Defender Antivirus exclusions and ASR rules](attack-surface-reduction-rules-reference.md#microsoft-defender-antivirus-exclusions-and-asr-rules).
42
+
> - Files that you exclude using the methods described in this article can still trigger Endpoint Detection and Response (EDR) alerts and other detections. To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](indicators-overview.md).
43
+
> - Variables, such as `%USERPROFILE%` aren't interpreted in exclusion settings. We recommend using an explicit path format.
0 commit comments