Skip to content

Commit 3e14386

Browse files
authored
Merge branch 'main' into public-pr132
2 parents 35f2622 + b8915a5 commit 3e14386

File tree

4 files changed

+71
-57
lines changed

4 files changed

+71
-57
lines changed

defender-endpoint/controlled-folders.md

Lines changed: 24 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 07/30/2024
6+
ms.date: 11/06/2024
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -33,12 +33,11 @@ search.appverid: met150
3333
**Applies to**
3434
- Windows
3535

36-
3736
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
3837
3938
## What is controlled folder access?
4039

41-
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).
40+
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
4241

4342
> [!NOTE]
4443
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](indicator-certificates.md).
@@ -66,15 +65,6 @@ The [protected folders](#review-controlled-folder-access-events-in-windows-event
6665

6766
You can use [audit mode](overview-attack-surface-reduction.md) to evaluate how controlled folder access would impact your organization if it were enabled.
6867

69-
Controlled folder access is supported on the following versions of Windows:
70-
71-
- [Windows 10, version 1709](/windows/whats-new/whats-new-windows-10-version-1709) and later
72-
- Windows 11
73-
- Windows 2012 R2
74-
- Windows 2016
75-
- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)
76-
- Windows Server 2022
77-
7868
## Windows system folders are protected by default
7969

8070
Windows system folders are protected by default, along with several other folders:
@@ -91,9 +81,9 @@ The protected folders include common system folders (including boot sectors), an
9181
- `c:\Users\Public\Music`
9282
- `c:\Users\<username>\Favorites`
9383

94-
Default folders appear in the user's profile, under **This PC**.
95-
> [!div class="mx-imgBorder"]
96-
> ![Protected Windows default systems folders](media/defaultfolders.png)
84+
Default folders appear in the user's profile, under **This PC**, as shown in the following image:
85+
86+
![Protected Windows default systems folders](media/defaultfolders.png)
9787

9888
> [!NOTE]
9989
> You can configure additional folders as protected, but you cannot remove the Windows system folders that are protected by default.
@@ -122,33 +112,45 @@ DeviceEvents
122112
You can review the Windows event log to see events that are created when controlled folder access blocks (or audits) an app:
123113

124114
1. Download the [Evaluation Package](https://aka.ms/mp7z2w) and extract the file *cfa-events.xml* to an easily accessible location on the device.
115+
125116
2. Type **Event viewer** in the Start menu to open the Windows Event Viewer.
117+
126118
3. On the left panel, under **Actions**, select **Import custom view...**.
119+
127120
4. Navigate to where you extracted *cfa-events.xml* and select it. Alternatively, [copy the XML directly](overview-attack-surface-reduction.md).
121+
128122
5. Select **OK**.
129123

130124
The following table shows events related to controlled folder access:
131125

132126
|Event ID|Description|
133127
|---|---|
134-
|5007|Event when settings are changed|
135-
|1124|Audited controlled folder access event|
136-
|1123|Blocked controlled folder access event|
137-
|1127|Blocked controlled folder access sector write block event|
138-
|1128|Audited controlled folder access sector write block event|
128+
|`5007`|Event when settings are changed|
129+
|`1124`|Audited controlled folder access event|
130+
|`1123`|Blocked controlled folder access event|
131+
|`1127`|Blocked controlled folder access sector write block event|
132+
|`1128`|Audited controlled folder access sector write block event|
139133

140134
## View or change the list of protected folders
141135

142136
You can use the Windows Security app to view the list of folders that are protected by controlled folder access.
143137

144138
1. On your Windows 10 or Windows 11 device, open the Windows Security app.
139+
145140
2. Select **Virus & threat protection**.
141+
146142
3. Under **Ransomware protection**, select **Manage ransomware protection**.
143+
147144
4. If controlled folder access is turned off, you'll need to turn it on. Select **protected folders**.
145+
148146
5. Do one of the following steps:
147+
149148
- To add a folder, select **+ Add a protected folder**.
150149
- To remove a folder, select it, and then select **Remove**.
151150

152-
> [!NOTE]
153-
> [Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
151+
> [!IMPORTANT]
152+
> Do not add local share paths (loopbacks) as protected folders. Use the local path instead. For example, if you have shared `C:\demo` as `\\mycomputer\demo`, do not add `\\mycomputer\demo` to the list of protected folders. Instead add `C:\demo`.
153+
154+
[Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
155+
154156
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/manage-indicators.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 01/18/2024
18+
ms.date: 11/05/2024
1919
---
2020

2121
# Create indicators
@@ -150,9 +150,10 @@ The functionality of pre-existing IoCs won't change. However, the indicators wer
150150
The IoC API schema and the threat IDs in advance hunting are updated to align with the renaming of the IoC response actions. The API scheme changes apply to all IoC Types.
151151

152152
> [!NOTE]
153-
>
154-
> There is a limit of 15,000 indicators per tenant. File and certificate indicators do not block [exclusions defined for Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus). Indicators are not supported in Microsoft Defender Antivirus when it is in passive mode.
155-
>
153+
> There is a limit of 15,000 indicators per tenant. Increases to this limit are not supported.
154+
>
155+
> File and certificate indicators do not block [exclusions defined for Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus). Indicators are not supported in Microsoft Defender Antivirus when it is in passive mode.
156+
>
156157
> The format for importing new indicators (IoCs) has changed according to the new updated actions and alerts settings. We recommend downloading the new CSV format that can be found at the bottom of the import panel.
157158
158159
## Known issues and limitations

defender-office-365/quarantine-faq.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -141,6 +141,8 @@ sections:
141141
142142
- Some mail flow rules that quarantined a message can cause the released message to be quarantined again.
143143
144+
- Inform admins that routing released quarantine messages to onpremises recipients can cause messages to lose anti-spam headers, which makes the messages land in quarantine again after release.
145+
144146
Admins can use [message trace](message-trace-defender-portal.md) to determine if a released message was delivered to the recipient's Inbox.
145147
146148
- question: |
@@ -219,6 +221,8 @@ sections:
219221
>
220222
> For messages quarantined by zero-hour auto purge (ZAP), quarantine notifications are generated based on when the message was quarantined, not when the message was delivered to the mailbox.
221223
224+
You can also set up quarantine notifications for internal (intra-organization) messages only in quarantine policies.
225+
222226
- question: |
223227
Why aren't users receiving notifications about their quarantined messages?
224228
answer: |

defender-xdr/streaming-api-storage.md

Lines changed: 38 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.topic: conceptual
1616
ms.date: 06/21/2024
1717
---
1818

19-
# Configure Microsoft Defender XDR to stream Advanced Hunting events to your Storage account
19+
# Stream Microsoft Defender XDR events to your storage account
2020

2121
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2222

@@ -30,41 +30,47 @@ ms.date: 06/21/2024
3030

3131
## Before you begin
3232

33-
1. Create a [Storage account](/azure/storage/common/storage-account-overview) in your tenant.
34-
35-
2. Log in to your [Azure tenant](https://ms.portal.azure.com/), go to **Subscriptions > Your subscription > Resource Providers > Register to Microsoft.Insights**.
33+
- Create a [Storage account](/azure/storage/common/storage-account-overview) in your tenant.
34+
- Sign in to your [Azure tenant](https://ms.portal.azure.com/), and go to **Subscriptions** > **Your subscription** > **Resource Providers** > **Register to Microsoft.Insights**.
3635

3736
### Add contributor permissions
3837

39-
Once the Storage account is created, you'll need to:
38+
Once the storage account is created, you need to define the user who is signing in as a contributor.
4039

41-
1. Define the user who is logging into Microsoft Defender XDR as Contributor.
40+
1. Go to **Storage Account** > **Access control (IAM)**, and then select **Add**.
4241

43-
Go to **Storage Account > Access control (IAM) > Add** and verify under **Role assignments**.
42+
2. Verify the user is listed under **Role assignments**.
4443

4544
## Enable raw data streaming
4645

47-
1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> as a ***Security Administrator*** at a minimum.
46+
> [!NOTE]
47+
> When using the Streaming API to an Azure Storage account, ensure the option `Allow trusted Microsoft services to access this storage account` is enabled in the storage account settings to allow for data to be streamed from Microsoft Defender for Endpoint.
48+
49+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in using an account with at least Security Administrator permissions.
4850

49-
>[!IMPORTANT]
50-
>Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
51+
> [!IMPORTANT]
52+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
5153
52-
2. Go to **Settings** \> **Microsoft Defender XDR** \> **Streaming API**. To go directly to the **Streaming API** page, use <https://security.microsoft.com/settings/mtp_settings/raw_data_export>.
54+
2. Go to **Settings** > **Microsoft Defender XDR** > **Streaming API**. To go directly to the **Streaming API** page, use [https://security.microsoft.com/settings/mtp_settings/raw_data_export](https://security.microsoft.com/settings/mtp_settings/raw_data_export).
5355

5456
3. Select **Add**.
5557

5658
4. In the **Add new Streaming API settings** flyout that appears, configure the following settings:
57-
1. **Name**: Choose a name for your new settings.
58-
2. Select **Forward events to Azure Storage**.
59-
4. To display the Azure Resource Manager resource ID for a storage account in the Azure portal, follow these steps:
6059

61-
1. Navigate to your storage account in the Azure portal.
62-
2. On the **Overview** page, in the **Essentials** section, select the **JSON View** link.
63-
3. The resource ID for the storage account is displayed at the top of the page, copy the text under **Storage Account Resource ID**.
60+
- **Name**: Choose a name for your new settings.
61+
- Select **Forward events to Azure Storage**.
62+
63+
5. To display the Azure Resource Manager resource ID for a storage account in the Azure portal, follow these steps:
64+
65+
1. Navigate to your storage account in the [Azure portal](https://portal.azure.com).
66+
67+
2. In the **Overview** page, in the **Essentials** section, select the **JSON View** link.
6468

65-
4. Back on the **Add new Streaming API settings** flyout, choose the **Event types** that you want to stream.
69+
3. The resource ID for the storage account is displayed at the top of the page. Copy the text under **Storage Account Resource ID**.
6670

67-
When you're finished, select **Submit**.
71+
4. In the **Add new Streaming API settings** flyout, choose the **Event types** that you want to stream.
72+
73+
5. When you're finished, select **Submit**.
6874

6975
## The schema of the events in the Storage account
7076

@@ -74,14 +80,14 @@ Once the Storage account is created, you'll need to:
7480

7581
- The schema of each row in a blob is the following JSON:
7682

77-
```JSON
78-
{
83+
```JSON
84+
{
7985
"time": "<The time Microsoft Defender XDR received the event>"
8086
"tenantId": "<Your tenant ID>"
8187
"category": "<The Advanced Hunting table name with 'AdvancedHunting-' prefix>"
8288
"properties": { <Microsoft Defender XDR Advanced Hunting event as Json> }
83-
}
84-
```
89+
}
90+
```
8591

8692
- Each blob contains multiple rows.
8793

@@ -91,9 +97,11 @@ Once the Storage account is created, you'll need to:
9197

9298
## Data types mapping
9399

94-
In order to get the data types for our events properties do the following:
100+
To get the data types for events properties, follow these steps:
101+
102+
1. Go to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) and sign in.
95103

96-
1. Log in to <a href="https://go.microsoft.com/fwlink/p/?linkid=2077139" target="_blank">Microsoft Defender XDR</a> and go to **Hunting** \> **Advanced hunting**. To go directly to the **Advanced hunting** page, use <security.microsoft.com/advanced-hunting>.
104+
2. Go to **Hunting** \> **Advanced hunting**. To go directly to the **Advanced hunting** page, use [https://security.microsoft.com/advanced-hunting](https://security.microsoft.com/advanced-hunting).
97105

98106
2. On the **Query** tab, run the following query to get the data types mapping for each event:
99107

@@ -103,21 +111,20 @@ In order to get the data types for our events properties do the following:
103111
| project ColumnName, ColumnType
104112
```
105113

106-
- Here's an example for Device Info event:
114+
Here's an example for Device Info event:
107115

108-
:::image type="content" source="/defender-endpoint/media/machine-info-datatype-example.png" alt-text="An example device info query" lightbox="/defender-endpoint/media/machine-info-datatype-example.png":::
116+
:::image type="content" source="/defender-endpoint/media/machine-info-datatype-example.png" alt-text="An example device info query" lightbox="/defender-endpoint/media/machine-info-datatype-example.png":::
109117

110118
## Monitoring created resources
111119

112-
You can monitor the resources created by the streaming API using **Azure Monitor**.
113-
For more information, see [Monitor destinations - Azure Monitor | Microsoft Docs](/azure/azure-monitor/logs/logs-data-export?tabs=portal#monitor-destinations).
120+
You can monitor the resources created by the streaming API using **Azure Monitor**. For more information, see [Monitor destinations - Azure Monitor](/azure/azure-monitor/logs/logs-data-export?tabs=portal#monitor-destinations).
114121

115-
## Related topics
122+
## Related articles
116123

117124
- [Use the Microsoft Graph security API - Microsoft Graph | Microsoft Learn](/graph/api/resources/security-api-overview)
118-
119125
- [Overview of Advanced Hunting](advanced-hunting-overview.md)
120126
- [Microsoft Defender XDR Streaming API](streaming-api.md)
121127
- [Stream Microsoft Defender XDR events to your Azure storage account](streaming-api-storage.md)
122128
- [Azure Storage Account documentation](/azure/storage/common/storage-account-overview)
129+
123130
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)