You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
- mde-asr
18
18
search.appverid: met150
19
-
ms.date: 05/02/2024
19
+
ms.date: 01/10/2025
20
20
---
21
21
22
22
# Attack surface reduction rules overview
@@ -79,7 +79,7 @@ For information about configuring per-rule exclusions, see the section titled **
79
79
80
80
## Warn mode for users
81
81
82
-
(**NEW**!) Prior to warn mode capabilities, attack surface reduction rules that are enabled could be set to either audit mode or block mode. With the new warn mode, whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
82
+
Whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
83
83
84
84
Warn mode helps your organization have attack surface reduction rules in place without preventing users from accessing the content they need to perform their tasks.
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-gpo.md
+27-6Lines changed: 27 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
4
4
author: denisebmsft
5
5
ms.author: deniseb
6
6
manager: deniseb
7
-
ms.date: 08/27/2024
7
+
ms.date: 01/09/2025
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -15,7 +15,7 @@ ms.collection:
15
15
- mde-asr
16
16
ms.custom:
17
17
- partner-contribution
18
-
ms.reviewer: joshbregman
18
+
ms.reviewer: joshbregman, tdoucette
19
19
search.appverid: MET150
20
20
f1.keywords: NOCSH
21
21
---
@@ -61,17 +61,27 @@ To configure the device types that a device control policy is applied, follow th
61
61
62
62
1. On a computer running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Turn on device control for specific device types**.
63
63
64
-
1. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). This setting must be a single string with no spaces or it will be parsed incorrectly by the device control engine causing unexpected behaviors. Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
64
+
2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). This setting must be a single string with no spaces or it will be parsed incorrectly by the device control engine causing unexpected behaviors. Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
65
65
66
66
## Define groups
67
67
68
68
:::image type="content" source="media/deploy-dc-gpo/define-groups.png" alt-text="Screenshot of define groups." lightbox="media/deploy-dc-gpo/define-groups.png":::
69
69
70
70
1. Create one XML file for each removable storage group.
71
71
72
-
2. Use the properties in your removable storage group to create an XML file for each removable storage group.
72
+
2. Use the properties in your removable storage group to create an XML file for each removable storage group.
73
73
74
-
3. Save each XML file to your network share.
74
+
Make sure the root node of the XML is PolicyGroups, for example, the following XML:
@@ -103,11 +123,12 @@ You can create different group types. Here's one group example XML file for any
103
123
104
124
> [!NOTE]
105
125
> To capture evidence of files being copied or printed, use [Endpoint DLP.](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
106
-
> [!NOTE]
126
+
>
107
127
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
108
128
109
129
## See also
110
130
111
131
-[Device control in Defender for Endpoint](device-control-overview.md)
112
132
-[Device control policies in and settings](device-control-policies.md)
113
133
-[Device Control for macOS](mac-device-control-overview.md)
Copy file name to clipboardExpand all lines: defender-endpoint/live-response.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: edr
16
16
search.appverid: met150
17
-
ms.date: 04/03/2024
17
+
ms.date: 01/10/2025
18
18
---
19
19
20
20
# Investigate entities on devices using live response
@@ -229,9 +229,9 @@ Here are some examples:
229
229
230
230
Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
231
231
232
-
Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
232
+
Live response allows PowerShell and Bash scripts to run; however, you must first put the files into the library before you can run them.
233
233
234
-
You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
234
+
You can have a collection of PowerShell and Bash scripts that can run on devices that you initiate live response sessions with.
235
235
236
236
#### To upload a file in the library
237
237
@@ -311,7 +311,7 @@ Live response supports table and JSON format output types. For each command, the
311
311
312
312
## Supported output pipes
313
313
314
-
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
314
+
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: `[command] > [filename].txt`.
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-compatibility.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
4
4
ms.service: defender-endpoint
5
5
ms.subservice: ngp
6
6
ms.localizationpriority: medium
7
-
ms.date: 10/17/2024
7
+
ms.date: 01/10/2025
8
8
ms.topic: conceptual
9
9
author: emmwalshh
10
10
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132
132
133
133
- Endpoints must be onboarded to Defender for Endpoint.
134
134
135
+
- Windows Security Center Service must be enabled.
136
+
137
+
> [!WARNING]
138
+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139
+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140
+
135
141
> [!IMPORTANT]
136
142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137
143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-linux.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 01/07/2025
18
+
ms.date: 01/10/2025
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Linux
@@ -45,7 +45,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
45
45
46
46
> [!NOTE]
47
47
> Linux distribution using system manager supports both SystemV and Upstart.
48
-
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
48
+
> Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
49
49
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
50
50
51
51
### System requirements
@@ -106,30 +106,30 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
106
106
107
107
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
108
108
109
-
|RTP, Quick, Full Scan| Custom Scan|
110
-
|---|---|
111
-
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112
-
|`ecryptfs`|`Efs`|
113
-
|`ext2`|`S3fs`|
114
-
|`ext3`|`Blobfuse`|
115
-
|`ext4`|`Lustr`|
116
-
|`fuse`|`glustrefs`|
117
-
|`fuseblk`|`Afs`|
118
-
|`jfs`|`sshfs`|
119
-
|`nfs` (v3 only)|`cifs`|
120
-
|`overlay`|`smb`|
121
-
|`ramfs`|`gcsfuse`|
122
-
|`reiserfs`|`sysfs`|
123
-
|`tmpfs`||
124
-
|`udf`||
125
-
|`vfat`||
126
-
|`xfs`||
127
-
109
+
|RTP, Quick, Full Scan| Custom Scan|
110
+
|---|---|
111
+
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112
+
|`ecryptfs`|`Efs`|
113
+
|`ext2`|`S3fs`|
114
+
|`ext3`|`Blobfuse`|
115
+
|`ext4`|`Lustr`|
116
+
|`fuse`|`glustrefs`|
117
+
|`fuseblk`|`Afs`|
118
+
|`jfs`|`sshfs`|
119
+
|`nfs` (v3 only)|`cifs`|
120
+
|`overlay`|`smb`|
121
+
|`ramfs`|`gcsfuse`|
122
+
|`reiserfs`|`sysfs`|
123
+
|`tmpfs`||
124
+
|`udf`||
125
+
|`vfat`||
126
+
|`xfs`||
127
+
128
128
> [!NOTE]
129
-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
129
+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient extended Berkeley Packet Filter (eBPF) technology.
130
130
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, then Audit framework (`auditd`) must be enabled on your system.
131
131
> If you're using Auditd, then system events captured by rules added to `/etc/audit/rules.d/` adds to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux are tagged with the `mdatp` key.
132
-
132
+
133
133
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
Copy file name to clipboardExpand all lines: defender-endpoint/minimum-requirements.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
6
6
author: denisebmsft
7
7
ms.reviewer: pahuijbr
8
8
ms.localizationpriority: medium
9
-
ms.date: 01/06/2025
9
+
ms.date: 01/10/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -85,7 +85,7 @@ Supported versions of Windows include:
85
85
- Windows 10 Education
86
86
- Windows 10 Pro
87
87
- Windows 10 Pro Education
88
-
- Windows server
88
+
- Windows Server
89
89
- Windows Server 2012 R2
90
90
- Windows Server 2016
91
91
- Windows Server, version 1803 or later
@@ -130,23 +130,23 @@ To add anti-malware protection to these older operating systems, you can use [Sy
130
130
131
131
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
132
132
133
-
- Cores: Two minimum, four preferred
134
-
- Memory: One GB minimum, four preferred
133
+
- Cores: 2 minimum, 4 preferred
134
+
135
+
- Memory: 1GB minimum, 4 GB preferred
135
136
136
137
### Network and data storage and configuration requirements
137
138
138
139
When you run the onboarding wizard for the first time, you must choose where your Microsoft Defender for Endpoint-related information is stored: in the European Union, the United Kingdom, or the United States datacenter.
139
140
140
141
> [!NOTE]
141
-
>
142
142
> - You can't change your data storage location after the first-time setup.
143
143
> - Review the [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data.
144
144
145
145
#### IP stack
146
146
147
-
IPv4 (Internet Protocol Version 4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
147
+
Internet Protocol Version 4 (IPv4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
148
148
149
-
Alternatively, if you must use an IPv6-only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
149
+
Alternatively, if you must use an Internet Protocol Version 6 (IPv6) only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
0 commit comments