Skip to content

Commit 3e945ba

Browse files
committed
Merge branch 'main' into TC-chrisda
2 parents cafa556 + 381015a commit 3e945ba

File tree

93 files changed

+1741
-1772
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

93 files changed

+1741
-1772
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -511,8 +511,8 @@
511511
href: troubleshoot-collect-support-log.md
512512
- name: Troubleshoot Microsoft Defender Antivirus settings
513513
href: troubleshoot-settings.md
514-
- name: Troubleshoot Microsoft Defender Antivirus service startup problems
515-
href: troubleshoot-service-startup-problems.md
514+
- name: Troubleshoot Microsoft Defender Antivirus Security intelligence not getting updated
515+
href: troubleshoot-security-intelligence-not-updated.md
516516
- name: Troubleshooting Security Intelligence Updates from Microsoft Update source
517517
href: security-intelligence-update-tshoot.md
518518
displayName: Troubleshooting Security Intelligence Updates from Microsoft Update source

defender-endpoint/attack-surface-reduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 05/02/2024
19+
ms.date: 01/10/2025
2020
---
2121

2222
# Attack surface reduction rules overview
@@ -79,7 +79,7 @@ For information about configuring per-rule exclusions, see the section titled **
7979

8080
## Warn mode for users
8181

82-
(**NEW**!) Prior to warn mode capabilities, attack surface reduction rules that are enabled could be set to either audit mode or block mode. With the new warn mode, whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
82+
Whenever content is blocked by an attack surface reduction rule, users see a dialog box that indicates the content is blocked. The dialog box also offers the user an option to unblock the content. The user can then retry their action, and the operation completes. When a user unblocks content, the content remains unblocked for 24 hours, and then blocking resumes.
8383

8484
Warn mode helps your organization have attack surface reduction rules in place without preventing users from accessing the content they need to perform their tasks.
8585

defender-endpoint/device-control-deploy-manage-gpo.md

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
44
author: denisebmsft
55
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 08/27/2024
7+
ms.date: 01/09/2025
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -15,7 +15,7 @@ ms.collection:
1515
- mde-asr
1616
ms.custom:
1717
- partner-contribution
18-
ms.reviewer: joshbregman
18+
ms.reviewer: joshbregman, tdoucette
1919
search.appverid: MET150
2020
f1.keywords: NOCSH
2121
---
@@ -61,17 +61,27 @@ To configure the device types that a device control policy is applied, follow th
6161

6262
1. On a computer running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Turn on device control for specific device types**.
6363

64-
1. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). This setting must be a single string with no spaces or it will be parsed incorrectly by the device control engine causing unexpected behaviors. Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
64+
2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). This setting must be a single string with no spaces or it will be parsed incorrectly by the device control engine causing unexpected behaviors. Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`.
6565

6666
## Define groups
6767

6868
:::image type="content" source="media/deploy-dc-gpo/define-groups.png" alt-text="Screenshot of define groups." lightbox="media/deploy-dc-gpo/define-groups.png":::
6969

7070
1. Create one XML file for each removable storage group.
7171

72-
2. Use the properties in your removable storage group to create an XML file for each removable storage group.
72+
2. Use the properties in your removable storage group to create an XML file for each removable storage group.
7373

74-
3. Save each XML file to your network share.
74+
Make sure the root node of the XML is PolicyGroups, for example, the following XML:
75+
76+
```xml
77+
<PolicyGroups>
78+
<Group Id="{d8819053-24f4-444a-a0fb-9ce5a9e97862}" Type="Device">
79+
80+
</Group>
81+
</PolicyGroups>
82+
```
83+
84+
3. Save the XML file to your network share.
7585

7686
4. Define the settings as follows:
7787

@@ -93,6 +103,16 @@ You can create different group types. Here's one group example XML file for any
93103

94104
2. Use the properties in removable storage access policy rule(s) to create an XML for each group's removable storage access policy rule.
95105

106+
Ensure root node of the XML is PolicyRules, for example, the following XML:
107+
108+
```xml
109+
<PolicyRules>
110+
<PolicyRule Id="{d8819053-24f4-444a-a0fb-9ce5a9e97862}">
111+
...
112+
</PolicyRule>
113+
</PolicyRules>
114+
```
115+
96116
3. Save the XML file to network share.
97117

98118
4. Define the settings as follows:
@@ -103,11 +123,12 @@ You can create different group types. Here's one group example XML file for any
103123

104124
> [!NOTE]
105125
> To capture evidence of files being copied or printed, use [Endpoint DLP.](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview)
106-
> [!NOTE]
126+
>
107127
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
108128
109129
## See also
110130

111131
- [Device control in Defender for Endpoint](device-control-overview.md)
112132
- [Device control policies in and settings](device-control-policies.md)
113133
- [Device Control for macOS](mac-device-control-overview.md)
134+

defender-endpoint/live-response.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/10/2025
1818
---
1919

2020
# Investigate entities on devices using live response
@@ -229,9 +229,9 @@ Here are some examples:
229229

230230
Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
231231

232-
Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
232+
Live response allows PowerShell and Bash scripts to run; however, you must first put the files into the library before you can run them.
233233

234-
You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
234+
You can have a collection of PowerShell and Bash scripts that can run on devices that you initiate live response sessions with.
235235

236236
#### To upload a file in the library
237237

@@ -311,7 +311,7 @@ Live response supports table and JSON format output types. For each command, the
311311
312312
## Supported output pipes
313313

314-
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
314+
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: `[command] > [filename].txt`.
315315

316316
Example:
317317

42.2 KB
Loading
114 KB
Loading

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 10/17/2024
7+
ms.date: 01/10/2025
88
ms.topic: conceptual
99
author: emmwalshh
1010
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132132

133133
- Endpoints must be onboarded to Defender for Endpoint.
134134

135+
- Windows Security Center Service must be enabled.
136+
137+
> [!WARNING]
138+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140+
135141
> [!IMPORTANT]
136142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/07/2025
18+
ms.date: 01/10/2025
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -45,7 +45,7 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
4545

4646
> [!NOTE]
4747
> Linux distribution using system manager supports both SystemV and Upstart.
48-
> Microsoft Defender for Endpoint on Linux agent is independent from [OMS agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
48+
> Microsoft Defender for Endpoint on Linux agent is independent from [Operation Management Suite (OMS) agent](/azure/azure-monitor/agents/agents-overview#log-analytics-agent).
4949
> Microsoft Defender for Endpoint relies on its own independent telemetry pipeline.
5050
5151
### System requirements
@@ -106,30 +106,30 @@ Microsoft Defender for Endpoint for Linux includes anti-malware and endpoint det
106106
107107
- List of supported filesystems for RTP, Quick, Full, and Custom Scan.
108108

109-
|RTP, Quick, Full Scan| Custom Scan|
110-
|---|---|
111-
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112-
|`ecryptfs`|`Efs`|
113-
|`ext2`|`S3fs`|
114-
|`ext3`|`Blobfuse`|
115-
|`ext4`|`Lustr`|
116-
|`fuse`|`glustrefs`|
117-
|`fuseblk`|`Afs`|
118-
|`jfs`|`sshfs`|
119-
|`nfs` (v3 only)|`cifs`|
120-
|`overlay`|`smb`|
121-
|`ramfs`|`gcsfuse`|
122-
|`reiserfs`|`sysfs`|
123-
|`tmpfs`||
124-
|`udf`||
125-
|`vfat`||
126-
|`xfs`||
127-
109+
|RTP, Quick, Full Scan| Custom Scan|
110+
|---|---|
111+
|`btrfs`|All filesystems supported for RTP, Quick, Full Scan|
112+
|`ecryptfs`|`Efs`|
113+
|`ext2`|`S3fs`|
114+
|`ext3`|`Blobfuse`|
115+
|`ext4`|`Lustr`|
116+
|`fuse`|`glustrefs`|
117+
|`fuseblk`|`Afs`|
118+
|`jfs`|`sshfs`|
119+
|`nfs` (v3 only)|`cifs`|
120+
|`overlay`|`smb`|
121+
|`ramfs`|`gcsfuse`|
122+
|`reiserfs`|`sysfs`|
123+
|`tmpfs`||
124+
|`udf`||
125+
|`vfat`||
126+
|`xfs`||
127+
128128
> [!NOTE]
129-
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
129+
> Starting with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient extended Berkeley Packet Filter (eBPF) technology.
130130
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, then Audit framework (`auditd`) must be enabled on your system.
131131
> If you're using Auditd, then system events captured by rules added to `/etc/audit/rules.d/` adds to `audit.log`(s) and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endpoint on Linux are tagged with the `mdatp` key.
132-
132+
133133
- /opt/microsoft/mdatp/sbin/wdavdaemon requires executable permission. For more information, see "Ensure that the daemon has executable permission" in [Troubleshoot installation issues for Microsoft Defender for Endpoint on Linux](linux-support-install.md).
134134

135135
### Installation instructions

defender-endpoint/minimum-requirements.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: pahuijbr
88
ms.localizationpriority: medium
9-
ms.date: 01/06/2025
9+
ms.date: 01/10/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -85,7 +85,7 @@ Supported versions of Windows include:
8585
- Windows 10 Education
8686
- Windows 10 Pro
8787
- Windows 10 Pro Education
88-
- Windows server
88+
- Windows Server
8989
- Windows Server 2012 R2
9090
- Windows Server 2016
9191
- Windows Server, version 1803 or later
@@ -130,23 +130,23 @@ To add anti-malware protection to these older operating systems, you can use [Sy
130130

131131
The minimum hardware requirements for Defender for Endpoint on Windows devices are the same as the requirements for the operating system itself (that is, they aren't in addition to the requirements for the operating system).
132132

133-
- Cores: Two minimum, four preferred
134-
- Memory: One GB minimum, four preferred
133+
- Cores: 2 minimum, 4 preferred
134+
135+
- Memory: 1GB minimum, 4 GB preferred
135136

136137
### Network and data storage and configuration requirements
137138

138139
When you run the onboarding wizard for the first time, you must choose where your Microsoft Defender for Endpoint-related information is stored: in the European Union, the United Kingdom, or the United States datacenter.
139140

140141
> [!NOTE]
141-
>
142142
> - You can't change your data storage location after the first-time setup.
143143
> - Review the [Microsoft Defender for Endpoint data storage and privacy](data-storage-privacy.md) for more information on where and how Microsoft stores your data.
144144
145145
#### IP stack
146146

147-
IPv4 (Internet Protocol Version 4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
147+
Internet Protocol Version 4 (IPv4) stack must be enabled on devices for communication to the Defender for Endpoint cloud service to work as expected.
148148

149-
Alternatively, if you must use an IPv6-only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
149+
Alternatively, if you must use an Internet Protocol Version 6 (IPv6) only configuration, consider adding dynamic IPv6/IPv4 transitional mechanisms, such as DNS64/NAT64 to ensure end-to-end IPv6 connectivity to Microsoft 365 without any other network reconfiguration.
150150

151151
#### Internet connectivity
152152

0 commit comments

Comments
 (0)