Skip to content

Commit 4155239

Browse files
authored
Merge branch 'main' into diannegali-updatetenantgroup
2 parents b8629a7 + fcf67d3 commit 4155239

30 files changed

+528
-37
lines changed

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 69 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 11/15/2024
18+
ms.date: 11/21/2024
1919
---
2020

2121
# Evaluate exploit protection
@@ -37,7 +37,7 @@ In audit, you can see how mitigation works for certain apps in a test environmen
3737

3838
Exploit protection mitigations work at a low level in the operating system, and some kinds of software that perform similar low-level operations might have compatibility issues when they're configured to be protected by using exploit protection.
3939

40-
#### What kinds of Software shouldn't be protected by exploit protection?
40+
#### What kinds of software shouldn't be protected by exploit protection?
4141

4242
- Anti-malware and intrusion prevention or detection software
4343
- Debuggers
@@ -55,6 +55,40 @@ Services
5555
- System services
5656
- Network services
5757

58+
## Exploit protection mitigations enabled by default
59+
60+
| Mitigation | Enabled by default |
61+
| -------- | -------- |
62+
| Data Execution Prevention (DEP) | 64-bit and 32-bit applications |
63+
| Validate exception chains (SEHOP) | 64-bit applications |
64+
| Validate heap integrity | 64-bit and 32-bit applications |
65+
66+
## Deprecated "Program settings" mitigations
67+
68+
| “Program settings” mitigations | Reason |
69+
| -------- | -------- |
70+
| Export address filtering (EAF) | Application compatibility issues |
71+
| Import address filtering (IAF) | Application compatibility issues |
72+
| Simulate execution (SimExec) | Replaced with Arbitrary Code Guard (ACG) |
73+
| Validate API invocation (CallerCheck) | Replaced with Arbitrary Code Guard (ACG) |
74+
| Validate stack integrity (StackPivot) | Replaced with Arbitrary Code Guard (ACG) |
75+
76+
## Office application best practices
77+
78+
Instead of using Exploit Protection for Office applications such as Outlook, Word, Excel, PowerPoint, and OneNote, consider using a more modern approach to prevent their misuse: Attack Surface Reduction rules (ASR rules):
79+
80+
- [Block executable content from email client and webmail ](attack-surface-reduction-rules-reference.md#block-executable-content-from-email-client-and-webmail)
81+
- [Block Office applications from creating executable content](attack-surface-reduction-rules-reference.md#block-office-applications-from-creating-executable-content)
82+
- [Block all Office applications from creating child processes](attack-surface-reduction-rules-reference.md#block-all-office-applications-from-creating-child-processes)
83+
- [Block Office communication application from creating child processes](attack-surface-reduction-rules-reference.md#block-office-communication-application-from-creating-child-processes)
84+
- [Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes)
85+
- [Block execution of potentially obfuscated scripts](attack-surface-reduction-rules-reference.md#block-execution-of-potentially-obfuscated-scripts)
86+
- [Block Win32 API calls from Office macros](attack-surface-reduction-rules-reference.md#block-win32-api-calls-from-office-macros)
87+
88+
For Adobe Reader use the following ASR rule:
89+
90+
[Block Adobe Reader from creating child processes](attack-surface-reduction-rules-reference.md#block-adobe-reader-from-creating-child-processes)
91+
5892
## Application compatibility list
5993

6094
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
@@ -69,7 +103,7 @@ The following table lists specific products that have compatibility issues with
69103
| DropBox | EAF |
70104
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
71105
| Google Chrome | EAF+ |
72-
| Immidio Flex+ | Cell 4 |
106+
| Immidio Flex+ | EAF |
73107
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
74108
| Microsoft PowerPoint | EAF |
75109
| Microsoft Teams | EAF+ |
@@ -82,7 +116,38 @@ The following table lists specific products that have compatibility issues with
82116

83117
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
84118

85-
## Enable exploit protection for testing
119+
## Enable exploit protection system settings for testing
120+
121+
These Exploit Protection system settings are enabled by default on Windows 10 and later, Windows Server 2019 and later, and on Windows Server version 1803 core edition and later.
122+
123+
| System settings | Setting |
124+
| -------- | -------- |
125+
| Control flow guard (CFG) | Use default (On) |
126+
| Data Execution Prevention (DEP) | Use default (On) |
127+
| Force randomization for images (Mandatory ASRL) | Use default (On) |
128+
| Randomize memory allocations (Bottom-up ASRL) | Use default (On) |
129+
| High-entropy ASRL | Use default (On) |
130+
| Validate exception chains (SEHOP) | Use default (On) |
131+
132+
The xml sample is available below
133+
134+
```
135+
<?xml version="1.0" encoding="UTF-8"?>
136+
<MitigationPolicy>
137+
<SystemConfig>
138+
<DEP Enable="true" EmulateAtlThunks="false" />
139+
<ASLR ForceRelocateImages="true" RequireInfo="false" BottomUp="true" HighEntropy="true" />
140+
<ControlFlowGuard Enable="true" SuppressExports="false" />
141+
<SEHOP Enable="true" TelemetryOnly="false" />
142+
<Heap TerminateOnError="true" />
143+
</SystemConfig>
144+
</MitigationPolicy>
145+
```
146+
147+
## Enable exploit protection program settings for testing
148+
149+
> [!TIP]
150+
> We highly recommend reviewing the modern approach for vulnerability mitigations, which is to use [Attack Surface Reduction rules (ASR rules)](attack-surface-reduction.md).
86151
87152
You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
88153

defender-endpoint/exploit-protection.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 12/18/2020
19+
ms.date: 11/21/2024
2020
---
2121

2222
# Protect devices from exploits
@@ -60,6 +60,23 @@ DeviceEvents
6060
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
6161
```
6262

63+
### Exploit Protection and advanced hunting
64+
65+
Below are the advanced hunting actiontypes available for Exploit Protection.
66+
67+
| Exploit Protection mitigation name | Exploit Protection - Advanced Hunting - ActionTypes |
68+
|:---|:---|
69+
| Arbitrary code guard | ExploitGuardAcgAudited <br/> ExploitGuardAcgEnforced <br/>|
70+
| Don't allow child processes | ExploitGuardChildProcessAudited <br/> ExploitGuardChildProcessBlocked <br/> |
71+
| Export address filtering (EAF) | ExploitGuardEafViolationAudited <br/> ExploitGuardEafViolationBlocked <br/> |
72+
| Import address filtering (IAF) | ExploitGuardIafViolationAudited <br/> ExploitGuardIafViolationBlocked <br/> |
73+
| Block low integrity images | ExploitGuardLowIntegrityImageAudited <br/> ExploitGuardLowIntegrityImageBlocked <br/> |
74+
| Code integrity guard | ExploitGuardNonMicrosoftSignedAudited <br/> ExploitGuardNonMicrosoftSignedBlocked <br/> |
75+
|• Simulate execution (SimExec)<br/> • Validate API invocation (CallerCheck) <br/> • Validate stack integrity (StackPivot) <br/> | ExploitGuardRopExploitAudited <br/> ExploitGuardRopExploitBlocked <br/> |
76+
| Block remote images | ExploitGuardSharedBinaryAudited <br/> ExploitGuardSharedBinaryBlocked <br/> |
77+
| Disable Win32k system calls | ExploitGuardWin32SystemCallAudited <br/> ExploitGuardWin32SystemCallBlocked <br/>|
78+
79+
6380
## Review exploit protection events in Windows Event Viewer
6481

6582
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:<br/><br/>
@@ -126,7 +143,6 @@ The table in this section indicates the availability and support of native mitig
126143
|Validate image dependency integrity | Yes | No |
127144

128145
> [!NOTE]
129-
130146
> The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10 and Windows 11, which other EMET advanced settings are enabled by default, as part of enabling the anti-ROP mitigations for a process. For more information on how Windows 10 employs existing EMET technology, see the [Mitigation threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit).
131147
132148
## See also

defender-vulnerability-management/defender-vulnerability-management-faq.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ The [Windows authenticated scan](windows-authenticated-scan.md) deprecation proc
130130

131131
### Why is this product being deprecated?
132132

133-
The deprecation is to streamline offerings and focus on features that provide greater value to customers. This change allows our teams to allocate resources to innovations that better meet customer needs. We understand transitions can be challenging, and we're here to support you throughout the process. Let us know if you have any questions or need assistance.
133+
We're deprecating Windows authenticated scan to allow our teams to allocate resources to other product innovations. We understand transitions can be challenging, and we're here to support you throughout the process. Let us know if you have any questions or need assistance with this change.
134134

135135
### When will the product be officially deprecated?
136136

defender-xdr/TOC.yml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,13 @@
305305
- name: CloudAuditEvents
306306
href: advanced-hunting-cloudauditevents-table.md
307307
- name: CloudProcessEvents
308-
href: advanced-hunting-cloudprocessevents-table.md
308+
href: advanced-hunting-cloudprocessevents-table.md
309+
- name: DeviceBaselineComplianceAssessment
310+
href: advanced-hunting-devicebaselinecomplianceassessment-table.md
311+
- name: DeviceBaselineComplianceAssessmentKB
312+
href: advanced-hunting-devicebaselinecomplianceassessmentkb-table.md
313+
- name: DeviceBaselineComplianceProfiles
314+
href: advanced-hunting-devicebaselinecomplianceprofiles-table.md
309315
- name: DeviceEvents
310316
href: advanced-hunting-deviceevents-table.md
311317
- name: DeviceFileCertificateInfo
@@ -326,6 +332,12 @@
326332
href: advanced-hunting-deviceprocessevents-table.md
327333
- name: DeviceRegistryEvents
328334
href: advanced-hunting-deviceregistryevents-table.md
335+
- name: DeviceTvmBrowserExtensions
336+
href: advanced-hunting-devicetvmbrowserextensions-table.md
337+
- name: DeviceTvmBrowserExtensionsKB
338+
href: advanced-hunting-devicetvmbrowserextensionskb-table.md
339+
- name: DeviceTvmCertificateInfo
340+
href: advanced-hunting-devicetvmcertificateinfo-table.md
329341
- name: DeviceTvmHardwareFirmware
330342
href: advanced-hunting-devicetvmhardwarefirmware-table.md
331343
- name: DeviceTvmInfoGathering

defender-xdr/advanced-hunting-cloudauditevents-table.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.topic: reference
2121
ms.date: 12/29/2023
2222
---
2323

24-
# CloudAuditEvents
24+
# CloudAuditEvents (Preview)
2525

2626
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2727

Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
title: DeviceBaselineComplianceAssessment table in the advanced hunting schema
3+
description: Learn about the baseline compliance assessment snapshot, indicating the status of various security configurations related to baseline profiles on devices in Microsoft Defender XDR.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: v-sgoyagoy
10+
author: samanthagy
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 11/20/2024
22+
---
23+
24+
# DeviceBaselineComplianceAssessment (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
29+
**Applies to:**
30+
- Microsoft Defender XDR
31+
- Microsoft Defender for Endpoint
32+
33+
> [!IMPORTANT]
34+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
35+
36+
The `DeviceBaselineComplianceAssessment` table in the advanced hunting schema contains baseline compliance assessment snapshot, which indicates the status of various security configurations related to baseline profiles on devices.
37+
38+
For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
39+
40+
| Column name | Data type | Description |
41+
|-------------|-----------|-------------|
42+
| `DeviceId` | `string` | Unique identifier for the device in the service |
43+
| `DeviceName` | `string` | Fully qualified domain name (FQDN) of the device |
44+
| `OSPlatform` | `string` | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 11, Windows 10 and Windows 7. |
45+
| `OSVersion` | `string` | Version of the operating system running on the device |
46+
| `ConfigurationId` | `string` | Unique identifier for a specific configuration |
47+
| `ProfileId` | `string` | Unique identifier for the profile |
48+
| `IsCompliant` | `boolean` | Indicates whether the device that initiated the event is compliant or not |
49+
| `IsApplicable` | `boolean` | Indicates whether the configuration or policy is applicable |
50+
| `Source` | `dynamic` | The registry path or other location used to determine the current device setting |
51+
| `RecommendedValue` | `dynamic` | Set of expected values for the current device setting to be compliant |
52+
| `CurrentValue` | `dynamic` | Set of detected values found on the device |
53+
| `IsExempt` | `boolean` | Indicates whether the device is exempt from having the baseline configuration |
54+
55+
56+
## Related topics
57+
58+
- [Proactively hunt for threats](advanced-hunting-overview.md)
59+
- [Learn the query language](advanced-hunting-query-language.md)
60+
- [Understand the schema](advanced-hunting-schema-tables.md)
61+
- [Apply query best practices](advanced-hunting-best-practices.md)
62+
- [Overview of Microsoft Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
63+
64+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
---
2+
title: DeviceBaselineComplianceAssessmentKB table in the advanced hunting schema
3+
description: Learn about the various security configurations used by baseline compliance to assess devices in the DeviceBaselineComplianceAssessmentKB table in the advanced hunting schema.
4+
search.appverid: met150
5+
ms.service: defender-xdr
6+
ms.subservice: adv-hunting
7+
f1.keywords:
8+
- NOCSH
9+
ms.author: v-sgoyagoy
10+
author: samanthagy
11+
ms.localizationpriority: medium
12+
manager: dansimp
13+
audience: ITPro
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
ms.custom:
18+
- cx-ti
19+
- cx-ah
20+
ms.topic: reference
21+
ms.date: 11/20/2024
22+
---
23+
24+
# DeviceBaselineComplianceAssessmentKB (Preview)
25+
26+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
27+
28+
29+
**Applies to:**
30+
- Microsoft Defender XDR
31+
- Microsoft Defender for Endpoint
32+
33+
> [!IMPORTANT]
34+
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
35+
36+
The `DeviceBaselineComplianceAssessmentKB` table in the advanced hunting schema contains information about various security configurations used by baseline compliance to assess devices.
37+
38+
For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-schema-tables.md).
39+
40+
| Column name | Data type | Description |
41+
|-------------|-----------|-------------|
42+
| `ConfigurationId` | `string` | Unique identifier for a specific configuration |
43+
| `ConfigurationName` | `string` | Display name of the configuration |
44+
| `ConfigurationDescription` | `string` | Description of the configuration |
45+
| `ConfigurationRationale` | `string` | Description of any associated risks and rationale behind the configuration |
46+
| `ConfigurationCategory` | `string` | Category or grouping to which the configuration belongs |
47+
| `BenchmarkProfileLevels` | `dynamic` | List of benchmark compliance levels for which the configuration is applicable |
48+
| `CCEReference` | `string` | Unique Common Configuration Enumeration (CCE) identifier for the configuration |
49+
| `RemediationOptions` | `string` | Recommended actions to reduce or address any associated risks |
50+
| `ConfigurationBenchmark` | `string` | Industry benchmark recommending the configuration |
51+
| `Source` | `dynamic` | The registry path or other location used to determine the current device setting |
52+
| `RecommendedValue` | `dynamic` | Set of expected values for the current device setting to be compliant |
53+
54+
55+
## Related topics
56+
57+
- [DeviceBaselineComplianceAssessment](advanced-hunting-devicebaselinecomplianceassessment-table.md)
58+
- [Understand the schema](advanced-hunting-schema-tables.md)
59+
- [Apply query best practices](advanced-hunting-best-practices.md)
60+
- [Overview of Defender Vulnerability Management](/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt)
61+
62+
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

0 commit comments

Comments
 (0)