You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)*| Excludes content from antivirus (AV) scans and on-demand scans.|
55
+
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)*| Excludes content from antivirus scans and on-demand scans.|
56
56
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)*| Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
57
57
58
58
> [!IMPORTANT]
@@ -63,12 +63,12 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
63
63
64
64
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
65
65
66
-
Exclusion|Definition|Examples
67
-
---|---|---
68
-
File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`
69
-
File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
70
-
Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
71
-
Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
66
+
|Exclusion|Definition|Examples|
67
+
|---|---|---|
68
+
|File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`|
69
+
|File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`|
70
+
|Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`|
71
+
|Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`|
72
72
73
73
> [!IMPORTANT]
74
74
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
@@ -89,6 +89,8 @@ Wildcard|Description|Examples|
89
89
90
90
## How to configure the list of exclusions
91
91
92
+
You can configure exclusions using a management console, Defender for Endpoint security settings management, or the command line.
93
+
92
94
### Using the management console
93
95
94
96
To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.
@@ -140,6 +142,43 @@ To configure exclusions from Puppet, Ansible, or another management console, ple
140
142
141
143
For more information, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
142
144
145
+
### Using Defender for Endpoint security settings management
146
+
147
+
As a security administrator, you can configure Defender for Endpoint exclusions using the Microsoft Defender portal. This method is referred to as Defender for Endpoint security settings management. If you're using this method for the first time, make sure to complete the following procedures:
148
+
149
+
#### 1. Configure your tenant to support security settings management
150
+
151
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), navigate to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**, and then select the Linux platform.
152
+
153
+
2. Tag devices with the `MDE-Management` tag. Most devices enroll and receive the policy within minutes, although some might take up to 24 hours. For more information, see [Learn how to use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune](/mem/intune/protect/mde-security-integration).
154
+
155
+
#### 2. Create a Microsoft Entra group
156
+
157
+
Create a dynamic Microsoft Entra group that uses the operating system type to ensure that all devices onboarded to Defender for Endpoint receive policies. Using a dynamic group allows devices managed by Defender for Endpoint to be automatically added to the group, eliminating the need for admins to create new policies manually. For more information, see the following articles:
158
+
159
+
-[Create Microsoft Entra Groups](/mem/intune/protect/mde-security-integration#create-microsoft-entra-groups)
160
+
-[Microsoft Entra groups overview](/entra/fundamentals/concept-learn-about-groups)
161
+
162
+
#### 3. Create an endpoint security policy
163
+
164
+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Configuration management** > **Endpoint security policies**, and then select **Create new Policy**.
165
+
166
+
2. For Platform, select **Linux**.
167
+
168
+
3. Select the required exclusion template (**Microsoft defender global exclusion (AV+EDR) for global exclusions and Microsoft defender antivirus exclusions for antivirus exclusions**), and then select **Create policy**.
169
+
170
+
4. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
171
+
172
+
5. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
173
+
174
+
6. When you're done configuring settings, select **Next**.
175
+
176
+
7. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
177
+
178
+
8. On the **Review + create** page, when you're done, select **Save**. The new profile is displayed in the list when you select the policy type for the profile you created.
179
+
180
+
For more information refer: [Manage endpoint security policies in Microsoft Defender for Endpoint](/defender-endpoint/manage-security-policies#create-an-endpoint-security-policy).
181
+
143
182
### Using the command line
144
183
145
184
Run the following command to see the available switches for managing exclusions:
@@ -157,7 +196,7 @@ mdatp exclusion
157
196
158
197
Examples:
159
198
160
-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)*:
199
+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)*:
Copy file name to clipboardExpand all lines: defender-office-365/submissions-outlook-report-messages.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
description: Learn how to report phishing and suspicious emails in supported versions of Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -47,7 +47,8 @@ Admins configure user reported messages to go to a specified reporting mailbox,
47
47
-**Semi-Annual Channel (Preview)**: Release 2502, build 16.0.18526.20024 or later.
48
48
-**Semi-Annual Channel**: Release 2502, build 16.0.18526.20024 or later.
49
49
- Outlook for Mac version 16.89 (24090815) or later.
50
-
- Outlook for iOS and Android version 4.2446 or later.
-[Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution. The disable user action behaves differently depending on how the user is hosted in your environment.
69
69
- When the user account is hosted in Active Directory: Defender for Identity triggers the disable user action on domain controllers running the Defender for Identity agent.
70
70
- When the user account is hosted in Active Directory and is synced on Microsoft Entra ID: Defender for Identity triggers the disable user action via onboarded domain controllers. Attack disruption also disables the user account on the Entra ID synced account.
71
-
- When the user account is hosted in Entra ID only (cloud native account): attack disruption disable the user account on the Entra ID synced account.
71
+
- When the user account is hosted in Entra ID only (cloud native account): attack disruption disables the user account on the Entra ID synced account.
72
72
73
73
> [!NOTE]
74
74
> Disabling the user account in Microsoft Entra ID is not dependent on the deployment of Microsoft Defender for Identity.
@@ -79,18 +79,18 @@ For more information, see [remediation actions](m365d-remediation-actions.md) in
79
79
80
80
### Automated response actions for SAP with Microsoft Sentinel
81
81
82
-
If you're using the [unified security operations platform](/unified-secops-platform/microsoft-sentinel-onboard) and you deployed the Microsoft Sentinel solution for SAP applications, you can also deploy automatic attack disruption for SAP.
82
+
If you[onboarded Microsoft Sentinel to the Defender portal](microsoft-sentinel-onboard.md) and deployed the Microsoft Sentinel solution for SAP applications, you can also deploy automatic attack disruption for SAP.
83
83
84
-
For example, deploy attack disruption for SAP to contain compromised assets by locking suspicious SAP users in case of a financial process manipulation attack.
84
+
For example, deploy attack disruption for SAP to contain compromised assets by locking suspicious SAP users in case of a financial process manipulation attack.
85
85
86
-
After the risk is mitigated, Microsoft Defender admins can manually unlock the users that had been automatically locked by the attack disruption response. The ability to manually unlock users is available from the Microsoft Defender action center, and only for users that were locked by attack disruption.
86
+
After the risk is mitigated, Microsoft Defender admins can manually unlock the users that had been automatically locked by the attack disruption response. The ability to manually unlock users is available from the Microsoft Defender action center, and only for users that were locked by attack disruption.
87
87
88
88
To use attack disruption for SAP, deploy a new data connector agent, or make sure that your agent is using version 90847355 or higher, and then assign and apply the required Azure and SAP roles. For more information, see:
89
89
90
90
-[Deploy and configure the container hosting the SAP data connector agent](/azure/sentinel/sap/deploy-data-connector-agent-container)
91
91
-[Update Microsoft Sentinel's SAP data connector agent](/azure/sentinel/sap/update-sap-data-connector), especially [Update your system for automatic attack disruption](/azure/sentinel/sap/update-sap-data-connector#update-your-data-connector-agent-for-attack-disruption).
92
92
93
-
While you configure attack disruption in the Azure portal and your SAP system, automatic attack disruption itself surfaces only in the unified security operations platform in the Microsoft Defender portal.
93
+
While you configure attack disruption in the Azure portal and your SAP system, automatic attack disruption itself surfaces only in the Microsoft Defender portal.
94
94
95
95
## Identify when an attack disruption happens in your environment
Copy file name to clipboardExpand all lines: defender-xdr/data-privacy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ Customer data stored by integrated services might also be stored in the followin
56
56
57
57
Microsoft Defender XDR data is retained for 180 days, and is visible across the Microsoft Defender portal during that time, except for in **Advanced hunting** queries.
58
58
59
-
In the Microsoft Defender portal's **Advanced hunting** page, data is accessible via queries for only 30 days, unless it's streamed through [Microsoft's unified security operations platform with Microsoft Sentinel](/azure/sentinel/microsoft-365-defender-sentinel-integration?toc=%2Fdefender-xdr%2Ftoc.json&bc=%2Fdefender-xdr%2Fbreadcrumb%2Ftoc.json&tabs=defender-portal), where retention periods may be longer.
59
+
In the Microsoft Defender portal's **Advanced hunting** page, data is accessible via queries for only 30 days, unless it's streamed through [Microsoft Sentinel with Microsoft's unified security operations platform](/azure/sentinel/microsoft-365-defender-sentinel-integration?toc=%2Fdefender-xdr%2Ftoc.json&bc=%2Fdefender-xdr%2Fbreadcrumb%2Ftoc.json&tabs=defender-portal), where retention periods may be longer.
60
60
61
61
Data continues to be retained and visible, even when a license is under a grace period or in suspended mode. At the end of any grace period or suspension, and no later than 180 days from a contract termination or expiration, data is deleted from Microsoft's systems and is unrecoverable.
Copy file name to clipboardExpand all lines: defender-xdr/incident-queue.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Prioritize incidents in the Microsoft Defender portal
3
-
description: Learn how to filter incidents from the incident queue in the unified security operations platform in the Microsoft Defender portal.
3
+
description: Learn how to filter incidents from the incident queue in the Microsoft Defender portal.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -26,7 +26,7 @@ appliesto:
26
26
27
27
# Prioritize incidents in the Microsoft Defender portal
28
28
29
-
The unified security operations platform in the Microsoft Defender portal applies correlation analytics and aggregates related alerts and automated investigations from different products into an incident. Microsoft Sentinel and Defender XDR also trigger unique alerts on activities that can only be identified as malicious given the end-to-end visibility in the unified platform across the entire suite of products. This view gives your security analysts the broader attack story, which helps them better understand and deal with complex threats across your organization.
29
+
The Microsoft Defender portal applies correlation analytics and aggregates related alerts and automated investigations from different products into an incident. Microsoft Sentinel and Defender XDR also trigger unique alerts on activities that can only be identified as malicious given the end-to-end visibility in the unified platform across the entire suite of products. This view gives your security analysts the broader attack story, which helps them better understand and deal with complex threats across your organization.
@@ -68,7 +68,7 @@ For more visibility at a glance, Microsoft Defender XDR generates incident names
68
68
69
69
For example: *Multi-stage incident on multiple endpoints reported by multiple sources.*
70
70
71
-
If you onboarded Microsoft Sentinel to the unified security operations platform, then any alerts and incidents coming from Microsoft Sentinel are likely to have their names changed (regardless of whether they were created before or since the onboarding).
71
+
If you onboarded Microsoft Sentinel to the Defender portal, then any alerts and incidents coming from Microsoft Sentinel are likely to have their names changed (regardless of whether they were created before or since the onboarding).
72
72
73
73
We recommend that you avoid using the incident name as a condition for triggering [automation rules](/azure/sentinel/automate-incident-handling-with-automation-rules). If the incident name is a condition, and the incident name changes, the rule will not be triggered.
Copy file name to clipboardExpand all lines: defender-xdr/incidents-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Incidents and alerts in the Microsoft Defender portal
3
-
description: An introduction to incidents and alerts, and the differences between them, in the unified security operations platform in the Microsoft Defender portal.
3
+
description: An introduction to incidents and alerts, and the differences between them, in the Microsoft Defender portal.
4
4
ms.service: defender-xdr
5
5
f1.keywords:
6
6
- NOCSH
@@ -27,7 +27,7 @@ appliesto:
27
27
28
28
# Incidents and alerts in the Microsoft Defender portal
29
29
30
-
The Microsoft Defender portal brings together a unified set of security services to reduce your exposure to security threats, improve your organizational security posture, detect security threats, and investigate and respond to breaches. These services collect and produce signals that are displayed in the portal. The two main kinds of signals are:
30
+
Microsoft's unified SecOps platform in the Microsoft Defender portal brings together a unified set of security services to reduce your exposure to security threats, improve your organizational security posture, detect security threats, and investigate and respond to breaches. These services collect and produce signals that are displayed in the portal. The two main kinds of signals are:
31
31
32
32
**Alerts**: Signals that result from various threat detection activities. These signals indicate the occurrence of malicious or suspicious events in your environment.
Copy file name to clipboardExpand all lines: defender-xdr/investigate-incidents.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,7 +105,7 @@ If the incident or related alerts were the result of an analytics rule you've se
105
105
106
106
### Attack paths
107
107
108
-
The incident graph also contains information about **attack paths**. These paths allows security analysts to identify what other entities an attacker is likely to target next. To view an attack path, you can click on an entity in the incident graph and select **Show attack paths**. Attack paths are available for entities with the **critical asset** tag.
108
+
The incident graph also contains information about **attack paths**. These paths allow security analysts to identify what other entities an attacker is likely to target next. To view an attack path, you can click on an entity in the incident graph and select **Show attack paths**. Attack paths are available for entities with the **critical asset** tag.
109
109
110
110
:::image type="content" source="/defender/media/investigate-incidents/attack-path-small.png" alt-text="Highlighting the Show attack paths action in the incident graph." lightbox="/defender/media/investigate-incidents/attack-path.png":::
111
111
@@ -117,7 +117,7 @@ Selecting an attack path from the list displays the attack path graph, which sho
117
117
118
118
> [!NOTE]
119
119
> To view the details of an attack path, you must have read access permissions in the Microsoft Defender portal and the license for [Microsoft Security Exposure Management](/security-exposure-management/microsoft-security-exposure-management). </br></br>
120
-
> To view attack path details in the unified security operations platform, a *Sentinel Reader* role is required. To create new attack paths, the Security Administrator role is required.
120
+
> To view attack path details with Microsoft Sentinel in the unified security operations platform, a *Sentinel Reader* role is required. To create new attack paths, the *Security Administrator* role is required.
Copy file name to clipboardExpand all lines: defender-xdr/pilot-deploy-defender-cloud-apps.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -259,9 +259,9 @@ For more information on advanced hunting in Microsoft Defender for Cloud Apps da
259
259
260
260
## SIEM integration
261
261
262
-
You can integrate Defender for Cloud Apps with Microsoft Sentinel as part of Microsoft's [unified security operations platform](/unified-secops-platform/) or a generic security information and event management (SIEM) service to enable centralized monitoring of alerts and activities from connected apps. With Microsoft Sentinel, you can more comprehensively analyze security events across your organization and build playbooks for effective and immediate response.
262
+
You can integrate Defender for Cloud Apps with Microsoft Sentinel as part of Microsoft's [unified security operations platform](/unified-secops-platform/), or with a generic security information and event management (SIEM) service to enable centralized monitoring of alerts and activities from connected apps. With Microsoft Sentinel, you can more comprehensively analyze security events across your organization and build playbooks for effective and immediate response.
263
263
264
-
Microsoft Sentinel includes a Microsoft Defender for XDR data connector to bring all signals from Defender XDR, including Defender for Cloud Apps, to Microsoft Sentinel. Use the unified security operations platform in the Defender portal as a single platform for end-to-end security operations (SecOps).
264
+
Microsoft Sentinel includes a Microsoft Defender for XDR data connector to bring all signals from Defender XDR, including Defender for Cloud Apps, to Microsoft Sentinel. Use the Defender portal as a unified security operations (SecOps) platform.
0 commit comments