Skip to content

Commit 453f518

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into pilot-deploy-freshness
2 parents 9226c62 + 3ca4d91 commit 453f518

File tree

6 files changed

+128
-47
lines changed

6 files changed

+128
-47
lines changed

defender-endpoint/linux-preferences.md

Lines changed: 57 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 10/14/2024
9+
ms.date: 01/13/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -79,7 +79,10 @@ Specifies the enforcement preference of antivirus engine. There are three values
7979
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
8080
> It is recommended to also use [scheduled scans](/defender-endpoint/linux-schedule-scan-mde) as per requirement.
8181
82-
#### Enable/disable behavior monitoring
82+
#### Enable/disable behavior monitoring [only if RTP is enabled]
83+
84+
> [!IMPORTANT]
85+
> This feature only works when the enforcement level is set to `real-time`.
8386
8487
Determines whether behavior monitoring and blocking capability is enabled on the device or not.
8588

@@ -91,10 +94,13 @@ Determines whether behavior monitoring and blocking capability is enabled on the
9194

9295
> [!NOTE]
9396
> Available in Defender for Endpoint version `101.45.00` or later.
94-
> This feature is applicable only when real-time protection is enabled.
97+
9598

9699
#### Run a scan after definitions are updated
97100

101+
> [!IMPORTANT]
102+
> This feature only works when the enforcement level is set to `real-time`.
103+
98104
Specifies whether to start a process scan after new security intelligence updates are downloaded on the device. Enabling this setting triggers an antivirus scan on the running processes of the device.
99105

100106
|Description|JSON Value|Defender Portal Value|
@@ -105,7 +111,6 @@ Specifies whether to start a process scan after new security intelligence update
105111

106112
> [!NOTE]
107113
> Available in Defender for Endpoint version `101.45.00` or later.
108-
> This feature only works when the enforcement level is set to `real-time`.
109114
110115
#### Scan archives (on-demand antivirus scans only)
111116

@@ -266,7 +271,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, do the followi
266271
> [!NOTE]
267272
> Here's the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
268273
>
269-
> If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
274+
> If any monitored filesystem needs to be added to the list of unmonitored filesystems, then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
270275
271276

272277

@@ -380,7 +385,7 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
380385
381386
### Exclusion setting preferences
382387

383-
**Exlusion setting preferences are currently in preview**.
388+
**Exclusion setting preferences are currently in preview**.
384389

385390
> [!NOTE]
386391
> Global exclusions are currently in public preview, and are available in Defender for Endpoint beginning with version `101.23092.0012` or later in the Insiders Slow and Production rings.
@@ -429,7 +434,7 @@ Specifies the type of content excluded from the scan.
429434

430435
##### Scopes of exclusion (optional)
431436

432-
Specifies the set of exlusion scopes of content excluded. Currently supported scopes are `epp` and `global`.
437+
Specifies the set of exclusion scopes of content excluded. Currently supported scopes are `epp` and `global`.
433438

434439
If nothing is specified in for an exclusion under *exclusionSettings* in managed configuration, then `global` is considered as scope.
435440

@@ -496,8 +501,8 @@ Specifies a process for which all file activity is excluded from scanning. The p
496501

497502
The following settings can be configured to enable certain advanced scanning features.
498503

499-
> [!NOTE]
500-
> Enabling these features might impact device performance. As such, it is recommended to keep the defaults.
504+
> [!IMPORTANT]
505+
> Enabling these features might impact device performance. As such, it is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
501506
502507
##### Configure scanning of file modify permissions events
503508

@@ -632,8 +637,8 @@ Depending on the enforcement level, the automatic security intelligence updates
632637

633638
The following settings can be configured to enable certain advanced features.
634639

635-
>[!NOTE]
636-
>Enabling these features might impact device performance. It is recommended to keep the defaults.
640+
>[!IMPORTANT]
641+
>Enabling these features might impact device performance. It is recommended to keep the defaults unless recommended otherwise by Microsoft Support.
637642
638643
|Description|JSON Value|Defender Portal Value|
639644
|---|---|---|
@@ -681,7 +686,7 @@ Determines whether file modify permissions events (`chmod`) are monitored.
681686

682687
##### Configure monitoring of file modify ownership events
683688

684-
Determines whether file modify ownership events (chown) are monitored.
689+
Determines whether file modify ownership events (`chown`) are monitored.
685690

686691
> [!NOTE]
687692
> When this feature is enabled, Defender for Endpoint will monitor changes to the ownership of files, but not scan these events. For more information, see [Advanced scanning features](linux-preferences.md#configure-scanning-of-file-modify-ownership-events) section for more details.
@@ -764,6 +769,42 @@ Determines whether module load events are monitored using eBPF and scanned.
764769
|**Possible values**|disabled (default) <p> enabled|*n/a*|
765770
|**Comments**|Available in Defender for Endpoint version `101.68.80` or later.|
766771

772+
##### Configure monitoring of open events from specific filesystems using eBPF
773+
774+
Determines whether open events from procfs are monitored by eBPF.
775+
776+
> [!NOTE]
777+
> This feature is applicable only when Behavior Monitoring is enabled.
778+
779+
|Description|JSON Value|Defender Portal Value|
780+
|---|---|---|
781+
|**Key**|enableOtherFsOpenEvents|*Not available*|
782+
|**Data type**|String|*n/a*|
783+
|**Possible values**|disabled (default) <p> enabled|*n/a*|
784+
|**Comments**|Available in Defender for Endpoint version `101.24072.0001` or later.|
785+
786+
##### Configure source enrichment of events using eBPF
787+
788+
Determines whether events are enriched with metadata at source in eBPF.
789+
790+
|Description|JSON Value|Defender Portal Value|
791+
|---|---|---|
792+
|**Key**|enableEbpfSourceEnrichment|*Not available*|
793+
|**Data type**|String|*n/a*|
794+
|**Possible values**|disabled (default) <p> enabled|*n/a*|
795+
|**Comments**|Available in Defender for Endpoint version `101.24072.0001` or later.|
796+
797+
#### Enable Antivirus Engine Cache
798+
799+
Determines whether metadata of events being scanned by the antivirus engine are cached or not.
800+
801+
|Description|JSON Value|Defender Portal Value|
802+
|---|---|---|
803+
|**Key**|enableAntivirusEngineCache|*Not available*|
804+
|**Data type**|String|*n/a*|
805+
|**Possible values**|disabled (default) <p> enabled|*n/a*|
806+
|**Comments**|Available in Defender for Endpoint version `101.24072.0001` or later.|
807+
767808
#### Report AV Suspicious Events to EDR
768809

769810
Determines whether suspicious events from Antivirus are reported to EDR.
@@ -777,11 +818,12 @@ Determines whether suspicious events from Antivirus are reported to EDR.
777818

778819
### Network protection configurations
779820

780-
The following settings can be used to configure advanced Network Protection inspection features to control what traffic gets inspected by Network Protection.
781-
782821
> [!NOTE]
822+
> This is a preview feature.
783823
> For these to be effective, Network Protection has to be turned on. For more information, see [Turn on network protection for Linux](network-protection-linux.md).
784824
825+
The following settings can be used to configure advanced Network Protection inspection features to control what traffic gets inspected by Network Protection.
826+
785827
|Description|JSON Value|Defender Portal Value|
786828
|---|---|---|
787829
|**Key**|networkProtection|Network protection|
@@ -1023,7 +1065,7 @@ If the JSON is well-formed, the above command outputs it back to the Terminal an
10231065

10241066
## Verifying that the mdatp_managed.json file is working as expected
10251067

1026-
To verify that your /etc/opt/microsoft/mdatp/managed/mdatp_managed.json is working properly, you should see "[managed]" next to these settings:
1068+
To verify that your `/etc/opt/microsoft/mdatp/managed/mdatp_managed.json` is working properly, you should see "[managed]" next to these settings:
10271069

10281070
- `cloud_enabled`
10291071
- `cloud_automatic_sample_submission_consent`

defender-endpoint/linux-whatsnew.md

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: kumasumit, gopkr
88
ms.localizationpriority: medium
9-
ms.date: 01/09/2025
9+
ms.date: 01/13/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,6 +43,35 @@ This article is updated frequently to let you know what's new in the latest rele
4343
4444
## Releases for Defender for Endpoint on Linux
4545

46+
### Jan-2025 Build: 101.24112.0001 | Release version: 30.124112.0001.0
47+
48+
| Build: | **101.24112.0001** |
49+
|--------------------|-----------------------|
50+
| Released: | **January 13, 2025** |
51+
| Published: | **January 13, 2025** |
52+
| Release version: | **30.124112.0001.0** |
53+
| Engine version: | **1.1.24090.13** |
54+
| Signature version: | **1.421.226.0** |
55+
56+
#### What's new
57+
58+
- Upgraded the Bond version to 13.0.1 to address security vulnerabilities in versions 12 or lower.
59+
60+
- Mdatp package no longer has a dependency on SELinux packages.
61+
62+
- User can now query the status of supplementary event provider eBPF using the threat hunting query in DeviceTvmInfoGathering. To learn more about this query check: [Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux](/defender-endpoint/linux-support-ebpf). The result of this query can return the following two values as eBPF status:
63+
- Enabled: When eBPF is enabled as working as expected.
64+
- Disabled: When eBPF is disabled due to one of the following reasons:
65+
- When MDE is using auditD as a supplementary sensor
66+
- When eBPF is not present and we fallback to Netlink as supplementary event provider
67+
- There is no supplementary sensor present.
68+
69+
- Starting from 2411, the MDATP package release to Production on packages.microsoft.com will follow a gradual rollout mechanism which spans over a week. The other release rings, insiderFast and insiderSlow, are unaffected by this change.
70+
71+
- Stability and performance improvements.
72+
73+
- Critical bugs fixes around definition update flow.
74+
4675
### Jan-2025 Build: 101.24102.0000 | Release version: 30.124102.0000.0
4776

4877
| Build: | **101.24102.0000** |

defender-endpoint/update-agent-mma-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ A new agent was released in April 2022 for Windows Server 2012 R2 and Windows Se
7474
>
7575
> Devices running Windows Server 2012 R2 or Windows Server 2016 should be upgraded to the [new, unified solution](application-deployment-via-mecm.md) so that they no longer require the use of MMA.
7676
>
77-
> [AMA](/azure/azure-monitor/agents/agents-overview) cannot be used as a substitute for Defender for Endpoint.
77+
> [Azure Monitor Agent](/azure/azure-monitor/agents/agents-overview) cannot be used as a substitute for Defender for Endpoint.
7878
7979
## See also
8080

defender-office-365/anti-spam-bulk-senders-insight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ This article describes how to use the bulk senders insight in the Microsoft Defe
6363
> [!TIP]
6464
> Settings in the default or custom anti-spam policies are ignored if a recipient is also included in the [Standard or Strict preset security policies](preset-security-policies.md). For more information, see [Order and precedence of email protection](how-policies-and-protections-are-combined.md).
6565
>
66-
> The **Bulk threshold** value in an anti-spam policy determines the BCL threshold that's used to identify a message as bulk. For example, the **Bulk threshold** value 7 means that messages with the BCL value 7, 8, or 9 are identified as bulk. What happens to bulk messages is determined by the **Bulk compliant level (BCL) met or exceeded** action in the anti-spam policy (for example, **Move message to Junk Email folder**, **Quarantine**, or **Delete message**). For simplicity, identifying a message as bulk and taking action on it is called **blocked** in the bulk senders insight.
66+
> The **Bulk threshold** value in an anti-spam policy determines the BCL threshold that's used to identify a message as bulk. For example, the **Bulk threshold** value 7 means that messages with the BCL value 7, 8, or 9 are identified as bulk. What happens to bulk messages is determined by the **Bulk complaint level (BCL) met or exceeded** action in the anti-spam policy (for example, **Move message to Junk Email folder**, **Quarantine**, or **Delete message**). For simplicity, identifying a message as bulk and taking action on it is called **blocked** in the bulk senders insight.
6767
6868
## Open the bulk senders insight in the Microsoft Defender portal
6969

defender-office-365/recommended-settings-for-eop-and-office365.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.collection:
1919
- tier1
2020
description: What are best practices for Exchange Online Protection (EOP) and Defender for Office 365 security settings? What's the current recommendations for standard protection? What should be used if you want to be more strict? And what extras do you get if you also use Defender for Office 365?
2121
ms.service: defender-office-365
22-
ms.date: 3/19/2024
22+
ms.date: 01/13/2025
2323
appliesto:
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2525
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -170,8 +170,8 @@ For more information about the default sending limits in the service, see [Sendi
170170
|**Set a daily message limit** (_RecipientLimitPerDay_)|0|1000|800|The default value 0 means use the service defaults.|
171171
|**Restriction placed on users who reach the message limit** (_ActionWhenThresholdReached_)|**Restrict the user from sending mail until the following day** (`BlockUserForToday`)|**Restrict the user from sending mail** (`BlockUser`)|**Restrict the user from sending mail** (`BlockUser`)||
172172
|**Automatic forwarding rules** (_AutoForwardingMode_)|**Automatic - System-controlled** (`Automatic`)|**Automatic - System-controlled** (`Automatic`)|**Automatic - System-controlled** (`Automatic`)|
173-
|**Send a copy of outbound messages that exceed these limits to these users and groups** (_BccSuspiciousOutboundMail_ and _BccSuspiciousOutboundAdditionalRecipients_)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|We have no specific recommendation for this setting. <br><br> This setting works only in the default outbound spam policy. It doesn't work in custom outbound spam policies that you create.|
174-
|**Notify these users and groups if a sender is blocked due to sending outbound spam** (_NotifyOutboundSpam_ and _NotifyOutboundSpamRecipients_)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|The default [alert policy](/purview/alert-policies#threat-management-alert-policies) named **User restricted from sending email** already sends email notifications to members of the **TenantAdmins** group (**Global Administrator** members) when users are blocked due to exceeding the limits in policy. **We strongly recommend that you use the alert policy rather than this setting in the outbound spam policy to notify admins and other users**. For instructions, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users).|
173+
|**Send a copy of outbound messages that exceed these limits to these users and groups** (_BccSuspiciousOutboundMail_ and _BccSuspiciousOutboundAdditionalRecipients_)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|This setting works only in the default outbound spam policy. It doesn't work in custom outbound spam policies that you create. <br><br> The Microsoft SecureScore recommendation **Ensure Exchange Online Spam Policies are set to notify administrators** suggests that you configure this value.|
174+
|**Notify these users and groups if a sender is blocked due to sending outbound spam** (_NotifyOutboundSpam_ and _NotifyOutboundSpamRecipients_)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|Not selected (`$false` and Blank)|The default [alert policy](/purview/alert-policies#threat-management-alert-policies) named **User restricted from sending email** already sends email notifications to members of the **TenantAdmins** group (**Global Administrator** members) when users are blocked due to exceeding the limits in the policy. For instructions, see [Verify the alert settings for restricted users](outbound-spam-restore-restricted-users.md#verify-the-alert-settings-for-restricted-users). <br><br> Although we recommend that you use the alert policy rather than this setting in the outbound spam policy to notify admins and other users, the Microsoft SecureScore recommendation **Ensure Exchange Online Spam Policies are set to notify administrators** suggests that you configure this value.|
175175

176176
### EOP anti-phishing policy settings
177177

0 commit comments

Comments
 (0)