Skip to content

Commit 4c274d8

Browse files
authored
Merge branch 'main' into docs-editor/detect-block-potentially-unwan-1736871312
2 parents af99970 + 9403167 commit 4c274d8

26 files changed

+62
-102
lines changed

CloudAppSecurityDocs/tutorial-suspicious-activity.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Detect suspicious user activity with UEBA
33
description: This tutorial describes the process for tuning user activity detections in Microsoft Defender for Cloud Apps.
4-
ms.date: 02/22/2023
4+
ms.date: 01/14/2025
55
ms.topic: tutorial
66
---
77

@@ -24,13 +24,13 @@ Activities extracted from firewall and proxy traffic logs that are forwarded to
2424
- **[Proxy log](proxy-intro-aad.md)**
2525
Activities from your [conditional access app control apps](tutorial-proxy.md#phase-1-monitor-user-activities-for-anomalies).
2626

27-
Next, you'll want to tune your policies. The following policies can be fine-tuned by setting filters, dynamic thresholds (UEBA) to help train their detection models, and suppressions to reduce common false positive detections:
27+
Next, you want to tune your policies. The following policies can be fine-tuned by setting filters, dynamic thresholds (UEBA) to help train their detection models, and suppressions to reduce common false positive detections:
2828

2929
- Anomaly detection
3030
- Cloud discovery anomaly detection
3131
- Rule-based activity detection
3232

33-
In this tutorial, you'll learn how to tune user activity detections to identify true compromises and reduce alert fatigue resulting from handling large volumes of false positive detections:
33+
In this tutorial, you learn how to tune user activity detections to identify true compromises and reduce alert fatigue resulting from handling large volumes of false positive detections:
3434

3535
> [!div class="checklist"]
3636
>
@@ -43,11 +43,12 @@ In this tutorial, you'll learn how to tune user activity detections to identify
4343
4444
## Phase 1: Configure IP address ranges
4545

46-
Before configuring individual policies, it advisable to configure IP ranges so that they are available to use in fine-tuning any type of suspicious user activity detection policies.
46+
Before configuring individual policies, it advisable to configure IP ranges so that they're available to use in fine-tuning any type of suspicious user activity detection policies.
4747

48-
Because IP address information is crucial for almost all investigations, [configuring known IP addresses](ip-tags.md) helps our machine learning algorithms identify known locations and consider them as part of the machine learning models. For example, adding the IP address range of your VPN will help the model to correctly classify this IP range and automatically exclude it from impossible travel detections because the VPN location doesn't represent the true location of that user.
48+
Because IP address information is crucial for almost all investigations, [configuring known IP addresses](ip-tags.md) helps our machine learning algorithms identify known locations and consider them as part of the machine learning models. For example, adding the IP address range of your VPN helps the model to correctly classify this IP range and automatically exclude it from impossible travel detections because the VPN location doesn't represent the true location of that user.
4949

50-
Note: Configured IP ranges are not limited to detections and are used throughout Defender for Cloud Apps in areas such as activities in the activity log, Conditional Access, etc. Keep this in mind when configuring the ranges. So, for example, identifying your physical office IP addresses allows you to customize the way logs and alerts are displayed and investigated.
50+
> [!NOTE]
51+
> Configured IP ranges aren't limited to detections and are used throughout Defender for Cloud Apps in areas such as activities in the activity log, Conditional Access, etc. Keep this in mind when configuring the ranges. So, for example, identifying your physical office IP addresses allows you to customize the way logs and alerts are displayed and investigated.
5152
5253
### Review out-of-the-box anomaly detection alerts
5354

@@ -62,9 +63,9 @@ Several built-in anomaly detection policies are available in Defender for Cloud
6263
- **Impossible travel**
6364
Activities from the same user in different locations within a period that is shorter than the expected travel time between the two locations.
6465
- **Activity from infrequent country**
65-
Activity from a location that was not recently or never visited by the user.
66+
Activity from a location that wasn't recently or never visited by the user.
6667
- **Malware detection**
67-
Scans files in your cloud apps and runs suspicious files through Microsoft's threat intelligence engine to determine whether they are associated with known malware.
68+
Scans files in your cloud apps and runs suspicious files through Microsoft's threat intelligence engine to determine whether they're associated with known malware.
6869
- **Ransomware activity**
6970
File uploads to the cloud that might be infected with ransomware.
7071
- **Activity from suspicious IP addresses**
@@ -79,13 +80,13 @@ Detects multiple administrative activities in a single session with respect to t
7980
For a full list of detections and what they do, see [Anomaly detection policies](anomaly-detection-policy.md#anomaly-detection-policies).
8081

8182
> [!NOTE]
82-
> While some of the anomaly detections are primarily focused on detecting problematic security scenarios, others can assist in identifying and investigating anomalous user behavior that may not necessarily indicate a compromise. For such detections we created another data type called "behaviors" which is available in the Microsoft Defender XDR advanced hunting experience. For more information see [Behaviors](behaviors.md).
83+
> While some of the anomaly detections are primarily focused on detecting problematic security scenarios, others can assist in identifying and investigating anomalous user behavior that may not necessarily indicate a compromise. For such detections we created another data type called "behaviors" which is available in the Microsoft Defender XDR advanced hunting experience. For more information, see [Behaviors](behaviors.md).
8384
84-
Once you are familiar with the policies, you should consider how you want to fine-tune them for your organization's specific requirements to better target activities that you may want to investigate further.
85+
Once you're familiar with the policies, you should consider how you want to fine-tune them for your organization's specific requirements to better target activities that you may want to investigate further.
8586

8687
1. **Scope policies to specific users or groups**
8788

88-
Scoping policies to specific users can help reduce noise from alerts that are not relevant to your organization. Each policy can be [configured to include or exclude specific users and groups](anomaly-detection-policy.md#scope-anomaly-detection-policies), such as in the following examples:
89+
Scoping policies to specific users can help reduce noise from alerts that aren't relevant to your organization. Each policy can be [configured to include or exclude specific users and groups](anomaly-detection-policy.md#scope-anomaly-detection-policies), such as in the following examples:
8990

9091
- **Attack simulations**
9192
Many organizations use a user or a group to constantly simulate attacks. Obviously, it doesn't make sense to constantly receive alerts from these users' activities. Therefore, you can configure your policies to exclude these users or groups. This also helps the machine learning models identify these users and fine-tune their dynamic thresholds accordingly.
@@ -127,7 +128,7 @@ To prevent alert fatigue, configure the sensitivity of alerts. You can use the s
127128

128129
## Phase 4: Tune rule-based detection (activity) policies
129130

130-
[Rule-based detection policies](user-activity-policies.md) give you the ability to complement anomaly detection policies with organization-specific requirements. We recommend creating rules-based policies using one of our Activity policy templates (go to **Control** > **Templates** and set the **Type** filter to **Activity policy**) and then [configuring them](activity-filters-queries.md) to detect behaviors that are not normal for your environment. For example, for some organization that don't have any presence in a particular country/region, it may make sense to create a policy that detects the anomalous activities from that country/region and alert on them. For others, who have large branches in that country/region, activities from that country/region would be normal and it wouldn't make sense to detect such activities.
131+
[Rule-based detection policies](user-activity-policies.md) give you the ability to complement anomaly detection policies with organization-specific requirements. We recommend creating rules-based policies using one of our Activity policy templates (go to **Control** > **Templates** and set the **Type** filter to **Activity policy**) and then [configuring them](activity-filters-queries.md) to detect behaviors that aren't normal for your environment. For example, for some organization that don't have any presence in a particular country/region, it may make sense to create a policy that detects the anomalous activities from that country/region and alert on them. For others, who have large branches in that country/region, activities from that country/region would be normal and it wouldn't make sense to detect such activities.
131132

132133
1. **Tune activity volume**
133134
Choose the volume of activity required before the detection raises an alert. Using our country/region example, if you have no presence in a country/region, even a single activity is significant and warrants an alert. However, a single sign-in failure could be human error and only of interest if there are many failures in a short period.

defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,12 @@ In our example, the MpCmdRun utility starts a full antivirus scan on the device.
7171
|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
7272
|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
7373

74+
> [!NOTE]
75+
> For the "Scan" command, the following are the default timeout values for Quick or Full scans where the scan will stop at that time by default.
76+
> - Portal initiated scans (Quick or Full) or Windows Security app (Quick or Full): No time limit
77+
> - Scheduled Full Scans or MpCmdRun -scan: 7 day limit
78+
> - Scheduled Quick Scans or MpCmdRun -scan: 1 day limit
79+
7480
## Common errors in running commands via mpcmdrun.exe
7581

7682
The following table lists common errors that can occur while using the MpCmdRun tool.

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -76,10 +76,10 @@ You can enable attack surface reduction rules by using any of these methods:
7676
- [Microsoft Intune](#intune)
7777
- [Mobile Device Management (MDM)](#mdm)
7878
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
79-
- [Group Policy](#group-policy)
79+
- [Group policy (GP)](#group-policy)
8080
- [PowerShell](#powershell)
8181

82-
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting Group Policy or PowerShell settings on startup.
82+
Enterprise-level management such as Intune or Microsoft Configuration Manager is recommended. Enterprise-level management overwrites any conflicting group policy or PowerShell settings on startup.
8383

8484
## Exclude files and folders from attack surface reduction rules
8585

@@ -93,7 +93,8 @@ When adding exclusions, keep these points in mind:
9393

9494
* Exclusions are typically based on individual files or folders (using folder paths or the full path of the file to be excluded).
9595
* Exclusion paths can use environment variables and wildcards. See [Use wildcards in the file name and folder path or extension exclusion lists](configure-extension-file-exclusions-microsoft-defender-antivirus.md#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists)
96-
* When deployed through Group Policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it is possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions)
96+
* When deployed through group policy or PowerShell, exclusions apply to all attack surface reduction rules. Using Intune, it is possible to configure an exclusion for a specific attack surface reduction rule. See [Configure attack surface reduction rules per-rule exclusions](attack-surface-reduction-rules-deployment-test.md#configure-attack-surface-reduction-per-rule-exclusions).
97+
9798
* Exclusions can be added based on certificate and file hashes, by allowing specified Defender for Endpoint file and certificate indicators. See [Overview of indicators](indicators-overview.md).
9899

99100
## Policy Conflict
@@ -117,7 +118,7 @@ This section provides configuration details for the following configuration meth
117118
- [Custom profile in Intune](#custom-profile-in-intune)
118119
- [MDM](#mdm)
119120
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
120-
- [Group Policy](#group-policy)
121+
- [Group policy](#group-policy)
121122
- [PowerShell](#powershell)
122123

123124
The following procedures for enabling attack surface reduction rules include instructions for how to exclude files and folders.
@@ -267,12 +268,12 @@ Example:
267268
6. After the policy is created, select **Close**.
268269

269270
> [!WARNING]
270-
> There is a known issue with the applicability of Attack Surface Reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no ETA for when this will be fixed.
271+
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
271272
272-
### Group Policy
273+
### Group policy
273274

274275
> [!WARNING]
275-
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting Group Policy settings on startup.
276+
> If you manage your computers and devices with Intune, Configuration Manager, or other enterprise-level management platform, the management software will overwrite any conflicting group policy settings on startup.
276277
277278
1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and select **Edit**.
278279

defender-endpoint/microsoft-defender-antivirus-on-windows-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ sc query state= all
107107
108108
To get your regular security intelligence updates, the Windows Update service must be running. If you use an update management service, like Windows Server Update Services (WSUS), make sure Microsoft Defender Antivirus Security intelligence updates are approved for the computers you manage.
109109

110-
By default, Windows Update doesn't download and install updates automatically on Windows Server 2019 or Windows Server 2022, or Windows Server 2016. You can change this configuration by using one of the following methods:
110+
By default, Windows Update doesn't download and install updates automatically on Windows Server 2016, Windows Server 2019 or Windows Server 2022. You can change this configuration by using one of the following methods:
111111

112112
| Method | Description |
113113
|---|---|
@@ -155,7 +155,7 @@ To enable automatic sample submission, start a Windows PowerShell console as an
155155
156156
## Configure automatic exclusions
157157

158-
To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or 2019, or Windows Server 2022.
158+
To help ensure security and performance, certain exclusions are automatically added based on the roles and features you install when using Microsoft Defender Antivirus on Windows Server 2016 or Windows Server 2019, or Windows Server 2022.
159159

160160
See [Configure exclusions in Microsoft Defender Antivirus on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md).
161161

defender-endpoint/troubleshoot-onboarding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,13 @@ ms.date: 11/04/2024
2424
**Applies to:**
2525

2626
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27+
2728
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29+
2830
- Windows Server 2012 R2
2931
- Windows Server 2016
3032
- [Microsoft Defender XDR](/defender-xdr)
3133

32-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-pullalerts-abovefoldlink)
33-
3434
You might need to troubleshoot the Microsoft Defender for Endpoint onboarding process if you encounter issues.
3535
This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the devices.
3636

0 commit comments

Comments
 (0)