You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/edr-in-block-mode.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.custom:
14
14
- next-gen
15
15
- mde-edr
16
16
- admindeeplinkDEFENDER
17
-
ms.date: 04/26/2024
17
+
ms.date: 06/25/2024
18
18
ms.collection:
19
19
- m365-security
20
20
- tier2
@@ -44,7 +44,6 @@ This article describes EDR in block mode, which helps protect devices that are r
44
44
45
45
> [!IMPORTANT]
46
46
> EDR in block mode cannot provide all available protection when Microsoft Defender Antivirus real-time protection is in passive mode. Some capabilities that depend on Microsoft Defender Antivirus to be the active antivirus solution will not work, such as the following examples:
47
-
>
48
47
> - Real-time protection, including on-access scanning, and scheduled scan is not available when Microsoft Defender Antivirus is in passive mode. To learn more about real-time protection policy settings, see **[Enable and configure Microsoft Defender Antivirus always-on protection](configure-real-time-protection-microsoft-defender-antivirus.md)**.
49
48
> - Features like **[network protection](network-protection.md)** and **[attack surface reduction rules](attack-surface-reduction.md)** and indicators (file hash, ip address, URL, and certificates) are only available when Microsoft Defender Antivirus is running in active mode.
50
49
> It is expected that your non-Microsoft antivirus solution includes these capabilities.
@@ -107,6 +106,9 @@ The following table lists requirements for EDR in block mode:
107
106
108
107
> [!IMPORTANT]
109
108
> To get the best protection value, make sure your antivirus solution is configured to receive regular updates and essential features, and that your [exclusions are configured](configure-exclusions-microsoft-defender-antivirus.md). EDR in block mode respects exclusions that are defined for Microsoft Defender Antivirus, but not [indicators](manage-indicators.md) that are defined for Microsoft Defender for Endpoint.
109
+
>
110
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
Copy file name to clipboardExpand all lines: defender-endpoint/faqs-on-tamper-protection.yml
+5-7Lines changed: 5 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ metadata:
13
13
ms.topic: faq
14
14
ms.collection:
15
15
- m365-security
16
-
ms.date: 10/27/2023
16
+
ms.date: 06/25/2024
17
17
title: Frequently asked questions (FAQs) about tamper protection
18
18
summary: |
19
19
@@ -42,7 +42,7 @@ sections:
42
42
- Devices must be using anti-malware platform version `4.18.2010.7` (or later) and anti-malware engine version `1.1.17600.5` (or later). ([Manage Microsoft Defender Antivirus updates and apply baselines](microsoft-defender-antivirus-updates.md).)
43
43
- [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) must be turned on.
44
44
45
-
To manage tamper protection in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), you must have appropriate permissions assigned through roles, such as Global Administrator or Security Administrator. (See [Microsoft Defender XDR role-based access control (RBAC)](/defender-xdr/manage-rbac).)
45
+
To manage tamper protection in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)), you must have appropriate permissions assigned through roles, such as Security Administrator. (See [Microsoft Defender XDR role-based access control (RBAC)](/defender-xdr/manage-rbac).)
46
46
47
47
- question: |
48
48
On which versions of Windows can I configure tamper protection?
@@ -80,7 +80,7 @@ sections:
80
80
- question: |
81
81
Does tamper protection apply to Microsoft Defender Antivirus exclusions?
82
82
answer: |
83
-
New functionality is rolling out now to protect Microsoft Defender Antivirus exclusions on devices. Certain conditions must be met. For example, you must use Intune only or Configuration Manager only to manage devices, and you must have Sense enabled. See [Protect Microsoft Defender Antivirus exclusions](prevent-changes-to-security-settings-with-tamper-protection.md#protect-microsoft-defender-antivirus-exclusions).
83
+
Yes. To protect Microsoft Defender Antivirus exclusions on devices, certain conditions must be met. For example, you must use Intune only or Configuration Manager only to manage devices, and you must have Sense enabled. See [Protect Microsoft Defender Antivirus exclusions](prevent-changes-to-security-settings-with-tamper-protection.md#protect-microsoft-defender-antivirus-exclusions).
84
84
85
85
- question: |
86
86
How does configuring tamper protection in Intune affect how I manage Microsoft Defender Antivirus with Group Policy?
@@ -155,10 +155,8 @@ sections:
155
155
- question: |
156
156
If the status of tamper protection changes, are alerts shown in the Microsoft Defender portal?
157
157
answer: |
158
-
Alerts should be listed in the [Microsoft Defender portal](https://security.microsoft.com) under **Alerts**.
159
-
160
-
Your security operations team can also use hunting queries, such as the following example:
161
-
158
+
Alerts should be listed in the [Microsoft Defender portal](https://security.microsoft.com) under **Alerts**. Your security operations team can also use hunting queries, such as the following example:
159
+
162
160
`AlertInfo|where Title == "Tamper Protection bypass"`
Copy file name to clipboardExpand all lines: defender-endpoint/grant-mssp-access.md
+25-28Lines changed: 25 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,68 +27,64 @@ ms.date: 12/18/2020
27
27
28
28
> [!IMPORTANT]
29
29
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
30
+
>
31
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
30
32
31
33
To implement a multitenant delegated access solution, take the following steps:
32
34
33
-
1. Enable [role-based access control](rbac.md) in Defender for Endpoint and connect with Active Directory (AD) groups.
35
+
1. Enable [role-based access control](rbac.md) in Defender for Endpoint and connect with Microsoft Entra ID groups.
34
36
35
37
2. Configure [Governance Access Packages](/azure/active-directory/governance/identity-governance-overview) for access request and provisioning.
36
38
37
-
3. Manage access requests and audits in [Microsoft Myaccess](/azure/active-directory/governance/entitlement-management-request-approve).
39
+
3. Manage access requests and audits in [Microsoft MyAccess](/azure/active-directory/governance/entitlement-management-request-approve).
38
40
39
41
## Enable role-based access controls in Microsoft Defender for Endpoint
40
42
41
-
1.**Create access groups for MSSP resources in Customer AAD: Groups**
43
+
1.**Create access groups for MSSP resources in Customer Entra ID: Groups**
42
44
43
-
These groups are linked to the Roles you create in Defender for Endpoint. To do so, in the customer AD tenant, create three groups. In our example approach, we create the following groups:
45
+
These groups are linked to the Roles you create in Defender for Endpoint. To do so, in the customer Entra ID tenant, create three groups. In our example approach, we create the following groups:
44
46
45
47
- Tier 1 Analyst
46
48
- Tier 2 Analyst
47
49
- MSSP Analyst Approvers
48
50
49
51
2. Create Defender for Endpoint roles for appropriate access levels in Customer Defender for Endpoint.
50
52
51
-
To enable RBAC in the customer Microsoft Defender portal, access **Settings > Endpoints > Permissions > Roles** and "Turn on roles", from a user account with Global Administrator or Security Administrator rights.
53
+
To enable RBAC in the customer [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Permissions** > **Roles**, and then select **Turn on roles**.
52
54
53
-
Then, create RBAC roles to meet MSSP SOC Tier needs. Link these roles to the created user groups via "Assigned user groups".
55
+
Then, create RBAC roles to meet MSSP SOC Tier needs. Link these roles to the created user groups via assigned user groups. There are two possible roles: Tier 1 Analysts, and Tier 2 Analysts.
54
56
55
-
Two possible roles:
57
+
-**Tier 1 Analysts** - Perform all actions except for live response and manage security settings.
56
58
57
-
-**Tier 1 Analysts**
58
-
59
-
Perform all actions except for live response and manage security settings.
60
-
61
-
-**Tier 2 Analysts**
62
-
63
-
Tier 1 capabilities with the addition to [live response](live-response.md)
59
+
-**Tier 2 Analysts** - Tier 1 capabilities with the addition to [live response](live-response.md)
64
60
65
61
For more information, see [Use role-based access control](rbac.md).
66
62
67
63
## Configure Governance Access Packages
68
64
69
-
1.**Add MSSP as Connected Organization in Customer AAD: Identity Governance**
65
+
1.**Add MSSP as Connected Organization in Customer Entra ID: Identity Governance**
70
66
71
-
Adding the MSSP as a connected organization allows the MSSP to request and have accesses provisioned.
67
+
Adding the MSSP as a connected organization allows the MSSP to request and have access provisioned.
72
68
73
-
To do so, in the customer AD tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. We suggest creating a separate AD tenant for your MSSP Analysts.
69
+
To do so, in the customer Entra ID tenant, access Identity Governance: Connected organization. Add a new organization and search for your MSSP Analyst tenant via Tenant ID or Domain. We suggest creating a separate Entra ID tenant for your MSSP Analysts.
74
70
75
-
2.**Create a resource catalog in Customer AAD: Identity Governance**
71
+
2.**Create a resource catalog in Customer Entra ID: Identity Governance**
76
72
77
-
Resource catalogs are a logical collection of access packages, created in the customer AD tenant.
73
+
Resource catalogs are a logical collection of access packages, created in the customer Entra ID tenant.
78
74
79
-
To do so, in the customer AD tenant, access Identity Governance: Catalogs, and add **New Catalog**. In our example, it's called, **MSSP Accesses**.
75
+
To do so, in the customer Entra ID tenant, access Identity Governance: Catalogs, and add **New Catalog**. In our example, it's called, **MSSP Accesses**.
80
76
81
77
:::image type="content" source="media/goverance-catalog.png" alt-text="The new catalog page" lightbox="media/goverance-catalog.png":::
82
78
83
79
Further more information, see [Create a catalog of resources](/azure/active-directory/governance/entitlement-management-catalog-create).
84
80
85
-
3.**Create access packages for MSSP resources Customer AAD: Identity Governance**
Access packages are the collection of rights and accesses that a requestor is granted upon approval.
88
84
89
-
To do so, in the customer AD tenant, access Identity Governance: Access Packages, and add **New Access Package**. Create an access package for the MSSP approvers and each analyst tier. For example, the following Tier 1 Analyst configuration creates an access package that:
85
+
To do so, in the customer Entra ID tenant, access Identity Governance: Access Packages, and add **New Access Package**. Create an access package for the MSSP approvers and each analyst tier. For example, the following Tier 1 Analyst configuration creates an access package that:
90
86
91
-
- Requires a member of the AD group **MSSP Analyst Approvers** to authorize new requests
87
+
- Requires a member of the Entra ID group **MSSP Analyst Approvers** to authorize new requests
92
88
- Has annual access reviews, where the SOC analysts can request an access extension
93
89
- Can only be requested by users in the MSSP SOC Tenant
94
90
- Access auto expires after 365 days
@@ -98,7 +94,7 @@ To implement a multitenant delegated access solution, take the following steps:
98
94
99
95
For more information, see [Create a new access package](/azure/active-directory/governance/entitlement-management-access-package-create).
100
96
101
-
4.**Provide access request link to MSSP resources from Customer AAD: Identity Governance**
97
+
4.**Provide access request link to MSSP resources from Customer Entra ID: Identity Governance**
102
98
103
99
The My Access portal link is used by MSSP SOC analysts to request access via the access packages created. The link is durable, meaning the same link may be used over time for new analysts. The analyst request goes into a queue for approval by the **MSSP Analyst Approvers**.
104
100
@@ -109,21 +105,22 @@ To implement a multitenant delegated access solution, take the following steps:
109
105
110
106
## Manage access
111
107
112
-
1. Review and authorize access requests in Customer and/or MSSP myaccess.
108
+
1. Review and authorize access requests in Customer and/or MSSP MyAccess.
113
109
114
110
Access requests are managed in the customer My Access, by members of the MSSP Analyst Approvers group.
115
111
116
-
To do so, access the customer's myaccess using: `https://myaccess.microsoft.com/@<Customer Domain>`.
112
+
To do so, access the customer's MyAccess using: `https://myaccess.microsoft.com/@<Customer Domain>`.
2. Approve or deny requests in the **Approvals** section of the UI.
121
117
122
-
At this point, analyst access has been provisioned, and each analyst should be able to access the customer's Microsoft Defender portal: `https://security.microsoft.com/?tid=<CustomerTenantId>`
118
+
At this point, analyst access is provisioned, and each analyst should be able to access the customer's Microsoft Defender portal: `https://security.microsoft.com/?tid=<CustomerTenantId>`
123
119
124
-
## Related topics
120
+
## Related articles
125
121
126
122
-[Access the MSSP customer portal](access-mssp-portal.md)
Copy file name to clipboardExpand all lines: defender-endpoint/manage-automation-file-uploads.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ ms.collection:
12
12
- tier2
13
13
ms.topic: conceptual
14
14
search.appverid: met150
15
-
ms.date: 05/08/2023
15
+
ms.date: 06/25/2024
16
16
---
17
17
18
18
# Manage automation file uploads
@@ -37,18 +37,23 @@ For example, if you add *exe* and *bat* as file or attachment extension names, t
37
37
> [!NOTE]
38
38
> Microsoft securely stores the files submitted for a six-month period. Files are promptly deleted after six months.
39
39
40
-
## Add file extension names and attachment extension names.
40
+
## Add file extension names and attachment extension names
41
41
42
-
1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
42
+
> [!IMPORTANT]
43
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
44
+
45
+
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
43
46
44
47
2. In the navigation pane, select **Settings**\>**Endpoints**\>**Rules**\>**Automation uploads**.
45
48
46
49
2. Toggle the content analysis setting between **On** and **Off**.
47
50
48
51
3. Configure the following extension names and separate extension names with a comma:
52
+
49
53
-**File extension names** - Suspicious files except email attachments will be submitted for additional inspection
Copy file name to clipboardExpand all lines: defender-endpoint/manage-automation-folder-exclusions.md
+14-6Lines changed: 14 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: edr
16
16
search.appverid: met150
17
-
ms.date: 12/18/2020
17
+
ms.date: 06/25/2024
18
18
---
19
19
20
20
# Manage automation folder exclusions
@@ -41,13 +41,17 @@ You can control the following attributes about the folder that you'd like to be
41
41
42
42
-**File names**: You can specify the file names that you want to be excluded in a specific directory. The names are a way to prevent an attacker from using an excluded folder to hide an exploit. The names explicitly define which files to ignore.
43
43
44
+
> [!IMPORTANT]
45
+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
46
+
47
+
44
48
## Add an automation folder exclusion
45
49
46
-
1.Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
50
+
1.Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
47
51
48
52
2. In the navigation pane, select **Settings**\>**Endpoints**\>**Rules**\>**Automation folder exclusions**.
49
53
50
-
2.Click**New folder exclusion**.
54
+
2.Select**New folder exclusion**.
51
55
52
56
3. Enter the folder details:
53
57
@@ -56,25 +60,29 @@ You can control the following attributes about the folder that you'd like to be
56
60
- File names
57
61
- Description
58
62
59
-
4.Click**Save**.
63
+
4.Select**Save**.
60
64
61
65
> [!NOTE]
62
66
> Live Response commands to collect or examine excluded files will fail with error: "File is excluded". In addition, automated investigations will ignore the excluded items.
63
67
64
68
## Edit an automation folder exclusion
65
69
66
70
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Rules**\>**Automation folder exclusions**.
67
-
2. Click **Edit** on the folder exclusion.
71
+
72
+
2. Select **Edit** on the folder exclusion.
73
+
68
74
3. Update the details of the rule and click **Save**.
69
75
70
76
## Remove an automation folder exclusion
71
77
72
78
1. In the navigation pane, select **Settings**\>**Endpoints**\>**Rules**\>**Automation folder exclusions**.
0 commit comments