Skip to content

Commit 51e4cb9

Browse files
authored
Merge branch 'main' into poliveria-threat-analytics-07242024
2 parents ed0cfba + b019f89 commit 51e4cb9

File tree

7 files changed

+43
-65
lines changed

7 files changed

+43
-65
lines changed

defender-endpoint/android-configure.md

Lines changed: 14 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -61,36 +61,32 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
6161

6262
1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
6363

64-
> [!div class="mx-imgBorder"]
65-
> ![Image of how to create a policy.](media/android-mem.png)
66-
64+
> [!div class="mx-imgBorder"]
6765
1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
6866

69-
> [!div class="mx-imgBorder"]
70-
> ![Image of policy details.](media/appconfigdetails.png)
71-
67+
> [!div class="mx-imgBorder"]
68+
> ![Screenshot of policy details.](media/appconfigdetails.png)
69+
7270
1. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'1'** to enable Network Protection. (Network protection is disabled by default)
7371

74-
> [!div class="mx-imgBorder"]
75-
> ![Image of how to select enable network protection policy](media/selectnp.png)
76-
77-
> [!div class="mx-imgBorder"]
78-
> ![Image of add configuration policy.](media/npvalue.png)
79-
72+
> [!div class="mx-imgBorder"]
73+
> ![Screenshot of how to select enable network protection policy](media/selectnp.png)
74+
75+
> [!div class="mx-imgBorder"]
76+
> ![Screenshot of add configuration policy.](media/npvalue.png)
77+
8078
1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
8179

8280
To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.
8381

8482
**Example of Thumbprint format to add**: `50 30 06 09 1d 97 d4 f5 ae 39 f7 cb e7 92 7d 7d 65 2d 34 31, 503006091d97d4f5ae39f7cbe7927d7d652d3431`
8583

86-
> [!IMPORTANT]
84+
> [!IMPORTANT]
8785
> Certificate SHA-1 Thumbprint characters should be with either white space separated, or non separated.
8886
>
8987
> This format is invalid: `50:30:06:09:1d:97:d4:f5:ae:39:f7:cb:e7:92:7d:7d:65:2d:34:31`
9088
91-
Any other separation characters are invalid.
92-
93-
> ![Image of trusted CA certificate.](media/trustca.png)
89+
Any other separation characters are invalid.
9490

9591
1. For other configurations related to Network protection, add the following keys and appropriate corresponding value.
9692

@@ -119,26 +115,6 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
119115

120116
> [!NOTE]
121117
> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
122-
123-
## Configure Low Touch Onboarding
124-
125-
Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is simply required to provide a reduced set of permissions to complete onboarding.
126-
127-
Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:
128-
129-
1. Push the Defender app to target user group by following these [steps](android-intune.md#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app).
130-
2. Push a VPN profile to the user's device by following the instructions [here](android-intune.md#auto-setup-of-always-on-vpn).
131-
3. In Apps > Application configuration policies, select Managed Devices.
132-
4. Provide a name to uniquely identify the policy. Select 'Android Enterprise' as the Platform, the required Profile type and 'Microsoft Defender: Antivirus' as the targeted app. Click on Next.
133-
5. Add runtime permissions. Select Location access (fine)(This permission is not supported for Android 13 and above), POST_NOTIFICATIONS and change the Permission state to 'Auto grant'.
134-
6. Under configuration settings, select 'Use Configuration designer' and click on Add.
135-
7. Select Low touch onboarding and User UPN. For User UPN, change the Value type to 'Variable' and Configuration value to 'User Principal Name' from the drop down Enable Low touch onboarding by changing the configuration value to 1.
136-
>[!div class="mx-imgBorder"]
137-
>![Image of low touch onboarding configuration policy.](media/low-touch-user-upn.png)
138-
139-
8. Assign the policy to the target user group.
140-
9. Review and create the policy.
141-
142118
## Privacy Controls
143119

144120
Following privacy controls are available for configuring the data that is sent by Defender for Endpoint from Android devices:
@@ -347,11 +323,11 @@ Use the following steps to configure the Device tags:
347323
5. Click Next and assign this policy to targeted devices and users.
348324

349325

350-
> [!NOTE]
326+
> [!NOTE]
351327
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
352-
353328
## Related articles
354329

355330
- [Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)
331+
356332
- [Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
357333
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/get-all-vulnerabilities.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -94,21 +94,22 @@ Here is an example of the response.
9494
"@odata.context": "https://api.securitycenter.microsoft.com/api/$metadata#Vulnerabilities",
9595
"value": [
9696
{
97-
"id": "CVE-2019-0608",
98-
"name": "CVE-2019-0608",
99-
"description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.",
100-
"severity": "Medium",
101-
"cvssV3": 4.3,
97+
"id": "CVE-2024-7256",
98+
"name": "CVE-2024-7256",
99+
"description": "Summary: Google Chrome is vulnerable to a security bypass due to insufficient data validation in Dawn. An attacker can exploit this vulnerability by tricking a user into visiting a malicious website, allowing them to bypass security restrictions. Impact: If successfully exploited, this vulnerability could allow a remote attacker to bypass security restrictions in Google Chrome. Remediation: Apply the latest patches and updates provided by the respective vendors. Generated by AI",
100+
"severity": "High",
101+
"cvssV3": 8,
102102
"cvssVector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
103-
"exposedMachines": 4,
104-
"publishedOn": "2019-10-08T00:00:00Z",
105-
"updatedOn": "2019-12-16T16:20:00Z",
103+
"exposedMachines": 23,
104+
"publishedOn": "2024-07-30T00:00:00Z",
105+
"updatedOn": "2024-07-31T00:00:00Z",
106+
"firstDetected": "2024-07-31T01:55:47Z",
106107
"publicExploit": false,
107108
"exploitVerified": false,
108109
"exploitInKit": false,
109110
"exploitTypes": [],
110111
"exploitUris": [],
111-
"CveSupportability": "supported",
112+
"cveSupportability": "Supported",
112113
"tags": [],
113114
"epss": 0.632
114115
}

defender-endpoint/edr-detection.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/06/2024
18+
ms.date: 08/15/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -76,7 +76,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
7676

7777
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
7878

79-
<!---
8079
### macOS
8180

8281
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,7 +128,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129128

130129
Look at the alert details and the device timeline, and perform the regular investigation steps.
131130

132-
--->
133131

134132
## Next steps
135133

defender-endpoint/mac-preferences.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: how-to
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/29/2024
17+
ms.date: 08/15/2024
1818
---
1919

2020
# Set preferences for Microsoft Defender for Endpoint on macOS
@@ -681,7 +681,7 @@ The following configuration profile (or, in case of JAMF, a property list that c
681681
<key>PayloadOrganization</key>
682682
<string>Microsoft</string>
683683
<key>PayloadIdentifier</key>
684-
<string>com.microsoft.wdav</string>
684+
<string>
685685
<key>PayloadDisplayName</key>
686686
<string>Microsoft Defender for Endpoint settings</string>
687687
<key>PayloadDescription</key>
@@ -704,7 +704,7 @@ The following configuration profile (or, in case of JAMF, a property list that c
704704
<key>PayloadOrganization</key>
705705
<string>Microsoft</string>
706706
<key>PayloadIdentifier</key>
707-
<string>com.microsoft.wdav</string>
707+
<string>
708708
<key>PayloadDisplayName</key>
709709
<string>Microsoft Defender for Endpoint configuration settings</string>
710710
<key>PayloadDescription</key>

defender-endpoint/manage-tamper-protection-intune.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ manager: deniseb
55
description: Turn tamper protection on or off for your organization in Microsoft Intune.
66
ms.service: defender-endpoint
77
ms.localizationpriority: medium
8-
ms.date: 07/25/2024
8+
ms.date: 08/15/2024
99
audience: ITPro
1010
ms.topic: how-to
1111
author: siosulli
@@ -43,8 +43,11 @@ Tamper protection helps protect certain [security settings](prevent-changes-to-s
4343
> If you're using Microsoft Intune to manage Defender for Endpoint settings, make sure to set [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp#configurationdisablelocaladminmerge) to true on devices.
4444
>
4545
> When tamper protection is turned on, [tamper-protected settings](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on) cannot be changed. To avoid breaking management experiences, including Intune (and [Configuration Manager](manage-tamper-protection-configuration-manager.md)), keep in mind that changes to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
46+
>
4647
> - If you must make changes to a device and those changes are blocked by tamper protection, we recommend using [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device. Note that after troubleshooting mode ends, any changes made to tamper-protected settings are reverted to their configured state.
48+
>
4749
> - You can use Intune or [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection.
50+
>
4851
> - If you're managing tamper protection through Intune, you can change [tamper-protected antivirus exclusions](#tamper-protection-for-antivirus-exclusions).
4952
5053
## Requirements for managing tamper protection in Intune
@@ -68,7 +71,7 @@ Tamper protection helps protect certain [security settings](prevent-changes-to-s
6871

6972
:::image type="content" source="media/turnontamperprotectinmem.png" alt-text="Turn tamper protection turned on with Intune" lightbox="media/turnontamperprotectinmem.png":::
7073

71-
1. In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** \> **Antivirus**, and then choose **+ Create Policy**.
74+
1. In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Antivirus**, and then choose **+ Create Policy**.
7275

7376
- In the **Platform** list, select **Windows 10, Windows 11, and Windows Server**.
7477
- In the **Profile** list, select **Windows Security experience**.
@@ -88,12 +91,14 @@ If your organization has [exclusions defined for Microsoft Defender Antivirus](c
8891
| Condition | Criteria |
8992
|---|---|
9093
| Microsoft Defender platform | Devices are running Microsoft Defender platform `4.18.2211.5` or later. For more information, see [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions). |
91-
| `DisableLocalAdminMerge` setting | This setting is also known as preventing local list merging. `DisableLocalAdminMerge` is enabled so that settings configured on a device aren't merged with organization policies, such as settings in Intune. For more information, see [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp). |
94+
| `DisableLocalAdminMerge` setting | This setting is also known as preventing local list merging. `DisableLocalAdminMerge` must be enabled so that settings configured on a device aren't merged with organization policies, such as settings in Intune. For more information, see [DisableLocalAdminMerge](/windows/client-management/mdm/defender-csp). |
9295
| Device management | Devices are either managed in Intune only, or are managed with Configuration Manager only. Sense must be enabled. |
93-
| Antivirus exclusions | Microsoft Defender Antivirus exclusions are managed in Microsoft Intune. For more information, see [Settings for Microsoft Defender Antivirus policy in Microsoft Intune for Windows devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows). <br/><br/>Functionality to protect Microsoft Defender Antivirus exclusions is enabled on devices. For more information, see [How to determine whether antivirus exclusions are tamper protected on a Windows device](#how-to-determine-whether-antivirus-exclusions-are-tamper-protected-on-a-windows-device). |
96+
| Antivirus exclusions | Microsoft Defender Antivirus exclusions are managed in Microsoft Intune or Configuration Manager. For more information, see [Settings for Microsoft Defender Antivirus policy in Microsoft Intune for Windows devices](/mem/intune/protect/antivirus-microsoft-defender-settings-windows). <br/><br/>Functionality to protect Microsoft Defender Antivirus exclusions is enabled on devices. For more information, see [How to determine whether antivirus exclusions are tamper protected on a Windows device](#how-to-determine-whether-antivirus-exclusions-are-tamper-protected-on-a-windows-device). |
97+
98+
> [!NOTE]
99+
> For example, when Configuration Manager is used solely to manage exclusions and the required conditions are met, exclusions from Configuration Manager are tamper protected. In this case, there is no need to push antivirus exclusions using Microsoft Intune.
94100
95-
> [!TIP]
96-
> For more detailed information about Microsoft Defender Antivirus exclusions, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
101+
For more detailed information about Microsoft Defender Antivirus exclusions, see [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md).
97102

98103
## How to determine whether antivirus exclusions are tamper protected on a Windows device
99104

defender-endpoint/switch-to-mde-phase-3.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
- migrationguides
1818
- admindeeplinkDEFENDER
1919
ms.topic: how-to
20-
ms.date: 08/12/2024
20+
ms.date: 08/15/2024
2121
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho, yongrhee
2222
search.appverid: met150
2323
---
@@ -77,14 +77,12 @@ Deployment methods vary, depending on operating system and preferred methods. Th
7777
7878
## Step 2: Run a detection test
7979

80-
<!---Add this back later when the link works: Download and use the DIY app at <https://aka.ms/mdatpmacosdiy>.--->
81-
8280
To verify that your onboarded devices are properly connected to Defender for Endpoint, you can run a detection test.
8381

8482
|Operating system|Guidance|
8583
|---|---|
8684
|Windows 10 or later<br/><br/>Windows Server 2022<br/><br/>Windows Server 2019<br/><br/>Windows Server, version 1803, or later<br/><br/>Windows Server 2016<br/><br/>Windows Server 2012 R2|See [Run a detection test](run-detection-test.md).|
87-
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))| See [Run the connectivity test](troubleshoot-cloud-connect-mdemac.md#run-the-connectivity-test).|
85+
|macOS (see [System requirements](microsoft-defender-endpoint-mac.md))| Download and use the DIY app at [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy). Also see [Run the connectivity test](troubleshoot-cloud-connect-mdemac.md#run-the-connectivity-test).|
8886
|Linux (see [System requirements](microsoft-defender-endpoint-linux.md#system-requirements))|1. Run the following command, and look for a result of **1**: `mdatp health --field real_time_protection_enabled`.<br/><br/>2. Open a Terminal window, and run the following command: `curl -o ~/Downloads/eicar.com.txt https://www.eicar.org/download/eicar.com.txt`.<br/><br/>3. Run the following command to list any detected threats: `mdatp threat list`.<br/><br/>For more information, see [Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md).|
8987

9088
## Step 3: Confirm that Microsoft Defender Antivirus is in passive mode on your endpoints

defender-endpoint/web-content-filtering.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
66
author: siosulli
77
ms.reviewer: tdoucett
88
ms.localizationpriority: medium
9-
ms.date: 02/02/2024
9+
ms.date: 08/15/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -43,7 +43,7 @@ Configure policies across your device groups to block certain categories. Blocki
4343
Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and network protection (Chrome, Firefox, Brave, and Opera). For more information about browser support, see the [prerequisites](#prerequisites) section.
4444

4545
> [!NOTE]
46-
> Web content filtering does not apply policies to isolated browser sessions (i.e. Microsoft Defender Application Guard). The feature is also restricted to specific browsers via process name. This means that web content filtering doesn't work when there is a local proxy application in place (such as Fiddler, ZScaler), due to the process name being masked.
46+
> Web content filtering does not apply policies to isolated browser sessions (i.e. Microsoft Defender Application Guard). The feature is also restricted to specific browsers via process name. This means that web content filtering doesn't work when there is a local proxy application in place (such as Fiddler), due to the process name being masked.
4747
4848
## Benefits of web content filtering
4949

0 commit comments

Comments
 (0)