You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -122,6 +122,7 @@ Choose if to Generate an alert on the file block event and define the alerts set
122
122
123
123
> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
124
124
> > For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
125
+
125
126
> ## Advanced hunting capabilities (preview)
126
127
127
128
> [!IMPORTANT]
@@ -155,11 +156,17 @@ The response action activity can also be viewable in the device timeline.
155
156
Cert and File IoC policy handling conflicts follow this order:
156
157
157
158
1. If the file isn't allowed by Windows Defender Application Control and AppLocker enforce mode policies, then **Block**.
159
+
158
160
2. Else, if the file is allowed by the Microsoft Defender Antivirus exclusions, then **Allow**.
161
+
159
162
3. Else, if the file is blocked or warned by a block or warn file IoCs, then **Block/Warn**.
163
+
160
164
4. Else, if the file is blocked by SmartScreen, then **Block**.
165
+
161
166
5. Else, if the file is allowed by an allow file IoC policy, then **Allow**.
167
+
162
168
6. Else, if the file is blocked by attack surface reduction rules, controlled folder access, or antivirus protection, then **Block**.
169
+
163
170
7. Else, **Allow** (passes Windows Defender Application Control & AppLocker policy, no IoC rules apply to it).
0 commit comments