Skip to content

Commit 5475356

Browse files
authored
Merge pull request #1347 from MicrosoftDocs/main
3:30 pm main to live publish "Friday the 13th" 2024
2 parents 80b911d + d8917b6 commit 5475356

6 files changed

+81
-61
lines changed

defender-endpoint/configure-exclusions-microsoft-defender-antivirus.md

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure custom exclusions for Microsoft Defender Antivirus
33
description: You can exclude files (including files modified by specified processes) and folders from Microsoft Defender Antivirus scans.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 01/02/2024
6+
ms.date: 09/13/2024
77
author: siosulli
88
ms.author: siosulli
99
ms.custom: nextgen
@@ -59,9 +59,11 @@ If you're using another tool, such as Configuration Manager or Group Policy, or
5959

6060
3. Expand **Microsoft Defender Antivirus Exclusions** and then specify your exclusions.
6161

62-
- **Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list must be separated with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
63-
- **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
64-
- **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
62+
- **Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list, with one file type per line. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
63+
64+
- **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list, with one path per line. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
65+
66+
- **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list, with one file type per line. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
6567

6668
4. Choose **Review + save**, and then choose **Save**.
6769

@@ -78,8 +80,10 @@ If you're using another tool, such as Configuration Manager or Group Policy, or
7880
5. On the **Configuration settings** tab, specify your antivirus exclusions, and then choose **Next**.
7981

8082
- **Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
81-
- **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
82-
- **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
83+
84+
- **Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list, with one path per line. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
85+
86+
- **Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list, with one file type per line. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
8387

8488
6. On the **Scope tags** tab, if you're using scope tags in your organization, specify scope tags for the policy you're creating. (See [Scope tags](/mem/intune/fundamentals/scope-tags).)
8589

@@ -91,9 +95,9 @@ If you're using another tool, such as Configuration Manager or Group Policy, or
9195

9296
Defining exclusions lowers the protection offered by Microsoft Defender Antivirus. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
9397

94-
Exclusions directly affect the ability for Microsoft Defender Antivirus to block, remediate, or inspect events related to the files, folders, or processes that are added to the exclusion list. Custom exclusions can affect features that are directly dependent on the antivirus engine (such as protection against malware, [file IOCs](indicator-file.md), and [certificate IOCs](indicator-certificates.md)). Process exclusions also affect [network protection](network-protection.md) and [attack surface reduction rules](attack-surface-reduction.md). Specifically, a process exclusion on any platform causes network protection and ASR to be unable to inspect traffic or enforce rules for that specific process.
98+
Exclusions directly affect the ability for Microsoft Defender Antivirus to block, remediate, or inspect events related to the files, folders, or processes that are added to the exclusion list. Custom exclusions can affect features that are directly dependent on the antivirus engine (such as protection against malware, [file IOCs](indicator-file.md), and [certificate IOCs](indicator-certificates.md)). Process exclusions also affect [network protection](network-protection.md) and [attack surface reduction rules](attack-surface-reduction.md). Specifically, a process exclusion on any platform causes network protection and attack surface reduction capabilities to be unable to inspect traffic or enforce rules for that specific process.
9599

96-
Keep the following points in mind when you're defining exclusions:
100+
Remember these important points:
97101

98102
- Exclusions are technically a protection gap. Consider all your options when defining exclusions. See [Submissions, suppressions, and exclusions](defender-endpoint-antivirus-exclusions.md#submissions-suppressions-and-exclusions).
99103

@@ -121,4 +125,4 @@ If exclusions can't be removed for the Exchange processes and folders, keep in m
121125
- [Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md)
122126
- [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
123127

124-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
128+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/device-control-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Device control policies in Defender for Endpoint
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 08/27/2024
7+
ms.date: 09/13/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -382,7 +382,7 @@ The devices that are in scope for the policy determined by a list of included gr
382382
| `FriendlyNameId` | The friendly name in Windows Device Manager | Y | N | Y |
383383
| `PrimaryId` | The type of the device | Y | Y | Y |
384384
| `VID_PID` | Vendor ID is the four-digit vendor code that the USB committee assigns to the vendor. Product ID is the four-digit product code that the vendor assigns to the device. Wildcards are supported. For example, `0751_55E0` | Y | N | Y |
385-
|`PrinterConnectionId` | The type of printer connection: <br/>- USB<br/>- Corporate<br/>- Network<br/>- Universal<br/>- File<br/>- Custom<br/>- Local | N | N | Y |
385+
|`PrinterConnectionId` | The type of printer connection: <br/>- `USB`: A printer connected through USB port of a computer. <br/>- `Network`: A network printer is a printer that is accessible by network connection, making it usable by other computers connected to the network.<br/>- `Corporate`: A corporate printer is a print queue shared through on-premise Windows Print Server.<br/>- `Universal`: Universal Print is a modern print solution that organizations can use to manage their print infrastructure through cloud services from Microsoft. [What is Universal Print? - Universal Print \| Microsoft Docs](/universal-print/discover-universal-print) <br/>- `File`: 'Microsoft Print to PDF' and 'Microsoft XPS Document Writer' or other printers using a FILE: or PORTPROMPT: port<br/>- `Custom`: printer that is not connecting through Microsoft print port<br/>- `Local`: printer not any of above type, e.g. print through RDP or redirect printers | N | N | Y |
386386
| `BusId` | Information about the device (for more information, see the sections that follow this table) | Y | N | N |
387387
| `DeviceId` | Information about the device (for more information, see the sections that follow this table) | Y | N | N |
388388
| `HardwareId` | Information about the device (for more information, see the sections that follow this table) | Y | N | N |

defender-endpoint/mac-resources.md

Lines changed: 52 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/17/2024
17+
ms.date: 09/13/2024
1818
---
1919

2020
# Resources for Microsoft Defender for Endpoint on macOS
@@ -74,16 +74,7 @@ If an error occurs during installation, the installer reports a general failure
7474

7575
For further troubleshooting installation issues, see [Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](mac-support-install.md).
7676

77-
## Uninstalling
78-
79-
> [!NOTE]
80-
> Before uninstalling Microsoft Defender for Endpoint on macOS, offboard each device per [Offboard non-Windows devices](configure-endpoints-non-windows.md).
81-
82-
There are several ways to uninstall Microsoft Defender for Endpoint on macOS. Although centrally managed uninstallation is available on JAMF, it's not yet available for Microsoft Intune.
83-
84-
### Interactive uninstallation
85-
86-
- Open **Finder > Applications**. Right click on **Microsoft Defender for Endpoint**, and then select **Move to Trash**.
77+
## Configuring from the command line
8778

8879
### Supported output types
8980

@@ -93,28 +84,6 @@ Supports table and JSON format output types. For each command, there's a default
9384

9485
`-output table`
9586

96-
### From the command line
97-
98-
- `sudo '/Library/Application Support/Microsoft/Defender/uninstall/uninstall'`
99-
100-
### Using JAMF Pro
101-
102-
To uninstall Microsoft Defender for Endpoint on macOS using JAMF Pro upload the offboarding profile.
103-
104-
The offboarding profile should be uploaded without any modifications, and with Preference Domain name set to `com.microsoft.wdav.atp.offboarding`, as shown in the following image:
105-
106-
:::image type="content" source="/defender/media/defender-endpoint/jamf-pro-offboarding.png" alt-text="Screenshot of the JAMF offboarding screen" lightbox="/defender/media/defender-endpoint/jamf-pro-offboarding.png":::
107-
108-
109-
> [!NOTE]
110-
> If you have trouble uninstalling Defender for Endpoint on Mac, and you see in your reports an item for *Microsoft Defender Endpoint Security Extension*, follow these steps:
111-
> 1. Reinstall the Microsoft Defender app.
112-
> 2. Drag **Microsoft Defender.app** to **Trash**.
113-
> 3. Run this command: `sudo /Library/Application Support/Microsoft/Defender/uninstall/install_helper execute --path '/Library/Application Support/Microsoft/Defender/uninstall/uninstall' --args --post-uninstall-hook`.
114-
> 4. Restart the device.
115-
116-
## Configuring from the command line
117-
11887
Important tasks, such as controlling product settings and triggering on-demand scans, can be done by using the command line:
11988

12089
|Group|Scenario|Command|
@@ -201,10 +170,57 @@ To enable autocompletion in zsh:
201170

202171
`/Library/Application Support/Microsoft/Defender/quarantine/` contains the files quarantined by `mdatp`. The files are named after the threat trackingId. The current trackingIds are shown with `mdatp threat list`.
203172

204-
## Microsoft Defender for Endpoint portal information
173+
## Uninstalling
174+
175+
There are several ways to uninstall Microsoft Defender for Endpoint on macOS. Although centrally managed uninstallation is available on JAMF, it's not yet available for Microsoft Intune.
176+
177+
All of the uninstall of Microsoft Defender for Endpoint on macOS require the following:
178+
179+
1. Create a [device tag](/defender-endpoint/machine-tags), and name the tag *decommissioned* and assign it to the macOS where Microsoft Defender for macOS is being uninstalled.
180+
181+
1. Create a [Device group](/defender-endpoint/machine-groups) and name it (e.g. *Decommissioned macOS*) and assign a user *group* that should be able to see them.
182+
183+
Note: Steps 1 and 2 are optional if you do not want to see these devices that are retired in the "Device inventory" for 180 days.
184+
185+
1. Remove the "Set Preferences" policies that contain [Tamper Protection](/defender-endpoint/tamperprotection-macos) or through the manual configuration.
186+
187+
1. Offboard each device per [Offboard non-Windows devices](configure-endpoints-non-windows.md).
188+
189+
1. Uninstall the Microsoft Defender for Endpoint for macOS apps
190+
191+
1. Remove the device from the *group* for *system extension* policies if an MDM was used to set them.
192+
193+
### Interactive uninstallation
194+
195+
- Open **Finder > Applications**. Right click on **Microsoft Defender for Endpoint**, and then select **Move to Trash**.
196+
197+
### From the command line
198+
199+
- `sudo '/Library/Application Support/Microsoft/Defender/uninstall/uninstall'`
200+
201+
### Using JAMF Pro
202+
203+
To uninstall Microsoft Defender for Endpoint on macOS using JAMF Pro upload the offboarding profile.
204+
205+
The offboarding profile should be uploaded without any modifications, and with Preference Domain name set to `com.microsoft.wdav.atp.offboarding`, as shown in the following image:
206+
207+
:::image type="content" source="/defender/media/defender-endpoint/jamf-pro-offboarding.png" alt-text="Screenshot of the JAMF offboarding screen" lightbox="/defender/media/defender-endpoint/jamf-pro-offboarding.png":::
208+
209+
210+
> [!NOTE]
211+
> If you have trouble uninstalling Defender for Endpoint on Mac, and you see in your reports an item for *Microsoft Defender Endpoint Security Extension*, follow these steps:
212+
> 1. Reinstall the Microsoft Defender app.
213+
> 2. Drag **Microsoft Defender.app** to **Trash**.
214+
> 3. Run this command: `sudo /Library/Application Support/Microsoft/Defender/uninstall/install_helper execute --path '/Library/Application Support/Microsoft/Defender/uninstall/uninstall' --args --post-uninstall-hook`.
215+
> 4. Restart the device.
216+
217+
## The Microsoft Defender portal
218+
219+
When threats are detected, your security team can view detections and if necessary, take response actions on a device in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). The Microsoft Defender combines protection, detection, investigation, and response to threats in a central location. For more information, see the following resources:
205220

206-
The Microsoft Defender for Endpoint blog,
207-
[EDR capabilities for macOS have now arrived](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/edr-capabilities-for-macos-have-now-arrived/ba-p/1047801) provides detailed guidance on what to expect.
221+
- [Overview of endpoint detection and response](/defender-endpoint/overview-endpoint-detection-response)
222+
- [Tech Community blog: EDR capabilities for macOS have now arrived](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/edr-capabilities-for-macos-have-now-arrived/ba-p/1047801)
223+
- [Microsoft Defender portal overview](/defender-xdr/microsoft-365-defender-portal)
208224

209225

210226
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/manage-gradual-rollout.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: ngp
1717
search.appverid: met150
18-
ms.date: 01/12/2024
18+
ms.date: 09/13/2024
1919
---
2020

2121
# Manage the gradual rollout process for Microsoft Defender updates
@@ -95,7 +95,7 @@ You can also assign a machine to a channel to define the cadence in which it rec
9595
|Channel name|Description|Application|
9696
|---|---|---|
9797
|Current Channel (Staged)|Get Current Channel updates later during gradual release|Devices are offered updates later during the gradual release cycle. Suggested to apply to a small, representative part of your device population (~10%).|
98-
|Current Channel (Broad)|Get updates at the end of gradual release|Devices will be offered updates after the gradual release cycle. Best for datacenter machines that only receive limited updates. Note: this setting applies to all Defender updates.|
98+
|Current Channel (Broad)|Get updates at the end of gradual release|Devices will be offered updates after the gradual release cycle. Suggested to apply to a broad set of devices in your production population. Note: this setting applies to all Defender updates.|
9999
|(default)||If you disable or don't configure this policy, the device remains in Current Channel (Default): Stay up to date automatically during the gradual release cycle. This means Microsoft assigns a channel to the device. The channel selected by Microsoft might be one that receives updates early during the gradual release cycle, which isn't suitable for devices in a production or critical environment.|
100100

101101
> [!NOTE]

0 commit comments

Comments
 (0)