You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-exclusions-microsoft-defender-antivirus.md
+13-9Lines changed: 13 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Configure custom exclusions for Microsoft Defender Antivirus
3
3
description: You can exclude files (including files modified by specified processes) and folders from Microsoft Defender Antivirus scans.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 01/02/2024
6
+
ms.date: 09/13/2024
7
7
author: siosulli
8
8
ms.author: siosulli
9
9
ms.custom: nextgen
@@ -59,9 +59,11 @@ If you're using another tool, such as Configuration Manager or Group Policy, or
59
59
60
60
3. Expand **Microsoft Defender Antivirus Exclusions** and then specify your exclusions.
61
61
62
-
-**Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list must be separated with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
63
-
-**Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
64
-
-**Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
62
+
-**Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list, with one file type per line. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
63
+
64
+
-**Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list, with one path per line. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
65
+
66
+
-**Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list, with one file type per line. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
65
67
66
68
4. Choose **Review + save**, and then choose **Save**.
67
69
@@ -78,8 +80,10 @@ If you're using another tool, such as Configuration Manager or Group Policy, or
78
80
5. On the **Configuration settings** tab, specify your antivirus exclusions, and then choose **Next**.
79
81
80
82
-**Excluded Extensions** are exclusions that you define by file type extension. These extensions apply to any file name that has the defined extension without the file path or folder. Separate each file type in the list with a `|` character. For example, `lib|obj`. For more information, see [ExcludedExtensions](/windows/client-management/mdm/policy-csp-defender#excludedextensions).
81
-
-**Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list with a `|` character. For example, `C:\Example|C:\Example1`. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
82
-
-**Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list with a `|` character. For example, `C:\Example. exe|C:\Example1.exe`. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
83
+
84
+
-**Excluded Paths** are exclusions that you define by their location (path). These types of exclusions are also known as file and folder exclusions. Separate each path in the list, with one path per line. For more information, see [ExcludedPaths](/windows/client-management/mdm/policy-csp-defender#excludedpaths).
85
+
86
+
-**Excluded Processes** are exclusions for files that are opened by certain processes. Separate each file type in the list, with one file type per line. These exclusions aren't for the actual processes. To exclude processes, you can use file and folder exclusions. For more information, see [ExcludedProcesses](/windows/client-management/mdm/policy-csp-defender#excludedprocesses).
83
87
84
88
6. On the **Scope tags** tab, if you're using scope tags in your organization, specify scope tags for the policy you're creating. (See [Scope tags](/mem/intune/fundamentals/scope-tags).)
85
89
@@ -91,9 +95,9 @@ If you're using another tool, such as Configuration Manager or Group Policy, or
91
95
92
96
Defining exclusions lowers the protection offered by Microsoft Defender Antivirus. You should always evaluate the risks that are associated with implementing exclusions, and you should only exclude files that you're confident aren't malicious.
93
97
94
-
Exclusions directly affect the ability for Microsoft Defender Antivirus to block, remediate, or inspect events related to the files, folders, or processes that are added to the exclusion list. Custom exclusions can affect features that are directly dependent on the antivirus engine (such as protection against malware, [file IOCs](indicator-file.md), and [certificate IOCs](indicator-certificates.md)). Process exclusions also affect [network protection](network-protection.md) and [attack surface reduction rules](attack-surface-reduction.md). Specifically, a process exclusion on any platform causes network protection and ASR to be unable to inspect traffic or enforce rules for that specific process.
98
+
Exclusions directly affect the ability for Microsoft Defender Antivirus to block, remediate, or inspect events related to the files, folders, or processes that are added to the exclusion list. Custom exclusions can affect features that are directly dependent on the antivirus engine (such as protection against malware, [file IOCs](indicator-file.md), and [certificate IOCs](indicator-certificates.md)). Process exclusions also affect [network protection](network-protection.md) and [attack surface reduction rules](attack-surface-reduction.md). Specifically, a process exclusion on any platform causes network protection and attack surface reduction capabilities to be unable to inspect traffic or enforce rules for that specific process.
95
99
96
-
Keep the following points in mind when you're defining exclusions:
100
+
Remember these important points:
97
101
98
102
- Exclusions are technically a protection gap. Consider all your options when defining exclusions. See [Submissions, suppressions, and exclusions](defender-endpoint-antivirus-exclusions.md#submissions-suppressions-and-exclusions).
99
103
@@ -121,4 +125,4 @@ If exclusions can't be removed for the Exchange processes and folders, keep in m
121
125
-[Configure and validate exclusions for Microsoft Defender for Endpoint on Linux](linux-exclusions.md)
122
126
-[Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
123
127
124
-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
128
+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-policies.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about Device control policies in Defender for Endpoint
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 08/27/2024
7
+
ms.date: 09/13/2024
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -382,7 +382,7 @@ The devices that are in scope for the policy determined by a list of included gr
382
382
|`FriendlyNameId`| The friendly name in Windows Device Manager | Y | N | Y |
383
383
|`PrimaryId`| The type of the device | Y | Y | Y |
384
384
|`VID_PID`| Vendor ID is the four-digit vendor code that the USB committee assigns to the vendor. Product ID is the four-digit product code that the vendor assigns to the device. Wildcards are supported. For example, `0751_55E0`| Y | N | Y |
385
-
|`PrinterConnectionId`| The type of printer connection: <br/>- USB<br/>- Corporate<br/>- Network<br/>- Universal<br/>- File<br/>- Custom<br/>- Local | N | N | Y |
385
+
|`PrinterConnectionId`| The type of printer connection: <br/>- `USB`: A printer connected through USB port of a computer. <br/>- `Network`: A network printer is a printer that is accessible by network connection, making it usable by other computers connected to the network.<br/>- `Corporate`: A corporate printer is a print queue shared through on-premise Windows Print Server.<br/>- `Universal`: Universal Print is a modern print solution that organizations can use to manage their print infrastructure through cloud services from Microsoft. [What is Universal Print? - Universal Print \| Microsoft Docs](/universal-print/discover-universal-print)<br/>- `File`: 'Microsoft Print to PDF' and 'Microsoft XPS Document Writer' or other printers using a FILE: or PORTPROMPT: port<br/>- `Custom`: printer that is not connecting through Microsoft print port<br/>- `Local`: printer not any of above type, e.g. print through RDP or redirect printers| N | N | Y |
386
386
|`BusId`| Information about the device (for more information, see the sections that follow this table) | Y | N | N |
387
387
|`DeviceId`| Information about the device (for more information, see the sections that follow this table) | Y | N | N |
388
388
|`HardwareId`| Information about the device (for more information, see the sections that follow this table) | Y | N | N |
Copy file name to clipboardExpand all lines: defender-endpoint/mac-resources.md
+52-36Lines changed: 52 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: macos
16
16
search.appverid: met150
17
-
ms.date: 05/17/2024
17
+
ms.date: 09/13/2024
18
18
---
19
19
20
20
# Resources for Microsoft Defender for Endpoint on macOS
@@ -74,16 +74,7 @@ If an error occurs during installation, the installer reports a general failure
74
74
75
75
For further troubleshooting installation issues, see [Troubleshoot installation issues for Microsoft Defender for Endpoint on macOS](mac-support-install.md).
76
76
77
-
## Uninstalling
78
-
79
-
> [!NOTE]
80
-
> Before uninstalling Microsoft Defender for Endpoint on macOS, offboard each device per [Offboard non-Windows devices](configure-endpoints-non-windows.md).
81
-
82
-
There are several ways to uninstall Microsoft Defender for Endpoint on macOS. Although centrally managed uninstallation is available on JAMF, it's not yet available for Microsoft Intune.
83
-
84
-
### Interactive uninstallation
85
-
86
-
- Open **Finder > Applications**. Right click on **Microsoft Defender for Endpoint**, and then select **Move to Trash**.
77
+
## Configuring from the command line
87
78
88
79
### Supported output types
89
80
@@ -93,28 +84,6 @@ Supports table and JSON format output types. For each command, there's a default
To uninstall Microsoft Defender for Endpoint on macOS using JAMF Pro upload the offboarding profile.
103
-
104
-
The offboarding profile should be uploaded without any modifications, and with Preference Domain name set to `com.microsoft.wdav.atp.offboarding`, as shown in the following image:
105
-
106
-
:::image type="content" source="/defender/media/defender-endpoint/jamf-pro-offboarding.png" alt-text="Screenshot of the JAMF offboarding screen" lightbox="/defender/media/defender-endpoint/jamf-pro-offboarding.png":::
107
-
108
-
109
-
> [!NOTE]
110
-
> If you have trouble uninstalling Defender for Endpoint on Mac, and you see in your reports an item for *Microsoft Defender Endpoint Security Extension*, follow these steps:
111
-
> 1. Reinstall the Microsoft Defender app.
112
-
> 2. Drag **Microsoft Defender.app** to **Trash**.
113
-
> 3. Run this command: `sudo /Library/Application Support/Microsoft/Defender/uninstall/install_helper execute --path '/Library/Application Support/Microsoft/Defender/uninstall/uninstall' --args --post-uninstall-hook`.
114
-
> 4. Restart the device.
115
-
116
-
## Configuring from the command line
117
-
118
87
Important tasks, such as controlling product settings and triggering on-demand scans, can be done by using the command line:
119
88
120
89
|Group|Scenario|Command|
@@ -201,10 +170,57 @@ To enable autocompletion in zsh:
201
170
202
171
`/Library/Application Support/Microsoft/Defender/quarantine/` contains the files quarantined by `mdatp`. The files are named after the threat trackingId. The current trackingIds are shown with `mdatp threat list`.
203
172
204
-
## Microsoft Defender for Endpoint portal information
173
+
## Uninstalling
174
+
175
+
There are several ways to uninstall Microsoft Defender for Endpoint on macOS. Although centrally managed uninstallation is available on JAMF, it's not yet available for Microsoft Intune.
176
+
177
+
All of the uninstall of Microsoft Defender for Endpoint on macOS require the following:
178
+
179
+
1. Create a [device tag](/defender-endpoint/machine-tags), and name the tag *decommissioned* and assign it to the macOS where Microsoft Defender for macOS is being uninstalled.
180
+
181
+
1. Create a [Device group](/defender-endpoint/machine-groups) and name it (e.g. *Decommissioned macOS*) and assign a user *group* that should be able to see them.
182
+
183
+
Note: Steps 1 and 2 are optional if you do not want to see these devices that are retired in the "Device inventory" for 180 days.
184
+
185
+
1. Remove the "Set Preferences" policies that contain [Tamper Protection](/defender-endpoint/tamperprotection-macos) or through the manual configuration.
186
+
187
+
1. Offboard each device per [Offboard non-Windows devices](configure-endpoints-non-windows.md).
188
+
189
+
1. Uninstall the Microsoft Defender for Endpoint for macOS apps
190
+
191
+
1. Remove the device from the *group* for *system extension* policies if an MDM was used to set them.
192
+
193
+
### Interactive uninstallation
194
+
195
+
- Open **Finder > Applications**. Right click on **Microsoft Defender for Endpoint**, and then select **Move to Trash**.
To uninstall Microsoft Defender for Endpoint on macOS using JAMF Pro upload the offboarding profile.
204
+
205
+
The offboarding profile should be uploaded without any modifications, and with Preference Domain name set to `com.microsoft.wdav.atp.offboarding`, as shown in the following image:
206
+
207
+
:::image type="content" source="/defender/media/defender-endpoint/jamf-pro-offboarding.png" alt-text="Screenshot of the JAMF offboarding screen" lightbox="/defender/media/defender-endpoint/jamf-pro-offboarding.png":::
208
+
209
+
210
+
> [!NOTE]
211
+
> If you have trouble uninstalling Defender for Endpoint on Mac, and you see in your reports an item for *Microsoft Defender Endpoint Security Extension*, follow these steps:
212
+
> 1. Reinstall the Microsoft Defender app.
213
+
> 2. Drag **Microsoft Defender.app** to **Trash**.
214
+
> 3. Run this command: `sudo /Library/Application Support/Microsoft/Defender/uninstall/install_helper execute --path '/Library/Application Support/Microsoft/Defender/uninstall/uninstall' --args --post-uninstall-hook`.
215
+
> 4. Restart the device.
216
+
217
+
## The Microsoft Defender portal
218
+
219
+
When threats are detected, your security team can view detections and if necessary, take response actions on a device in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). The Microsoft Defender combines protection, detection, investigation, and response to threats in a central location. For more information, see the following resources:
205
220
206
-
The Microsoft Defender for Endpoint blog,
207
-
[EDR capabilities for macOS have now arrived](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/edr-capabilities-for-macos-have-now-arrived/ba-p/1047801) provides detailed guidance on what to expect.
221
+
-[Overview of endpoint detection and response](/defender-endpoint/overview-endpoint-detection-response)
222
+
-[Tech Community blog: EDR capabilities for macOS have now arrived](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/edr-capabilities-for-macos-have-now-arrived/ba-p/1047801)
Copy file name to clipboardExpand all lines: defender-endpoint/manage-gradual-rollout.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: ngp
17
17
search.appverid: met150
18
-
ms.date: 01/12/2024
18
+
ms.date: 09/13/2024
19
19
---
20
20
21
21
# Manage the gradual rollout process for Microsoft Defender updates
@@ -95,7 +95,7 @@ You can also assign a machine to a channel to define the cadence in which it rec
95
95
|Channel name|Description|Application|
96
96
|---|---|---|
97
97
|Current Channel (Staged)|Get Current Channel updates later during gradual release|Devices are offered updates later during the gradual release cycle. Suggested to apply to a small, representative part of your device population (~10%).|
98
-
|Current Channel (Broad)|Get updates at the end of gradual release|Devices will be offered updates after the gradual release cycle. Best for datacenter machines that only receive limited updates. Note: this setting applies to all Defender updates.|
98
+
|Current Channel (Broad)|Get updates at the end of gradual release|Devices will be offered updates after the gradual release cycle. Suggested to apply to a broad set of devices in your production population. Note: this setting applies to all Defender updates.|
99
99
|(default)||If you disable or don't configure this policy, the device remains in Current Channel (Default): Stay up to date automatically during the gradual release cycle. This means Microsoft assigns a channel to the device. The channel selected by Microsoft might be one that receives updates early during the gradual release cycle, which isn't suitable for devices in a production or critical environment.|
0 commit comments