You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/admin-submissions-mde.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
title: Submit files in Microsoft Defender for Endpoint
3
3
description: Learn how to use the unified submissions feature in Microsoft Defender XDR to submit suspicious emails, URLs, email attachments, and files to Microsoft for scanning.
Copy file name to clipboardExpand all lines: defender-endpoint/api/add-or-remove-machine-tags.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.topic: reference
15
15
ms.subservice: reference
16
16
ms.custom: api
17
17
search.appverid: met150
18
-
ms.date: 02/24/2023
18
+
ms.date: 05/02/2024
19
19
---
20
20
21
21
# Add or remove a tag for a machine
@@ -35,7 +35,10 @@ ms.date: 02/24/2023
35
35
36
36
## API description
37
37
38
-
Adds or removes a tag for a specific [Machine](machine.md).
38
+
Adds or removes a tag for a specific [device](machine.md).
39
+
40
+
> [!NOTE]
41
+
> If you are looking for how to tag machines in bulk via API, see [Add or remove multiple machine tags](/defender-endpoint/api/add-or-remove-multiple-machine-tags).
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268088) when signed in to the Microsoft 365 admin center. This guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268087).
48
+
46
49
## Attack surface reduction rules by type
47
50
48
51
Attack surface reduction rules are categorized as one of two types:
49
52
50
-
-**Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the affect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.
53
+
-**Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the effect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.
51
54
52
55
-**Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)
53
56
@@ -131,7 +134,7 @@ The following table lists the supported operating systems for rules that are cur
131
134
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y | Y | Y |
132
135
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y | Y | Y |
133
136
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y | Y | Y |
134
-
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only |N|
137
+
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only |Y <br>Exchange Role Only|
135
138
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N | N | N |
136
139
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.collection:
16
16
- tier2
17
17
- mde-asr
18
18
search.appverid: met150
19
-
ms.date: 11/22/2023
19
+
ms.date: 05/02/2024
20
20
---
21
21
22
22
# Attack surface reduction rules overview
@@ -31,6 +31,9 @@ ms.date: 11/22/2023
31
31
**Platforms**
32
32
- Windows
33
33
34
+
> [!TIP]
35
+
> As a companion to this article, we recommend using the [Microsoft Defender for Endpoint automated setup guide](https://go.microsoft.com/fwlink/?linkid=2268615) when signed in to the Microsoft 365 admin center. This guide will customize your experience based on your environment. To review best practices without signing in and activating automated setup features, go to the [Microsoft 365 setup guide](https://go.microsoft.com/fwlink/?linkid=2268522).
36
+
34
37
## Why attack surface reduction rules are important
35
38
36
39
Your organization's attack surface includes all the places where an attacker could compromise your organization's devices or networks. Reducing your attack surface means protecting your organization's devices and network, which leaves attackers with fewer ways to perform attacks. Configuring attack surface reduction rules in Microsoft Defender for Endpoint can help!
Copy file name to clipboardExpand all lines: defender-endpoint/auto-investigation-action-center.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ The following table compares the new, unified Action center to the previous Acti
40
40
41
41
|The new, unified Action center |The previous Action center |
42
42
|---------|---------|
43
-
|Lists pending and completed actions for devices and email in one location <br/>([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) plus [Microsoft Defender for Office 365]/defender-office-365/mdo-about|Lists pending and completed actions for devices <br/> ([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) only) |
43
+
|Lists pending and completed actions for devices and email in one location <br/>([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) plus [Microsoft Defender for Office 365](/defender-office-365/mdo-about)|Lists pending and completed actions for devices <br/> ([Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) only) |
44
44
|Is located at:<br/>[https://security.microsoft.com/action-center](https://security.microsoft.com/action-center)|Is located at:<br/>[https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)|
45
45
| In the <ahref="https://go.microsoft.com/fwlink/p/?linkid=2077139"target="_blank">Microsoft Defender portal</a>, choose **Action center**. <p>:::image type="content" source="media/action-center-nav-new.png" alt-text="The navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-new.png"::: | In the Microsoft Defender portal, choose **Automated investigations** > **Action center**. <p>:::image type="content" source="media/action-center-nav-old.png" alt-text="An older version of the navigation pane to the Action Center in the Microsoft Defender portal" lightbox="media/action-center-nav-old.png"::: |
46
46
@@ -50,7 +50,7 @@ You can use the unified Action center if you have appropriate permissions and on
Copy file name to clipboardExpand all lines: defender-endpoint/autoir-investigation-results.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ With Microsoft Defender for Endpoint, when an [automated investigation](automate
32
32
33
33
## (NEW!) Unified investigation page
34
34
35
-
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365]/defender-office-365/mdo-about.
35
+
The investigation page has recently been updated to include information across your devices, email, and collaboration content. The new, unified investigation page defines a common language and provides a unified experience for automatic investigations across [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md) and [Microsoft Defender for Office 365](/defender-office-365/mdo-about).
36
36
37
37
> [!TIP]
38
38
> To learn more about what's changing, see [(NEW!) Unified investigation page](/microsoft-365/security/mtp/mtp-autoir-results).
Copy file name to clipboardExpand all lines: defender-endpoint/comprehensive-guidance-on-linux-deployment.md
+24-25Lines changed: 24 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: linux
16
16
search.appverid: met150
17
-
ms.date: 04/04/2024
17
+
ms.date: 05/08/2024
18
18
---
19
19
20
20
# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
@@ -39,7 +39,7 @@ To learn about other ways to deploy Microsoft Defender for Endpoint on Linux, se
39
39
40
40
Learn about the general guidance on a typical Microsoft Defender for Endpoint on Linux deployment. The applicability of some steps is determined by the requirements of your Linux environment.
41
41
42
-
1.[Work with your Firewall, Proxy, and Networking admin](#1-work-with-your-firewall-proxy-and-networking-admin).
42
+
1.[Prepare your network environment](#1-prepare-your-network-environment).
43
43
44
44
2.[Capture performance data from the endpoint](#2-capture-performance-data-from-the-endpoint).
45
45
@@ -86,39 +86,31 @@ Learn about the general guidance on a typical Microsoft Defender for Endpoint on
86
86
87
87
22.[Uninstall your non-Microsoft solution](#22-uninstall-your-non-microsoft-solution).
88
88
89
-
## 1. Work with your Firewall, Proxy, and Networking admin
89
+
## 1. Prepare your network environment
90
90
91
-
Work with your Firewall, Proxy, and Networking admin to add the Microsoft Defender for Endpoint URLs to the allowed list, and prevent it from being SSL inspected.
91
+
Add the Microsoft Defender for Endpoint URLs and/or IP addresses to the allowed list, and prevent traffic from being SSL inspected.
92
92
93
-
For more information, see, [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
94
93
95
94
### Network connectivity of Microsoft Defender for Endpoint
96
95
97
96
Use the following steps to check the network connectivity of Microsoft Defender for Endpoint:
98
97
99
-
1. See [Allow URLs for the Microsoft Defender for Endpoint traffic](#step-1-allow-urls-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
98
+
1. See [Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic](#step-1-allow-destinations-for-the-microsoft-defender-for-endpoint-traffic) that are allowed for the Microsoft Defender for Endpoint traffic.
100
99
101
100
2. If the Linux servers are behind a proxy, then set the proxy settings. For more information, see [Set up proxy settings](#step-2-set-up-proxy-settings).
102
101
103
102
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
104
103
105
104
> [!NOTE]
106
-
> It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
105
+
> - It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
106
+
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
107
107
108
-
#### Step 1: Allow URLs for the Microsoft Defender for Endpoint traffic
108
+
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
109
109
110
-
1. Download the [Microsoft Defender for Endpoint URL list for commercial customers](https://download.microsoft.com/download/6/b/f/6bfff670-47c3-4e45-b01b-64a2610eaefa/mde-urls-commercial.xlsx
111
-
) or the [Microsoft Defender for Endpoint URL list for Gov/GCC/DoD](https://download.microsoft.com/download/6/a/0/6a041da5-c43b-4f17-8167-79dfdc10507f/mde-urls-gov.xlsx) for a list of services and their associated URLs that your network must be able to connect.
110
+
#### Step 1: Allow destinations for the Microsoft Defender for Endpoint traffic
112
111
113
-
2. Under **Geography** column, ensure the following checkboxes are selected:
114
-
- EU, or UK, or US
115
-
- WW
116
-
- (Blanks)
117
-
118
-
> [!NOTE]
119
-
> You should ensure that there are no firewall or network filtering rules that would deny access to these URLs. If there are, you may need to create an allow rule specifically for them.
120
-
121
-
3. Work with the Firewall/Proxy/Networking admins to allow the relevant URLs.
112
+
1. Go to [STEP 1: Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md) to find the relevant destinations that need to be accessible to devices inside your network environment
113
+
2. Configure your Firewall/Proxy/Network to allow the relevant URLs and/or IP addresses
122
114
123
115
#### Step 2: Set up proxy settings
124
116
@@ -521,17 +513,24 @@ For more information, see [New device health reporting for Microsoft Defender an
521
513
522
514
To ensure that the device is correctly onboarded and reported to the service, run the following detection test:
523
515
524
-
-Antimalware detections:
516
+
-Open a Terminal window and execute the following command to run an antimalware detection test:
> If the detections do not show up, it could be that you have set "allowedThreats" to allow in preferences via Ansible or Puppet.
529
531
530
-
If the detection doesn't show up, it could be that you have set "allowedThreats" to allow in preferences via Ansible or Puppet.
532
+
- Endpoint detection and response (EDR) detections, see [Experience Microsoft Defender for Endpoint through simulated attacks](attack-simulations.md). If the detection doesn't show up, then it could be that we're missing event or alerts in portal. For more information, see [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md).
531
533
532
-
- Endpoint detection and response (EDR) detections:
533
-
For more information, see [Experience Microsoft Defender for Endpoint through simulated attacks](attack-simulations.md).
534
-
If the detection doesn't show up, then it could be that we're missing event or alerts in portal. For more information, see [Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux](linux-support-events.md).
535
534
- For more information about unified submissions in Microsoft Defender XDR and the ability to submit **False Positives** and **False Negatives** through the portal, see [Unified submissions in Microsoft Defender XDR now Generally Available! - Microsoft Tech Community](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/unified-submissions-in-microsoft-365-defender-now-generally/ba-p/3270770).
536
535
537
536
## 20. Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint on Linux
0 commit comments