Skip to content

Commit 5e5b286

Browse files
authored
Merge branch 'main' into mdav-release
2 parents 66d391c + bbb3234 commit 5e5b286

23 files changed

+105
-54
lines changed

defender-endpoint/linux-exclusions.md

Lines changed: 48 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 01/31/2025
18+
ms.date: 02/18/2025
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -52,7 +52,7 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
5252
5353
| Exclusion Category | Exclusion Scope | Description |
5454
| --- | --- | --- |
55-
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus (AV) scans and on-demand scans.|
55+
| Antivirus Exclusion | Antivirus engine <br/>*(scope: epp)* | Excludes content from antivirus scans and on-demand scans.|
5656
| Global Exclusion | Antivirus and endpoint detections and response engine <br/>*(scope: global)* | Excludes events from real time protection and EDR visibility. Doesn't apply to on-demand scans by default. |
5757

5858
> [!IMPORTANT]
@@ -63,12 +63,12 @@ Antivirus exclusions can be used to exclude trusted files and processes from rea
6363

6464
The following table shows the exclusion types supported by Defender for Endpoint on Linux.
6565

66-
Exclusion|Definition|Examples
67-
---|---|---
68-
File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test`
69-
File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log`
70-
Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/`
71-
Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t`
66+
|Exclusion|Definition|Examples|
67+
|---|---|---|
68+
|File extension|All files with the extension, anywhere on the device (not available for global exclusions) |`.test` |
69+
|File|A specific file identified by the full path|`/var/log/test.log`<br/>`/var/log/*.log`<br/>`/var/log/install.?.log` |
70+
| Folder|All files under the specified folder (recursively)|`/var/log/`<br/>`/var/*/` |
71+
| Process|A specific process (specified either by the full path or file name) and all files opened by it|`/bin/cat`<br/>`cat`<br/>`c?t` |
7272

7373
> [!IMPORTANT]
7474
> The paths used must be hard links, not symbolic links, in order to be successfully excluded. You can check if a path is a symbolic link by running `file <path-name>`.
@@ -89,6 +89,8 @@ Wildcard|Description|Examples|
8989
9090
## How to configure the list of exclusions
9191

92+
You can configure exclusions using a management console, Defender for Endpoint security settings management, or the command line.
93+
9294
### Using the management console
9395

9496
To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.
@@ -140,6 +142,43 @@ To configure exclusions from Puppet, Ansible, or another management console, ple
140142

141143
For more information, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
142144

145+
### Using Defender for Endpoint security settings management
146+
147+
As a security administrator, you can configure Defender for Endpoint exclusions using the Microsoft Defender portal. This method is referred to as Defender for Endpoint security settings management. If you're using this method for the first time, make sure to complete the following procedures:
148+
149+
#### 1. Configure your tenant to support security settings management
150+
151+
1. In the [Microsoft Defender portal](https://security.microsoft.com), navigate to **Settings** > **Endpoints** > **Configuration Management** > **Enforcement Scope**, and then select the Linux platform.
152+
153+
2. Tag devices with the `MDE-Management` tag. Most devices enroll and receive the policy within minutes, although some might take up to 24 hours. For more information, see [Learn how to use Intune endpoint security policies to manage Microsoft Defender for Endpoint on devices that are not enrolled with Intune](/mem/intune/protect/mde-security-integration).
154+
155+
#### 2. Create a Microsoft Entra group
156+
157+
Create a dynamic Microsoft Entra group that uses the operating system type to ensure that all devices onboarded to Defender for Endpoint receive policies. Using a dynamic group allows devices managed by Defender for Endpoint to be automatically added to the group, eliminating the need for admins to create new policies manually. For more information, see the following articles:
158+
159+
- [Create Microsoft Entra Groups](/mem/intune/protect/mde-security-integration#create-microsoft-entra-groups)
160+
- [Microsoft Entra groups overview](/entra/fundamentals/concept-learn-about-groups)
161+
162+
#### 3. Create an endpoint security policy
163+
164+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Configuration management** > **Endpoint security policies**, and then select **Create new Policy**.
165+
166+
2. For Platform, select **Linux**.
167+
168+
3. Select the required exclusion template (**Microsoft defender global exclusion (AV+EDR) for global exclusions and Microsoft defender antivirus exclusions for antivirus exclusions**), and then select **Create policy**.
169+
170+
4. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
171+
172+
5. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
173+
174+
6. When you're done configuring settings, select **Next**.
175+
176+
7. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
177+
178+
8. On the **Review + create** page, when you're done, select **Save**. The new profile is displayed in the list when you select the policy type for the profile you created.
179+
180+
For more information refer: [Manage endpoint security policies in Microsoft Defender for Endpoint](/defender-endpoint/manage-security-policies#create-an-endpoint-security-policy).
181+
143182
### Using the command line
144183

145184
Run the following command to see the available switches for managing exclusions:
@@ -157,7 +196,7 @@ mdatp exclusion
157196
158197
Examples:
159198

160-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
199+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)*:
161200

162201
```bash
163202
mdatp exclusion extension add --name .txt

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ These three most recent major releases of macOS are supported.
7979
- Beta versions of macOS aren't supported.
8080

8181
> [!IMPORTANT]
82-
> On macOS 11 (Large Sur) and later, Microsoft Defender for Endpoint requires more configuration profiles. If you're an existing customer upgrading from earlier versions of macOS, make sure to deploy the extra configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
82+
> On macOS 11 (Big Sur) and later, Microsoft Defender for Endpoint requires more configuration profiles. If you're an existing customer upgrading from earlier versions of macOS, make sure to deploy the extra configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md) and detailed in [installation instructions](#installation-instructions).
8383
8484
After you've enabled the service, you might need to configure your network or firewall to allow outbound connections between it and your endpoints.
8585

defender-office-365/threat-explorer-real-time-detections-about.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: conceptual
10-
ms.date: 01/15/2025
10+
ms.date: 02/18/2025
1111
ms.localizationpriority: medium
1212
ms.collection:
1313
- m365-security
@@ -104,6 +104,9 @@ Threat Explorer and Real-time detections contain the following elements:
104104
|**URL clicks**|||Information about user clicks on URLs in email messages, Teams messages, SharePoint files, and OneDrive files.|
105105

106106
These views are described in detail in this article, including the differences between Threat Explorer and Real-time detections.
107+
108+
> [!TIP]
109+
> Real-time detections shows the malicious email detections at the time of delivery only. Threat Explorer shows all email detections at the time of delivery along with post-delivery activities.
107110
108111
- **Date/time filters**: By default, the view is filtered by yesterday and today. To change the date filter, select the date range, and then select **Start Date** and **End date** values up to 30 days ago.
109112

@@ -176,7 +179,7 @@ The filterable properties that are available in the **Delivery action** box in t
176179
|Exchange transport rule|Text. Separate multiple values by commas.|
177180
|Data loss prevention rule|Text. Separate multiple values by commas.|
178181
|Context|Select one or more values: <ul><li>**Evaluation**</li><li>**Priority account protection**</li></ul>|
179-
|Connector|Text. Separate multiple values by commas.|
182+
|Connector|Text (connector name). Separate multiple values by commas.|
180183
|Delivery action|Select one or more values: <ul><li>**Blocked**: Email messages that were quarantined, that failed delivery, or were dropped.</li><li>**Delivered**: Email delivered to the user's Inbox or other folder where the user can access the message.</li><li>**Delivered to junk**: Email delivered to the user's Junk Email folder or Deleted Items folder where the user can access the message.</li><li>**Replaced**: Message attachments that were replaced by [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li></ul>|
181184
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**: The message was retroactively identified as good.</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
182185
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|
@@ -633,7 +636,7 @@ The filterable properties that are available in the **Sender address** box in th
633636
|Exchange transport rule|Text. Separate multiple values by commas.|||
634637
|Data loss prevention rule|Text. Separate multiple values by commas.|||
635638
|Context|Select one or more values: <ul><li>**Evaluation**</li><li>**Priority account protection**</li></ul>|||
636-
|Connector|Text. Separate multiple values by commas.|||
639+
|Connector|Text (connector name). Separate multiple values by commas.|||
637640
|Delivery action|Select one or more values: <ul><li>**Blocked**</li><li>**Delivered**</li><li>**Delivered to junk**</li><li>**Replaced**: Message attachments that were replaced by [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li></ul>|||
638641
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|||
639642
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|||
@@ -906,7 +909,7 @@ The filterable properties that are available in the **Sender address** box in th
906909
|Exchange transport rule|Text. Separate multiple values by commas.|||
907910
|Data loss prevention rule|Text. Separate multiple values by commas.|||
908911
|Context|Select one or more values: <ul><li>**Evaluation**</li><li>**Priority account protection**</li></ul>|||
909-
|Connector|Text. Separate multiple values by commas.|||
912+
|Connector|Text (connector name). Separate multiple values by commas.|||
910913
|Delivery action|Select one or more values: <ul><li>**Blocked**</li><li>**Delivered**</li><li>**Delivered to junk**</li><li>**Replaced**: Message attachments that were replaced by [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li></ul>|||
911914
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**</li></ul>|||
912915
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|||

defender-xdr/advanced-hunting-security-copilot.md

Lines changed: 17 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ appliesto:
3939

4040
[Microsoft Security Copilot in Microsoft Defender](security-copilot-in-microsoft-365-defender.md) comes with a query assistant capability in advanced hunting.
4141

42-
Threat hunters or security analysts who aren't yet familiar with or have yet to learn KQL can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Security Copilot then generates a KQL query that corresponds to the request using the advanced hunting data schema.
42+
Threat hunters or security analysts who aren't yet familiar with or have yet to learn Kusto query language (KQL) can make a request or ask a question in natural language (for instance, *Get all alerts involving user admin123*). Security Copilot then generates a KQL query that corresponds to the request using the advanced hunting data schema.
4343

4444
This feature reduces the time it takes to write a hunting query from scratch so that threat hunters and security analysts can focus on hunting and investigating threats.
4545

@@ -50,25 +50,29 @@ Users with access to Security Copilot have access to this capability in advanced
5050
5151
## Try your first request
5252

53-
1. Open the **advanced hunting** page from the navigation bar in Microsoft Defender XDR. The Security Copilot side pane for advanced hunting appears at the right hand side.
53+
1. Open the **Advanced hunting** page from the navigation bar in Microsoft Defender XDR. The Security Copilot side pane for advanced hunting appears at the right hand side.
5454

55-
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-pane.png" alt-text="Screenshot of the Copilot pane in advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-pane-big.png":::
55+
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-pane-big.png" alt-text="Screenshot of the Copilot pane in advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-pane-big.png":::
5656

5757
You can also reopen Copilot by selecting **Copilot** at the top of the query editor.
58-
1. In the Copilot prompt bar, ask any threat hunting query that you want to run and press :::image type="icon" source="media/Send.png" border="false"::: or **Enter** .
58+
1. In the Copilot prompt bar, ask any threat hunting query that you want to run and press :::image type="icon" source="media/Send.png" border="false"::: or **Enter**.
5959

6060

6161

62-
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-query.png" alt-text="Screenshot that shows prompt bar in the Security Copilot for advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-query-big.png":::
62+
:::image type="content" source="/defender/media/advanced-hunting-security-copilot-query-big.png" alt-text="Screenshot that shows prompt bar in the Security Copilot for advanced hunting." lightbox="/defender/media/advanced-hunting-security-copilot-query-big.png":::
6363

6464
1. Copilot generates a KQL query from your text instruction or question. While Copilot is generating, you can cancel the query generation by selecting **Stop generating**.
6565

6666
![Screenshot of Security Copilot in advanced hunting generating a response.](/defender/media/advanced-hunting-security-copilot-generate.png)
6767

6868

69-
1. Review the generated query. You can then choose to run the query by selecting **Add and run**.
69+
1. Review the generated query. To check how Copilot came up with the query, you can select **See the logic behind the query** below the query text to expand the explanation behind the query. Select it again to minimize.
7070

71-
![Screenshot of Copilot button showing Add the query to query editor and run.](/defender/media/advanced-hunting-security-copilot-run-query.png)
71+
![Screenshot of Copilot button showing See the logic behind the query.](/defender/media/advanced-hunting-security-copilot-see-logic.png)
72+
73+
You can then choose to run the query by selecting **Run query**.
74+
75+
![Screenshot of Copilot button showing Run query option.](/defender/media/advanced-hunting-security-copilot-run-query.png)
7276

7377
The generated query then appears as the last query in the query editor and runs automatically.
7478

@@ -79,11 +83,11 @@ Users with access to Security Copilot have access to this capability in advanced
7983
The generated query appears in the query editor as the last query, where you can edit it before running using the regular **Run query** above the query editor.
8084

8185

82-
1. You can provide feedback about the generated response by selecting the feedback icon ![Screenshot of feedback icon.](/defender/media/advanced-hunting-security-copilot-feedback-icon.png) and choosing **Confirm**, **Off-target**, or **Potentially harmful**.
86+
1. You can provide feedback about the generated response by selecting the feedback icon ![Screenshot of feedback icon.](/defender/media/advanced-hunting-security-copilot-feedback-icon.png) and choosing **Looks right**, **Needs improvement**, or **Inappropriate**.
8387

8488

8589
> [!TIP]
86-
> Providing feedback is an important way to let the Security Copilot team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could have made the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
90+
> Providing feedback is an important way to let the Security Copilot team know how well the query assistant was able to help in generating a useful KQL query. Feel free to articulate what could make the query better, what adjustments you had to make before running the generated KQL query, or share the KQL query that you eventually used.
8791
8892

8993
> [!NOTE]
@@ -97,6 +101,10 @@ Select the chat bubble icon (**New chat**) to discard the current session.
97101

98102
![Screenshot of Security Copilot in advanced hunting showing the new chat icon.](/defender/media/advanced-hunting-security-copilot-clear-session.png)
99103

104+
## Query explanations
105+
106+
107+
100108
## Modify settings
101109

102110
Select the ellipses in the Copilot side pane to choose whether or not to automatically add and run the generated query in advanced hunting.

0 commit comments

Comments
 (0)