Skip to content

Commit 5e5d426

Browse files
committed
Update defender-endpoint-demonstration-amsi.md
1 parent 47e21ef commit 5e5d426

File tree

1 file changed

+20
-24
lines changed

1 file changed

+20
-24
lines changed

defender-endpoint/defender-endpoint-demonstration-amsi.md

Lines changed: 20 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
ms.reviewer: yongrhee
77
ms.service: defender-endpoint
88
ms.topic: how-to
9-
ms.date: 09/27/2024
9+
ms.date: 09/30/2024
1010
ms.subservice: ngp
1111
---
1212

@@ -178,47 +178,43 @@ Affected items:
178178

179179
##### Via the Event log
180180

181-
181+
1. Go to **Start**, and search for `EventVwr.msc`. Open Event Viewer in the list of results.
182182

183-
183+
2. Go to **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender operational events**.
184184

185-
Start, EventVwr.msc
185+
3. Look for `event ID 1116`. You should see the following information:
186186

187-
Applications and Services Logs -> Microsoft -> Windows -> Windows Defender operational events
188-
189-
Filter by event ID 1116
190-
191-
You should be able to see:
187+
```console
192188

193-
Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
189+
Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
194190

195-
For more information please see the following:
191+
For more information please see the following: https://go.microsoft.com/fwlink/?linkid=37020&name=Virus:Win32/MpTest!amsi&threatid=2147694217&enterprise=0
196192

197-
https://go.microsoft.com/fwlink/?linkid=37020&name=Virus:Win32/MpTest!amsi&threatid=2147694217&enterprise=0
193+
Name: Virus:Win32/MpTest!amsi
198194

199-
Name: Virus:Win32/MpTest!amsi
195+
ID: 2147694217
200196

201-
ID: 2147694217
197+
Severity: Severe
202198

203-
Severity: Severe
199+
Category: Virus
204200

205-
Category: Virus
201+
Path: _\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or _C:\Users\Admin\Desktop\AMSI_jscript.js; file: _C:\Users\Admin\Desktop\AMSI_jscript.js->[Eval] or _C:\Users\Admin\Desktop\AMSI_vbscript.vbs
206202

207-
Path: _\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or _C:\Users\Admin\Desktop\AMSI_jscript.js; file:_C:\Users\Admin\Desktop\AMSI_jscript.js->[Eval] or _C:\Users\Admin\Desktop\AMSI_vbscript.vbs
203+
Detection Origin: Local machine or Unknown
208204

209-
Detection Origin: Local machine or Unknown
205+
Detection Type: Concrete
210206

211-
Detection Type: Concrete
207+
Detection Source: System
212208

213-
Detection Source: System
209+
User: NT AUTHORITY\SYSTEM
214210

215-
User: NT AUTHORITY\SYSTEM
211+
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or C:\Windows\System32\cscript.exe or C:\Windows\System32\wscript.exe or Unknown
216212

217-
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeor C:\Windows\System32\cscript.exe or C:\Windows\System32\wscript.exe or Unknown
213+
Security intelligence Version: AV: 1.419.221.0, AS: 1.419.221.0, NIS: 1.419.221.0
218214

219-
Security intelligence Version: AV: 1.419.221.0, AS: 1.419.221.0, NIS: 1.419.221.0
215+
Engine Version: AM: 1.1.24080.9, NIS: 1.1.24080.9
220216

221-
Engine Version: AM: 1.1.24080.9, NIS: 1.1.24080.9
217+
```
222218

223219
##### Via Powershell
224220

0 commit comments

Comments
 (0)