Skip to content

Commit 6582054

Browse files
authored
Merge branch 'main' into poliveria-analyst-report-09042024
2 parents 9253539 + 1808c37 commit 6582054

8 files changed

+529
-449
lines changed

defender-endpoint/TOC.yml

Lines changed: 396 additions & 428 deletions
Large diffs are not rendered by default.

defender-endpoint/device-control-policies.md

Lines changed: 21 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Device control policies in Microsoft Defender for Endpoint
33
description: Learn about Device control policies in Defender for Endpoint
4-
author: siosulli
5-
ms.author: siosulli
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 09/13/2024
7+
ms.date: 09/18/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -73,7 +73,7 @@ Device control policies can be applied to users and/or user groups.
7373
> [!NOTE]
7474
> In the articles related to device control, groups of users are referred to as <i>user groups</i>. The term <i>groups</i> refer to [groups](#groups) defined in the device control policy.
7575
76-
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
76+
Using Intune, on either Mac and Windows, device control policies can be targeted to user groups defined in Entra Id.
7777

7878
On Windows, a user or user group can be a condition on an [entry](#entries) in a policy.
7979

@@ -198,15 +198,29 @@ Device control policies define access (called an entry) for a set of devices. En
198198
| Action | Allow <br/> Deny <br/> AuditAllow <br/> AuditDeny |
199199
| Notification | None (default) <br/> An event is generated <br/> The user receives notification <br/> |
200200

201-
If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
201+
### Entry evaluation
202+
203+
There are two types of entries: enforcement entries (Allow/Deny) and audit entries (AuditAllow/AuditDeny).
204+
205+
Enforcement entries for a rule are evaluated in order until all of the requested permissions have been matched. If no entries match a rule, then the next rule is evaluated. If no rules match, then the default is applied.
206+
207+
### Audit entries
208+
209+
Audit events control the behavior when device control enforces a rule (allow/deny). Device control can display a notification to the end-user. The user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied.
210+
211+
Device control can also create an event that is available in Advanced Hunting.
212+
213+
> [!IMPORTANT]
214+
> There is a limit of 300 events per device per day. Audit entries are processed after the enforcement decision has been made. All corresponding audit entries are evaluated.
215+
216+
### Conditions
202217

203218
An entry supports the following optional conditions:
204219

205220
- User/User Group Condition: Applies the action only to the user/user group identified by the SID
206221

207222
> [!NOTE]
208-
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored localy, use the Security Identifier (SID)
209-
223+
> For user groups and users that are stored in Microsoft Entra Id, use the object id in the condition. For user groups and users that are stored locally, use the Security Identifier (SID)
210224
> [!NOTE]
211225
> On Windows, The SID of the user who's signed in can be retrieved by running the PowerShell command `whoami /user`.
212226

defender-endpoint/hardware-acceleration-and-mdav.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,13 @@
11
---
22
title: Hardware acceleration and Microsoft Defender Antivirus.
33
description: How Microsoft Defender Antivirus incorporates hardware acceleration and Microsoft Defender Antivirus.
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: denisebmsft
5+
ms.author: deniseb
66
manager: deniseb
7+
ms.reviewer: yongrhee
78
ms.service: defender-endpoint
89
ms.topic: overview
9-
ms.date: 02/26/2024
10+
ms.date: 09/18/2024
1011
ms.subservice: ngp
1112
ms.localizationpriority: medium
1213
ms.custom: partner-contribution
@@ -19,10 +20,6 @@ audience: ITPro
1920

2021
**Applies to:**
2122

22-
- [Microsoft Defender XDR](/defender-xdr)
23-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
24-
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2623
- Microsoft Defender Antivirus
2724
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
2825

Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
---
2+
title: Use safe deployment practices to safeguard your environment
3+
description: Plan, implement, adopt, and manage safe deployment practices to safeguard and manage your environment
4+
keywords: mde safe deployment practices
5+
author: siosulli
6+
ms.author: siosulli
7+
manager: deniseb
8+
ms.date: 09/16/2024
9+
ms.topic: conceptual
10+
ms.service: defender-endpoint
11+
ms.subservice: ngp
12+
ms.localizationpriority: high
13+
ms.custom: get-started
14+
ms.collection:
15+
- tier1
16+
- highpri
17+
---
18+
19+
# Use safe deployment practices to safeguard and manage your environment
20+
21+
Microsoft follows safe deployment practices (SDP) to minimize the risk of security updates having an unexpected impact. This article describes Microsoft Defender for Endpoint’s approach to SDP and what customers can do to manage their own roll-out processes to add an extra layer of control.
22+
23+
Microsoft Defender for Endpoint ships updates externally only after all the certification and validation tests are completed across multiple iterations of internal devices.
24+
25+
Defender for Endpoint applies SDP to two distinct update mechanisms:
26+
27+
- Software and driver updates that are updated monthly (can potentially update kernel-mode components).
28+
- Security intelligence and detection logic updates that can be updated multiple times a day (updates only apply to user-mode components).
29+
30+
## Monthly SDP software and driver updates
31+
32+
Defender for Endpoint releases monthly software and driver updates that add new functionality, improve existing features, and resolve bugs.
33+
34+
Defender for Endpoint’s kernel drivers capture system-wide signals like process execution, file creation, and network activity. These drivers are updated through Windows Update, over a gradual and staged deployment process after spending weeks in stabilization and testing. The deployment evaluation monitors key metrics like reliability, performance, battery, application compatibility, and more across hardware and software configurations.
35+
36+
The process for rolling out software and driver updates for Defender for Endpoint is shown in this image:
37+
38+
:::image type="content" alt-text="process for rolling out software and driver updates for Defender for Endpoint" source="/defender/media/defender-endpoint/mde-software-driver-updates.png" lightbox="/defender/media/defender-endpoint/mde-software-driver-updates.png":::
39+
40+
### Microsoft SDP for monthly updates
41+
42+
All code and content changes go through engineering release gates along with extensive validations and stability testing. After the certification and validation process, Microsoft ships the updates through multiple groups of devices known as stabilization rings. The first stabilization ring targets Microsoft’s hundreds of thousands of employees and millions of internal devices. This helps ensure Microsoft discovers and addresses issues first, before customers.
43+
44+
Within each ring, Microsoft closely monitors quality signals such as product behavior and performance, false positives, as well as functional and reliability issues, before proceeding to roll out the update to a broader set of devices.
45+
46+
Once internal testing is successfully completed, Microsoft then releases the updates externally in a staggered manner to ensure stability. During this time, Microsoft continuously monitors the rollout to ensure a quick response and remote resolution of any issues by reverting or reissuing update packages.
47+
48+
### Customer SDP for monthly updates
49+
50+
In addition to Microsoft’s safe deployment practices, organizations can also manage monthly updates with their own safe deployment practices through various controls:
51+
52+
- [Create a custom gradual rollout process for Microsoft Defender updates](configure-updates.md) to control the delivery of agent updates to their devices. Customers can control the rings that are assigned to their device group and when each ring receives updates. For example, place lower-valued assets in earlier rings and higher-valued assets in later rings.
53+
- Apply patch management software and practices for security component updates that can also arrive in the form of monthly Latest Cumulative Updates (LCUs).
54+
- Use [rollback controls](microsoft-defender-antivirus-updates.md#how-to-roll-back-an-update) or automated rollback options to revert or reset components to a last known good state.
55+
56+
> [!NOTE]
57+
> Caution is advised when rolling back an update across a large group of devices.
58+
59+
## Daily SDP security intelligence and detection logic updates
60+
61+
Microsoft releases security intelligence updates that once installed on devices supplement the real-time local and cloud-based machine learning models, behavior analysis, and heuristics that enable Defender for Endpoint to neutralize the latest known cyberthreats.
62+
63+
Given the high frequency at which these updates need to be delivered to protect customers, it’s not possible to deploy them through the same deployment process. Therefore, Defender for Endpoint doesn't include kernel changes in intelligence updates. Instead, daily updates are only delivered to components that run in the user mode of the operating system. This approach helps mitigate the risk of these more frequent updates from impacting the broader operating system and, in the unlikely event of an error, limits the risk of significant negative effects like system crashes and ensures devices can be automatically recovered.
64+
65+
### Microsoft SDP for daily updates
66+
67+
Similar to the process for software and driver updates, Microsoft ships security intelligence updates after extensive testing and rolls them out starting with internal devices, early access customers, and then releases them externally in a controlled, gradual manner. Microsoft continually monitors telemetry and can mitigate issues through the cloud in minutes.
68+
69+
### Customer SDP for daily updates
70+
71+
Customers can also manage security intelligence updates with their own safe deployment policies through various measures:
72+
73+
- Stage updates through [corporate networks](microsoft-defender-antivirus-ring-deployment-group-policy-network-share.md#setting-up-the-pilot-environment) or software management solutions.
74+
- Apply updates at a lower frequency for critical systems. Daily releases can be applied at a lower frequency for certain device groups, including servers critical to running your infrastructure.
75+
- Use [rollback controls](microsoft-defender-antivirus-updates.md#how-to-roll-back-an-update) to revert or reset components to a last known good state.
76+
77+
## Related articles
78+
79+
- [microsoft-defender-antivirus-ring-deployment](microsoft-defender-antivirus-ring-deployment.md)
80+
- [manage-protection-updates-microsoft-defender-antivirus](manage-protection-updates-microsoft-defender-antivirus.md)
81+
- [microsoft-defender-antivirus-updates](microsoft-defender-antivirus-updates.md)
82+
- [mac-updates](mac-updates.md)
83+
- [linux-support-offline-security-intelligence-update](linux-support-offline-security-intelligence-update.md)

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,22 @@ All our updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### August-2024 (Platform: 4.18.24080.9 | Engine: 1.1.24080.9)
102+
103+
- Security intelligence update version: **1.419.1.0**
104+
- Release date: **September 17, 2024** (Engine and Platform)
105+
- Platform: **4.18.24080.9**
106+
- Engine: **1.1.24080.9**
107+
- Support phase: **Security and Critical Updates**
108+
109+
### What's new
110+
111+
- Added a new parameter to get-mppreference cmdlet (ControlledFolderAccessDefaultProtectedFolders) to show default protected folders for Controlled Folder Access (CFA).
112+
- Fixed an issue with Device Control regarding printer security checks.
113+
- Resolved an issue with platform rollback after an upgrade from Windows 10 to 11.
114+
- Fixed an issue where volume exclusions weren't properly enforced in real-time protection after the completion of OOBE.
115+
- Removed support for Windows RT devices, for example, Surface RT, that use 32-bit ARM processors and have reached their end-of-servicing date.
116+
101117
### July-2024 (Platform: 4.18.24070.5 | Engine: 1.1.24070.3)
102118

103119
- Security intelligence update version: **1.417.14.0**

defender-endpoint/microsoft-defender-offline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Offline scan in Windows
33
description: You can use Microsoft Defender Offline Scan straight from the Microsoft Defender Antivirus app. You can also manage how it's deployed in your network.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 04/30/2024
6+
ms.date: 09/18/2024
77
author: YongRhee-MSFT
88
ms.author: yongrhee
99
manager: deniseb
@@ -34,7 +34,7 @@ search.appverid: met150
3434
|**Protection type** | Hardware|
3535
|**Firmware/ Rootkit**| Operating system <br/> Driver <br/> Memory (Heap) <br/> Application <br/> Identity <br/> Cloud|
3636

37-
> [NOTE]
37+
> [!NOTE]
3838
> The protection for this feature focuses on the Firmware/Rootkit.
3939
4040
Microsoft Defender Offline is an anti-malware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR).
@@ -50,7 +50,7 @@ The following are the hardware requirements for Microsoft Defender Offline Scan
5050
- x64/x86 Windows 8.1
5151
- x64/x86 Windows 7 Service Pack 1
5252

53-
>[!CAUTION]
53+
> [!CAUTION]
5454
> Microsoft Defender Offline Scan does not apply to:
5555
>
5656
> - ARM Windows 11

defender-endpoint/supported-capabilities-by-platform.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Supported Microsoft Defender for Endpoint capabilities by platform
33
description: Get to know the Microsoft Defender for Endpoint capabilities supported for Windows 10 devices, servers, and non-Windows devices.
44
ms.service: defender-endpoint
5-
ms.author: siosulli
6-
author: siosulli
5+
ms.author: deniseb
6+
author: denisebmsft
77
ms.localizationpriority: medium
88
manager: deniseb
99
audience: ITPro
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 07/17/2024
16+
ms.date: 09/18/2024
1717
---
1818

1919
# Supported Microsoft Defender for Endpoint capabilities by platform
@@ -58,7 +58,7 @@ The following table gives information about the supported Microsoft Defender for
5858
|[Device response capabilities: collect investigation package ](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> | ![Yes.](media/svg/check-yes.svg) <sup>[3]</sup> |
5959
|[Device response capabilities: run antivirus scan](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
6060
|[Device isolation](respond-machine-alerts.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
61-
|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![No](media/svg/check-no.svg) | ![No](media/svg/check-no.svg) |
61+
|File response capabilities: collect file, deep analysis, block file, stop, and quarantine processes | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) <sup>[6]</sup> | ![Yes.](media/svg/check-yes.svg) <sup>[6]</sup> |
6262
|[Live Response](live-response.md) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) | ![Yes.](media/svg/check-yes.svg) |
6363

6464
<sup>[1]</sup> Refers to the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
@@ -71,6 +71,8 @@ The following table gives information about the supported Microsoft Defender for
7171

7272
<sup>[5]</sup> Endpoint & network device discovery is supported on Windows Server 2019 or later, Windows 10, and Windows 11
7373

74+
<sup>[6]</sup> Collect file feature is currently in preview ([Microsoft Defender for Endpoint preview features](/defender-xdr/preview)). Currently does not support "Deep analysis" or "Block file, stop, and quarantine process".
75+
7476
> [!NOTE]
7577
> Windows 7, 8.1, Windows Server 2008 R2 include support for the EDR sensor, and antivirus using System Center Endpoint Protection (SCEP).
7678
220 KB
Loading

0 commit comments

Comments
 (0)