Skip to content

Commit 699e1d2

Browse files
authored
Merge pull request #1805 from MicrosoftDocs/main
publish main to live, 11/4/24, 3:30 pm
2 parents b2951ae + a510ad0 commit 699e1d2

File tree

8 files changed

+60
-55
lines changed

8 files changed

+60
-55
lines changed

CloudAppSecurityDocs/ops-guide/ops-guide-daily.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This article lists daily operational activities that we recommend you perform wi
1313

1414
Alerts and incidents are two of the most important items your security operations (SOC) team should be reviewing on a daily basis.
1515

16-
- Triage incidents and alerts regularly from the [incidents queue](https://security.microsoft.com/incidents-queue) in Microsoft Defender XDR, prioritizing high and medium severity alerts.
16+
- Triage incidents and alerts regularly from the [incidents queue](https://security.microsoft.com/incidents) in Microsoft Defender XDR, prioritizing high and medium severity alerts.
1717

1818
- If you're working with a SIEM system, your SIEM system is usually the first stop for triage. SIEM systems provide more context with extra logs and SOAR functionality. Then, use Microsoft Defender XDR for a deeper understanding of an alert or incident timeline.
1919

defender-endpoint/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
- name: Trial user guide - Microsoft Defender for Endpoint
1212
href: defender-endpoint-trial-user-guide.md
1313
- name: Pilot and deploy Defender for Endpoint
14-
href: /defender-xdr/pilot-deploy-defender-endpoint?toc=/defender-xdr/TOC.json&bc=/defender-xdr/breadcrumb/toc.json
14+
href: /defender-xdr/pilot-deploy-defender-endpoint?toc=/defender-endpoint/TOC.json&bc=/defender-endpoint/breadcrumb/toc.json
1515
- name: Minimum requirements
1616
href: minimum-requirements.md
1717
- name: Supported Microsoft Defender for Endpoint capabilities by platform

defender-endpoint/breadcrumb/toc.yml

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,10 +5,9 @@
55
- name: 'Microsoft Defender for Endpoint'
66
tocHref: /defender-endpoint/
77
topicHref: /defender-endpoint/index
8-
items:
9-
- name: 'Microsoft Defender XDR'
10-
tocHref: /defender-xdr/
11-
topicHref: /defender-xdr/pilot-deploy-defender-office-365
128
- name: 'Microsoft Defender for Endpoint'
139
tocHref: /mem/intune/protect/
1410
topicHref: /mem/intune/protect/
11+
- name: 'Microsoft Defender for Endpoint'
12+
tocHref: /defender-xdr/
13+
topicHref: /defender-xdr/pilot-deploy-defender-endpoint

defender-endpoint/health-status.md

Lines changed: 44 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 05/06/2021
16+
ms.date: 11/04/2024
1717
---
1818

1919
# Investigate agent health issues
@@ -24,53 +24,59 @@ ms.date: 05/06/2021
2424
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2525
- [Microsoft Defender XDR](/defender-xdr)
2626

27-
The following table provides information on the values returned when you run the `mdatp health` command and their corresponding descriptions.
27+
The following table provides information about the values that are returned when you run the `mdatp health` command and their corresponding descriptions.
2828

29-
|Value|Description|
29+
| Value | Description |
3030
|---|---|
31-
|automatic_definition_update_enabled|True if automatic antivirus definition updates are enabled, false otherwise.|
32-
|cloud_automatic_sample_submission_consent|Current sample submission level. Can be one of the following values: <ul><li>**None**: No suspicious samples are submitted to Microsoft.</li><li>**Safe**: Only suspicious samples that don't contain personally identifiable information (PII) are submitted automatically. This is the default value for this setting.</li><li>**All**: All suspicious samples are submitted to Microsoft.</li></ul>|
33-
|cloud_diagnostic_enabled|True if optional diagnostic data collection is enabled, false otherwise. For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576).|
34-
|cloud_enabled|True if cloud-delivered protection is enabled, false otherwise.|
35-
|conflicting_applications|List of applications that are possibly conflicting with Microsoft Defender for Endpoint. This list includes, but isn't limited to, other security products and other applications known to cause compatibility issues.|
36-
|definitions_status|Status of antivirus definitions.|
37-
|definitions_updated|Date and time of last antivirus definition update.|
38-
|definitions_updated_minutes_ago|Number of minutes since last antivirus definition update.|
39-
|definitions_version|Antivirus definition version.|
40-
|edr_client_version|Version of the EDR client running on the device.|
41-
|edr_configuration_version|EDR configuration version.|
42-
|edr_device_tags|List of tags associated with the device.|
43-
|edr_group_ids|Group ID that the device is associated with.|
44-
|edr_machine_id|Device identifier used in Microsoft Defender XDR.|
45-
|engine_version|Version of the antivirus engine.|
46-
|healthy|True if the product is healthy, false otherwise.|
47-
|licensed|True if the device is onboarded to a tenant, false otherwise.|
48-
|log_level|Current log level for the product.|
49-
|machine_guid|Unique machine identifier used by the antivirus component.|
50-
|network_protection_status|Status of the network protection component (macOS only). Can be one of the following values: <ul><li>**starting** - Network protection is starting</li><li>**failed_to_start** - Network protection couldn't be started due to an error</li><li>**started** - Network protection is currently running on the device</li><li>**restarting** - Network protection is currently restarting</li><li>**stopping** - Network protection is stopping</li><li>**stopped** - Network protection isn't running</li></ul>|
51-
|org_id|Organization that the device is onboarded to. If the device isn't yet onboarded to any organization, this prints unavailable. For more information on onboarding, see [Onboard to Microsoft Defender for Endpoint](onboarding.md).|
52-
|passive_mode_enabled|True if the antivirus component is set to run in passive mode, false otherwise.|
53-
|product_expiration|Date and time when the current product version reaches end of support.|
54-
|real_time_protection_available|True if the real-time protection component is healthy, false otherwise.|
55-
|real_time_protection_enabled|True if real-time antivirus protection is enabled, false otherwise.|
56-
|real_time_protection_subsystem|Subsystem used to serve real-time protection. If real-time protection isn't operating as expected, this prints unavailable.|
57-
|release_ring|Release ring. For more information, see [Deployment rings](onboarding.md).|
31+
| `app_version` | Displays Microsoft Defender application version.|
32+
|`automatic_definition_update_enabled`|`True` if automatic antivirus definition updates are enabled; otherwise, `false`.|
33+
|`behavior_monitoring`|Feature to detect real time threats and prevention by monitoring the behavior of applications, services, and files.<br/><br/>Can have one of the following values: <br/>- **disabled** - default <br/>- **enabled** |
34+
|`cloud_automatic_sample_submission_consent`|Current sample submission level. <br/><br/>Can have one of the following values: <br/>- **None**: No suspicious samples are submitted to Microsoft.<br/>- **safe**: Only suspicious samples that don't contain personal data are submitted automatically. This value is the default value for this setting.<br/>- **All**: All suspicious samples are submitted to Microsoft.|
35+
|`cloud_diagnostic_enabled`|`True` if optional diagnostic data collection is enabled; otherwise, `false`. <br/><br/>For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576).|
36+
|`cloud_enabled`|`True` if cloud-delivered protection is enabled; otherwise, `false`.|
37+
|`conflicting_applications`|List of applications that are possibly conflicting with Microsoft Defender for Endpoint. This list includes, but isn't limited to, other security products and other applications known to cause compatibility issues.|
38+
|`definitions_status`|Status of antivirus definitions. Can have one of the following values: <br/>- **up_to_date**<br/>- **updating**<br/>- **unavailable**|
39+
|`definitions_updated`|Date and time of last antivirus definition update.|
40+
|`definitions_updated_minutes_ago`|Number of minutes since last antivirus definition update.|
41+
|`definitions_version`|Antivirus definition version.|
42+
|`edr_client_version`|Version of the EDR client running on the device.|
43+
|`edr_configuration_version`|EDR configuration version.|
44+
|`edr_device_tags`|List of tags associated with the device.|
45+
|`edr_early_preview_enabled`|Setting of edr early preview. Can have one of the following values: <br/>- **disabled** <br/>- **enabled**|
46+
|`edr_group_ids`|Group ID that the device is associated with.|
47+
|`edr_machine_id`|Device identifier used in the Microsoft Defender portal.|
48+
|`engine_load_status`|Status of antivirus engine to determine whether it's running. <br/><br/>Can have one of the following values: <br/>- **Engine not loaded** - antivirus engine process is down<br/>- **Engine load succeeded** - antivirus engine process is up and running|
49+
|`engine_version`|Version of the antivirus engine.|
50+
|`healthy`|`True` if the product is healthy; otherwise, `false`.|
51+
|`health_issues`|Lists health issues if any.|
52+
|`licensed`|`True` if the device is onboarded to a tenant; otherwise, `false`.|
53+
|`log_level`|Current log level for the product. <br/><br/>Can have one of the following values: <br/>- **info** <br/>- **debug**|
54+
|`machine_guid`|Unique machine identifier used by the antivirus component.|
55+
|`network_protection_enforcement_level`|Mode of network protection. <br/><br/>Can have one of the following: <br/>- **disabled** - all components associated with network protection are disabled<br/>- **block** - network protection prevents connection to malicious websites<br/>- **audit** - Check how blocks occur|
56+
|`network_protection_status`|Status of the network protection component (macOS only).<br/><br/> Can have one of the following values: <br/>- **starting** - Network protection is starting<br/>- **failed_to_start** - Network protection couldn't be started due to an error<br/>- **started** - Network protection is running on the device<br/>- **restarting** - Network protection is restarting<br/>- **stopping** - Network protection is stopping<br/>- **stopped** - Network protection isn't running|
57+
|`org_id`|Organization that the device is onboarded to. If the device isn't yet onboarded to any organization, it shows as `unavailable`. For more information on onboarding, see [Onboard to Microsoft Defender for Endpoint](onboarding.md).|
58+
|`passive_mode_enabled`|`True` if the antivirus component is set to run in passive mode; otherwise, `false`.|
59+
|`product_expiration`|Date and time when the current product version reaches end of support.|
60+
|`real_time_protection_available`|`True` if the real-time protection component is healthy; otherwise, `false`.|
61+
|`real_time_protection_enabled`|`True` if real-time antivirus protection is enabled; otherwise, `false`.|
62+
|`real_time_protection_subsystem`|Subsystem used to serve real-time protection. If real-time protection isn't operating as expected, it shows as `unavailable`.|
63+
|`release_ring`|Release ring. For more information, see [Deployment rings](onboarding.md).|
64+
|`supplementary_events_subsystem`|Subsystem that provides supplementary event data. Can have one of the following values: <br/>- **ebpf** - Default from app version: `101.2408.0000`<br/>- **auditd**|
5865

5966
## Component specific health
6067

6168
You can get more detailed health information for different Defender's features with `mdatp health --details <feature>`. For example:
6269

6370
```bash
71+
6472
mdatp health --details edr
6573

66-
edr_early_preview_enabled : "disabled"
67-
edr_device_tags : []
68-
edr_group_ids : ""
69-
edr_configuration_version : "20.199999.main.2022.10.25.03-514032a834557bdd31ac415be6df278d9c2a4c25"
70-
edr_machine_id : "a47ba049f43319ac669b6291ce73275cd445c9cd"
71-
edr_sense_guid : "298a1a8c-04dd-4929-8efd-3bb14cb54b94"
72-
edr_preferred_geo : "unitedstates"
74+
mdatp health --details definitions
75+
76+
mdatp health --details help
77+
7378
```
7479

75-
You can run `mdatp health --help` on recent versions to list all supported `feature`s.
80+
You can run `mdatp health --help` on recent versions to list all supported features.
81+
7682
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/troubleshoot-onboarding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: troubleshooting
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 09/18/2024
16+
ms.date: 11/04/2024
1717
---
1818

1919
# Troubleshoot Microsoft Defender for Endpoint onboarding issues
@@ -85,7 +85,7 @@ If the script fails and the event is an error, you can check the event ID in the
8585
|`10`|Onboarding data couldn't be written to registry|Check the permissions on the registry, specifically <p> `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`. <p> Verify that the script has been run as an administrator.|
8686
|`15`|Failed to start SENSE service|Check the service health (`sc query sense` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights). <p> If the device is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the device. If rebooting the device doesn't address the issue, upgrade to KB4015217 and try onboarding again.|
8787
|`15`|Failed to start SENSE service|If the message of the error is: System error 577 or error 1058 has occurred, you need to enable the Microsoft Defender Antivirus ELAM driver, see [Ensure that Microsoft Defender Antivirus is not disabled by a policy](#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy) for instructions.|
88-
|`15`|Failed to start SENSE service|The SENSE Feature on Demand (FoD) may not be installed. To determine whether it is installed, enter the following command from an Admin CMD/PowerShell prompt: `DISM.EXE /Online /Get-CapabilityInfo /CapabilityName:Microsoft.Windows.Sense.Client~~~` If it returns an error or the state is not "Installed," then the SENSE FoD must be installed. See [Available Features on Demand: SENSE Client for Microsoft Defender for Endpoint](/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod?view=windows-11&preserve-view=true) for installation instructions.|
88+
|`15`|Failed to start SENSE service|The SENSE Feature on Demand (FoD) may not be installed. To determine whether it is installed, enter the following command from an Admin CMD/PowerShell prompt: `DISM.EXE /Online /Get-CapabilityInfo /CapabilityName:Microsoft.Windows.Sense.Client~~~~` If it returns an error or the state is not "Installed," then the SENSE FoD must be installed. See [Available Features on Demand: SENSE Client for Microsoft Defender for Endpoint](/windows-hardware/manufacture/desktop/features-on-demand-non-language-fod?view=windows-11&preserve-view=true) for installation instructions.|
8989
|`30`|The script failed to wait for the service to start running|The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|
9090
|`35`|The script failed to find needed onboarding status registry value|When the SENSE service starts for the first time, it writes onboarding status to the registry location <p> `HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status`. <p> The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|
9191
|`40`|SENSE service onboarding status isn't set to **1**|The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md).|

defender-office-365/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@
3838
- name: Deploy
3939
items:
4040
- name: Pilot and deploy Defender for Office 365
41-
href: /defender-xdr/pilot-deploy-defender-office-365?toc=/defender-xdr/TOC.json&bc=/defender-xdr/breadcrumb/toc.json
41+
href: /defender-xdr/pilot-deploy-defender-office-365?toc=/defender-office-365/TOC.json&bc=/defender-office-365/breadcrumb/toc.json
4242
- name: Get started with Microsoft Defender for Office 365
4343
href: mdo-deployment-guide.md
4444
- name: Step 1 - Configure email authentication

defender-office-365/breadcrumb/toc.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
- name: 'Microsoft Defender for Office 365'
66
tocHref: /defender-office-365/
77
topicHref: /defender-office-365/index
8-
items:
9-
- name: 'Microsoft Defender XDR'
10-
tocHref: /defender-xdr/
11-
topicHref: /defender-xdr/pilot-deploy-defender-endpoint
8+
- name: 'Microsoft Defender for Office 365'
9+
tocHref: /defender-xdr/
10+
topicHref: /defender-xdr/pilot-deploy-defender-endpoint
11+

0 commit comments

Comments
 (0)