Skip to content

Commit 69a5535

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/defender-docs-pr into US319372_attack
2 parents a4ba071 + 7841aea commit 69a5535

File tree

48 files changed

+470
-295
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+470
-295
lines changed

.openpublishing.publish.config.json

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,18 @@
112112
},
113113
"build_entry_point": "docs",
114114
"template_folder": "_themes"
115+
},
116+
{
117+
"docset_name": "unified-secops-platform",
118+
"build_source_folder": "unified-secops-platform",
119+
"build_output_subfolder": "unified-secops-platform",
120+
"locale": "en-us",
121+
"monikers": [],
122+
"open_to_public_contributors": false,
123+
"type_mapping": {
124+
"Conceptual": "Content"
125+
},
126+
"build_entry_point": "docs"
115127
}
116128
],
117129
"notification_subscribers": [],

defender-endpoint/defender-endpoint-demonstration-controlled-folder-access.md

Lines changed: 50 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: asr
17-
ms.date: 02/16/2024
17+
ms.date: 10/11/2024
1818
---
1919

2020
# Controlled folder access (CFA) demonstrations (block ransomware)
@@ -44,10 +44,10 @@ Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
4444
## Rule states
4545

4646
|State | Mode| Numeric value |
47-
|:---|:---|:---|
48-
| Disabled | = Off | 0 |
49-
| Enabled | = Block mode | 1 |
50-
| Audit | = Audit mode | 2 |
47+
|---|---|---|
48+
| Disabled | Off | 0 |
49+
| Enabled | Block mode | 1 |
50+
| Audit | Audit mode | 2 |
5151

5252
## Verify configuration
5353

@@ -63,65 +63,86 @@ Get-MpPreference
6363

6464
### Setup
6565

66-
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
66+
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script, set execution policy to `Unrestricted` by using this PowerShell command:
6767

6868
```powershell
6969
Set-ExecutionPolicy Unrestricted
7070
```
7171

72-
You can perform these manual steps instead:
72+
Or, you can perform these manual steps instead:
7373

74-
1. Create a folder under c: named demo, "c:\demo".
74+
1. Create a folder under `c:` named `demo`, as in `c:\demo`.
7575

76-
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo (we need something to encrypt).
76+
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into `c:\demo` (we need something to encrypt).
7777

78-
3. Execute PowerShell commands listed earlier in this article.
78+
3. Run the PowerShell commands listed earlier in this article.
79+
80+
Next, check that status of the *Aggressive Ransomware Prevention* ASR rule and disable it for the duration of this test if it's enabled:
7981

80-
### Scenario 1: CFA blocks ransomware test file
8182

82-
1. Turn on CFA using PowerShell command:
83-
8483
```powershell
85-
Set-MpPreference -EnableControlledFolderAccess Enabled
84+
$idx = $(Get-MpPreference).AttackSurfaceReductionRules_Ids.IndexOf("C1DB55AB-C21A-4637-BB3F-A12568109D35")
85+
if ($idx -ge 0) {Write-Host "Rule Status: " $(Get-MpPreference).AttackSurfaceReductionRules_Actions[$idx]} else {Write-Host "Rule does not exist on this machine"}
8686
```
8787

88-
2. Add the demo folder to protected folders list using PowerShell command:
88+
If the rule exists and the status is `1 (Enabled)` or `6 (Warn)`, it must be disabled to run this test:
8989

9090
```powershell
91-
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
91+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Disabled
9292
```
9393

94-
3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
95-
4. Execute the ransomware test file *this isn't ransomware, it simple tries to encrypt c:\demo
94+
### Scenario 1: CFA blocks ransomware test file
95+
96+
1. Turn on CFA using PowerShell command:
97+
98+
```powershell
99+
Set-MpPreference -EnableControlledFolderAccess Enabled
100+
```
101+
102+
2. Add the demo folder to protected folders list using PowerShell command:
103+
104+
```powershell
105+
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
106+
```
107+
108+
3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).
109+
110+
4. Execute the ransomware test file. Note that it isn't ransomware; it simply tries to encrypt `c:\demo`.
96111

97112
#### Scenario 1 expected results
98113

99-
5 seconds after executing the ransomware test file you should see a notification CFA blocked the encryption attempt.
114+
About five seconds after executing the ransomware test file, you should see a notification that CFA blocked the encryption attempt.
100115

101116
### Scenario 2: What would happen without CFA
102117

103118
1. Turn off CFA using this PowerShell command:
104119

105-
```powershell
106-
Set-MpPreference -EnableControlledFolderAccess Disabled
107-
```
120+
```powershell
121+
Set-MpPreference -EnableControlledFolderAccess Disabled
122+
```
108123

109-
2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
124+
2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).
110125

111126
#### Scenario 2 expected results
112127

113-
- The files in c:\demo are encrypted and you should get a warning message
128+
- The files in `c:\demo` are encrypted and you should get a warning message
114129
- Execute the ransomware test file again to decrypt the files
115130

116131
## Clean-up
117132

118-
Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
133+
1. Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
119134

120-
```powershell
121-
Set-MpPreference -EnableControlledFolderAccess Disabled
122-
```
135+
```powershell
136+
Set-MpPreference -EnableControlledFolderAccess Disabled
137+
```
138+
139+
2. Clean up `c:\demo` encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
140+
141+
3. If the *Aggressive Ransomware Prevention* ASR rule was enabled and you disabled it at the beginning of this test, enable it again:
123142

124-
Clean up c:\demo encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
143+
```powershell
144+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Enabled
145+
```
125146

126147
## See also
127148

defender-endpoint/device-control-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Device control policies in Defender for Endpoint
44
author: denisebmsft
55
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 09/18/2024
7+
ms.date: 10/11/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -136,7 +136,7 @@ The following code snippet shows the syntax for a device control policy rule in
136136
</IncludedIdList>
137137
<ExcludedIdList>
138138
<GroupId>{3f5253e4-0e73-4587-bb9e-bb29a2171695}</GroupId>
139-
<ExcludedIdList>
139+
</ExcludedIdList>
140140
<Entry Id="{e3837e60-5e56-43ce-8095-043ccd793eac}">
141141
...
142142
</Entry>

defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,15 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/01/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Defender for Endpoint on Linux with Chef
2222

2323
**Applies to:**
2424

25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
25+
- Microsoft Defender for Servers
26+
- Microsoft Defender XDR
2727

2828
[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]
2929

defender-endpoint/linux-exclusions.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/31/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -24,9 +24,8 @@ ms.date: 07/31/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231
@@ -141,7 +140,7 @@ For more information, see [Set preferences for Defender for Endpoint on Linux](l
141140
Run the following command to see the available switches for managing exclusions:
142141

143142
> [!NOTE]
144-
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isnt mentioned, the scope value is set as `epp`.
143+
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn't mentioned, the scope value is set as `epp`.
145144
> Exclusions added through CLI before the introduction of `--scope` flag remain unaffected and their scope is considered `epp`.
146145
147146
```bash

defender-endpoint/linux-install-manually.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 08/01/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -24,9 +24,8 @@ ms.date: 08/01/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231

defender-endpoint/linux-install-with-ansible.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 09/19/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Ansible
@@ -24,9 +24,8 @@ ms.date: 09/19/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231

defender-endpoint/linux-install-with-puppet.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/15/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Puppet
@@ -25,9 +25,8 @@ ms.date: 07/15/2024
2525

2626
**Applies to:**
2727

28-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
28+
- Microsoft Defender for Servers
29+
- Microsoft Defender XDR
3130

3231
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3332

defender-endpoint/linux-install-with-saltack.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/15/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
@@ -24,9 +24,8 @@ ms.date: 07/15/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231

defender-endpoint/linux-preferences.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 08/28/2024
9+
ms.date: 10/11/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -25,9 +25,8 @@ search.appverid: met150
2525

2626
**Applies to:**
2727

28-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
28+
- Microsoft Defender for Servers
29+
- Microsoft Defender XDR
3130

3231
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3332
@@ -63,6 +62,7 @@ Specifies the enforcement preference of antivirus engine. There are three values
6362
- Real-time (`real_time`): Real-time protection (scan files as they're modified) is enabled.
6463
- On-demand (`on_demand`): Files are scanned only on demand. In this:
6564
- Real-time protection is turned off.
65+
- Definition updates occur only when a scan starts, even if `automaticDefinitionUpdateEnabled` is set to `true` in on-demand mode.
6666
- Passive (`passive`): Runs the antivirus engine in passive mode. In this case, all of the following apply:
6767
- Real-time protection is turned off: Threats are not remediated by Microsoft Defender Antivirus.
6868
- On-demand scanning is turned on: Still use the scan capabilities on the endpoint.
@@ -222,7 +222,7 @@ Specifies the behavior of RTP on mount point marked as noexec. There are two val
222222
- Muted (`mute`): Mount points marked as noexec aren't scanned as part of RTP, these mount point can be created for:
223223
- Database files on Database servers for keeping data base files.
224224
- File server can keep data files mountpoints with noexec option.
225-
- Back up can keep data files mountpoints with noexec option.
225+
- Backup can keep data files mountpoints with noexec option.
226226

227227
|Description|JSON Value|Defender Portal Value|
228228
|---|---|---|
@@ -627,6 +627,7 @@ Determines whether security intelligence updates are installed automatically:
627627
|**Data type**|Boolean|Drop down|
628628
|**Possible values**|`true` (default) <p>`false`|Not configured<br>Disabled<br>Enabled (Default)|
629629

630+
Depending on the enforcement level, the automatic security intelligence updates are installed differently. In RTP mode, updates are installed periodically. In Passive/ On-Demand mode updates are installed before every scan.
630631

631632
### Advanced optional features
632633

0 commit comments

Comments
 (0)