Skip to content

Commit 6a2c559

Browse files
committed
Merge branch 'docs-editor/mac-jamfpro-policies-1727708938' of https://github.com/YongRhee-MSFT/defender-docs-pr into pr/1491
2 parents 5fe21b5 + 5f0b989 commit 6a2c559

File tree

5 files changed

+250
-7
lines changed

5 files changed

+250
-7
lines changed

defender-endpoint/TOC.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,6 +79,9 @@
7979
href: demonstration-behavior-monitoring.md
8080
- name: Validate antimalware
8181
href: validate-antimalware.md
82+
- name: AMSI demonstrations
83+
href: defender-endpoint-demonstration-amsi.md
84+
displayName: Antimalware Scan Interface (AMSI), AMSI
8285
- name: Attack surface reduction rules demonstrations
8386
href: defender-endpoint-demonstration-attack-surface-reduction-rules.md
8487
- name: Cloud-delivered protection demonstration
Lines changed: 239 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,239 @@
1+
---
2+
title: AMSI demonstrations with Microsoft Defender for Endpoint
3+
description: Demonstration of AMSI detection by Microsoft Defender for Endpoint
4+
author: denisebmsft
5+
ms.author: deniseb
6+
ms.reviewer: yongrhee
7+
ms.service: defender-endpoint
8+
ms.topic: how-to
9+
ms.date: 09/30/2024
10+
ms.subservice: ngp
11+
---
12+
13+
# AMSI demonstrations with Microsoft Defender for Endpoint
14+
15+
**Applies to:**
16+
17+
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
18+
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
19+
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
20+
21+
- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)
22+
23+
Microsoft Defender for Endpoint utilizes the [Antimalware Scan Interface (AMSI)](/defender-endpoint/amsi-on-mdav) to enhance protection against fileless malware, dynamic script-based attacks, and other nontraditional cyber threats. In this article, we describe how to test the AMSI engine with a benign sample.
24+
25+
## Scenario requirements and setup
26+
27+
- Windows 10 or newer
28+
29+
- Windows Server 2016, or newer
30+
31+
- Microsoft Defender Antivirus (as primary) and these need to be enabled:
32+
33+
- Real-Time Protection (RTP)
34+
35+
- Behavior Monitoring (BM)
36+
37+
- Turn on script scanning
38+
39+
40+
## Testing AMSI
41+
42+
In this demonstration page, you have three engine choices to test AMSI:
43+
44+
- PowerShell
45+
- VBScript
46+
47+
### Testing AMSI with PowerShell
48+
49+
50+
```powershell
51+
# Save this sample AMSI powershell script as AMSI_PoSh_script.ps1
52+
$testString = "AMSI Test Sample: " + "7e72c3ce-861b-4339-8740-0ac1484c1386"
53+
Invoke-Expression $testString
54+
```
55+
56+
1. As an administrator, open PowerShell.
57+
58+
2. Type `Powershell -ExecutionPolicy Bypass AMSI_PoSh_script.ps1`, and then press **Enter**.
59+
60+
The result should be as follows:
61+
62+
```powershell
63+
Invoke-Expression : At line:1 char:1
64+
65+
+ AMSI Test Sample: 7e72c3ce-861b-4339-8740-0ac1484c1386
66+
67+
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
68+
69+
This script contains malicious content and has been blocked by your antivirus software.
70+
71+
At C:\Users\Admin\Desktop\AMSI_PoSh_script.ps1:3 char:1
72+
73+
+ Invoke-Expression $testString
74+
75+
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
76+
77+
+ CategoryInfo : ParserError: (:) [Invoke-Expression], ParseException
78+
79+
+ FullyQualifiedErrorId : ScriptContainedMaliciousContent,Microsoft.PowerShell.Commands.InvokeExpressionCommand
80+
81+
```
82+
83+
84+
### Testing AMSI with VBScript
85+
86+
```vbscript
87+
88+
REM Save this sample AMSI vbscript as AMSI_vbscript.vbs
89+
Dim result
90+
result = eval("AMSI Test Sample: " + "7e72c3ce-861b-4339-8740-0ac1484c1386")
91+
WScript.Echo result
92+
93+
```
94+
95+
1. Open Command Prompt as an administrator.
96+
97+
2. Type `wscript AMSI_vbscript.js`, and then press **Enter**.
98+
99+
The result should be as follows:
100+
101+
```console
102+
103+
Windows Script Host
104+
105+
Script: C:\Users\Admin\Desktop\AMSI_vbscript.vbs
106+
107+
Line: 3
108+
109+
Char: 1
110+
111+
Error: This script contains malicious content and has been blocked by your antivirus software.: 'eval'
112+
113+
Code: 800A802D
114+
115+
Source: Microsoft VBScript runtime error
116+
117+
```
118+
119+
### Verifying the test results
120+
121+
In your protection history, you should be able to see the following information:
122+
123+
```console
124+
125+
Threat blocked
126+
127+
Detected: Virus: Win32/MpTest!amsi
128+
129+
Status: Cleaned
130+
131+
This threat or app was cleaned or quarantined before it became active on your device.
132+
133+
Details: This program is dangerous and replicates by infecting other files.
134+
135+
Affected items:
136+
137+
amsi: \Device\HarddiskVolume3\Windows\System32\WindowsPowershell\v1.0\powershell.exe
138+
139+
or
140+
141+
amsi: C:\Users\Admin\Desktop\AMSI_vbscript.vbs
142+
143+
and/or you might see:
144+
145+
Threat blocked
146+
147+
Detected: Virus: Win32/MpTest!amsi
148+
149+
Status: Cleaned
150+
151+
This threat or app was cleaned or quarantined before it became active on your device.
152+
153+
Details: This program is dangerous and replicates by infecting other files
154+
155+
Affected items:
156+
157+
```
158+
159+
### Get the list of Microsoft Defender Antivirus threats
160+
161+
You can view detected threats by using the Event log or PowerShell.
162+
163+
#### Use the Event log
164+
165+
1. Go to **Start**, and search for `EventVwr.msc`. Open Event Viewer in the list of results.
166+
167+
2. Go to **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender operational events**.
168+
169+
3. Look for `event ID 1116`. You should see the following information:
170+
171+
```console
172+
173+
Microsoft Defender Antivirus has detected malware or other potentially unwanted software.
174+
175+
For more information please see the following: https://go.microsoft.com/fwlink/?linkid=37020&name=Virus:Win32/MpTest!amsi&threatid=2147694217&enterprise=0
176+
177+
Name: Virus:Win32/MpTest!amsi
178+
179+
ID: 2147694217
180+
181+
Severity: Severe
182+
183+
Category: Virus
184+
185+
Path: _\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or _C:\Users\Admin\Desktop\AMSI_jscript.js; file: _C:\Users\Admin\Desktop\AMSI_jscript.js->[Eval] or _C:\Users\Admin\Desktop\AMSI_vbscript.vbs
186+
187+
Detection Origin: Local machine or Unknown
188+
189+
Detection Type: Concrete
190+
191+
Detection Source: System
192+
193+
User: NT AUTHORITY\SYSTEM
194+
195+
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe or C:\Windows\System32\cscript.exe or C:\Windows\System32\wscript.exe or Unknown
196+
197+
Security intelligence Version: AV: 1.419.221.0, AS: 1.419.221.0, NIS: 1.419.221.0
198+
199+
Engine Version: AM: 1.1.24080.9, NIS: 1.1.24080.9
200+
201+
```
202+
203+
##### Use PowerShell
204+
205+
Open PowerShell, and then type the following command: `Get-MpThreat`.
206+
207+
You might see the following results:
208+
209+
```console
210+
211+
CategoryID : 42
212+
213+
DidThreatExecute : True
214+
215+
IsActive : True
216+
217+
Resources :
218+
219+
RollupStatus : 97
220+
221+
SchemaVersion : 1.0.0.0
222+
223+
SeverityID : 5
224+
225+
ThreatID : 2147694217
226+
227+
ThreatName : Virus:Win32/MpTest!amsi
228+
229+
TypeID : 0
230+
231+
PSComputerName :
232+
233+
```
234+
235+
## See also
236+
237+
[Microsoft Defender for Endpoint - demonstration scenarios](defender-endpoint-demonstrations.md)
238+
239+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/mac-jamfpro-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 08/26/2024
17+
ms.date: 09/30/2024
1818
---
1919

2020
# Set up the Microsoft Defender for Endpoint on macOS policies in Jamf Pro

defender-endpoint/manage-protection-updates-microsoft-defender-antivirus.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365-security
1515
- tier2
1616
search.appverid: met150
17-
ms.date: 09/27/2024
17+
ms.date: 09/30/2024
1818
---
1919

2020
# Manage the sources for Microsoft Defender Antivirus protection updates
@@ -91,7 +91,7 @@ You can manage the order in which update sources are used with Group Policy, Mic
9191
> [!IMPORTANT]
9292
> If you set Windows Server Update Service as a download location, you must approve the updates, regardless of the management tool you use to specify the location. You can set up an automatic approval rule with Windows Server Update Service, which might be useful as updates arrive at least once a day. To learn more, see [synchronize endpoint protection updates in standalone Windows Server Update Service](/configmgr/protect/deploy-use/endpoint-definitions-wsus#to-synchronize-endpoint-protection-definition-updates-in-standalone-wsus).
9393
94-
The procedures in this article first describe how to set the order, and then how to set up the **File share** option if it's enabled.
94+
The procedures in this article first describe how to set the order, and then how to set up the Windows File Server - **File share** option if it's enabled.
9595

9696
## Use Group Policy to manage the update location
9797

@@ -117,10 +117,10 @@ The procedures in this article first describe how to set the order, and then how
117117

118118
7. Edit the **Define file shares for downloading security intelligence updates** setting and then set the option to **Enabled**.
119119

120-
8. On a Windows Server, specify the file share source. If you have multiple sources, specify each source in the order they should be used, separated by a single pipe. Use [standard UNC notation](/openspecs/windows_protocols/ms-dtyp/62e862f4-2a51-452e-8eeb-dc4ff5ee33cc) for denoting the path. For example: `\\host-name1\share-name\object-name|\\host-name2\share-name\object-name`.
120+
1. On a Windows Server, specify the file share source. If you have multiple sources, specify each source in the order they should be used, separated by a single pipe. Use [standard UNC notation](/openspecs/windows_protocols/ms-dtyp/62e862f4-2a51-452e-8eeb-dc4ff5ee33cc) for denoting the path. For example: `\\WindowsFileServer\share-name\object-name|\\host-name2\share-name\object-name`.
121121

122122
If you don't enter any paths, then this source is skipped when the VM downloads updates.
123-
123+
124124
9. Select **OK**. This action sets the order of file shares when that source is referenced in the **Define the order of sources...** group policy setting.
125125

126126

@@ -174,7 +174,7 @@ For example, suppose that Contoso has hired Fabrikam to manage their security so
174174

175175
## Create a UNC share for security intelligence and platform updates
176176

177-
On a Windows Server set up a network file share (UNC/mapped drive) to download security intelligence and platform updates from the MMPC site by using a scheduled task.
177+
On a Windows File Server set up a network file share (UNC/mapped drive) to download security intelligence and platform updates from the MMPC site by using a scheduled task.
178178

179179
1. On the system for which you want to provision the share and download the updates, create a folder for the script.
180180

defender-endpoint/onboard-configure.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: conceptual
1414
ms.subservice: onboard
1515
search.appverid: met150
16-
ms.date: 03/28/2024
16+
ms.date: 09/30/2024
1717
---
1818

1919
# Configure Microsoft Defender for Endpoint capabilities
@@ -48,6 +48,7 @@ Onboarding devices effectively enables the endpoint detection and response capab
4848
| [Configure Next-generation protection (NGP)](configure-microsoft-defender-antivirus-features.md) | Microsoft Defender Antivirus is a built-in antimalware solution that provides next-generation protection for desktops, portable computers, and servers. Microsoft Defender Antivirus includes:<br> <br>-Cloud-delivered protection for near-instant detection and blocking of new and emerging threats. Along with machine learning and the Intelligent Security Graph, cloud-delivered protection is part of the next-gen technologies that power Microsoft Defender Antivirus.<br> <br> - Always-on scanning using advanced file and process behavior monitoring and other heuristics (also known as "real-time protection").<br><br> - Dedicated protection updates based on machine learning, human and automated big-data analysis, and in-depth threat resistance research. |3|
4949
| [Configure attack surface reduction](overview-attack-surface-reduction.md) | Attack surface reduction capabilities in Microsoft Defender for Endpoint help protect the devices and applications in the organization from new and emerging threats. |4|
5050
| [Configure Auto Investigation & Remediation (AIR) capabilities](configure-automated-investigations-remediation.md) | Microsoft Defender for Endpoint uses Automated investigations to significantly reduce the volume of alerts that need to be investigated individually. The Automated investigation feature uses various inspection algorithms, and processes used by analysts (such as playbooks) to examine alerts and take immediate remediation action to resolve breaches. AIR significantly reduces alert volume, allowing security operations experts to focus on more sophisticated threats and other high value initiatives.|Not applicable|
51+
| [Activate Microsoft Defender for Identity capabilities directly on a domain controller](/defender-for-identity/deploy/activate-capabilities) | Microsoft Defender for Identity customers, who've already onboarded their domain controllers to Defender for Endpoint, can activate Microsoft Defender for Identity capabilities directly on a domain controller instead of using a Microsoft Defender for Identity sensor. |Not applicable|
5152
| [Configure Microsoft Defender Experts capabilities](/defender-xdr/defender-experts-for-hunting) | Microsoft Experts is a managed hunting service that provides Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in their unique environments don't get missed.|Not applicable|
5253

5354
For more information, see [Supported Microsoft Defender for Endpoint capabilities by platform](supported-capabilities-by-platform.md).

0 commit comments

Comments
 (0)