You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Known issues: These applications and "Block credential stealing from the Windows local security authority subsystem" rule, are incompatible:
352
+
353
+
|Application name|For information|
354
+
| -------- | -------- |
355
+
|Quest Dirsync Password Sync|[Dirsync Password Sync isn’t working when Windows Defender is installed, error: "VirtualAllocEx failed: 5" (4253914)](https://support.quest.com/kb/4253914/dirsync-password-sync-isn-t-working-when-windows-defender-is-installed-error-virtualallocex-failed-5)|
356
+
357
+
For technical support, contact the software vendor.
358
+
351
359
### Block executable content from email client and webmail
352
360
353
361
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
For technical support, contact the software vendor.
501
+
485
502
### Block Office communication application from creating child processes
486
503
487
504
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.reviewer: yongrhee
10
10
manager: deniseb
11
11
ms.subservice: ngp
12
12
ms.topic: conceptual
13
-
ms.date: 07/25/2024
13
+
ms.date: 11/10/2024
14
14
ms.collection:
15
15
- m365-security
16
16
- tier2
@@ -64,7 +64,7 @@ You can specify the cloud block timeout period with an [endpoint security policy
64
64
65
65
3. Select (or create) an antivirus policy.
66
66
67
-
4. In the **Configuration settings** section, expand **Cloud protection**. Then, in the **Microsoft Defender Antivirus Extended Timeout In Seconds**box, specify the more time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
67
+
4. In the **Configuration settings** section, scroll down to **Cloud Extended Timeout**and specify the timeout, in seconds, from 0 to 50 seconds. Whatever you specify is added to the default 10 seconds.
68
68
69
69
5. (This step is optional) Make any other changes to your antivirus policy. (Need help? See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)
Copy file name to clipboardExpand all lines: defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
6
6
ms.topic: how-to
7
7
author: denisebmsft
8
8
ms.author: deniseb
9
-
ms.date: 04/03/2024
9
+
ms.date: 11/10/2024
10
10
ms.reviewer: pahuijbr
11
11
manager: deniseb
12
12
ms.custom: nextgen
@@ -81,7 +81,7 @@ For more information about the specific network-connectivity requirements to ens
81
81
82
82
| Task | Steps |
83
83
|---------|---------|
84
-
| Create a new policy | 1. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**. Then choose **Next**. <br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
84
+
| Create a new policy | 1. For **Platform**, select **Windows**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
85
85
| Edit an existing policy | 1. Select the policy that you want to edit.<br/><br/>2. Under **Configuration settings**, choose **Edit**.<br/><br/>3. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>4. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>5. Select **Review + save**. |
Copy file name to clipboardExpand all lines: defender-endpoint/mde-plugin-wsl.md
+39-34Lines changed: 39 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.custom:
16
16
- partner-contribution
17
17
audience: ITPro
18
-
ms.date: 10/24/2024
18
+
ms.date: 11/11/2024
19
19
search.appverid: MET150
20
20
---
21
21
@@ -35,23 +35,19 @@ Windows Subsystem for Linux (WSL) 2, which replaces the previous version of WSL
35
35
36
36
Be aware of the following considerations before you start:
37
37
38
-
1. The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later, updates are supported through Windows Update across all rings. Updates through Windows Server Update services (WSUS), System Center Configuration Manager (SCCM) and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
38
+
- The plug-in doesn't support automatic updates on versions prior to `1.24.522.2`. On version `1.24.522.2` and later. Updates are supported through Windows Update across all rings. Updates through Windows Server Update Services (WSUS), System Center Configuration Manager (SCCM), and Microsoft Update catalog are supported only in the Production ring to ensure package stability.
39
39
40
-
2. It takes a few minutes for the plug-in to fully instantiate, and up to 30 minutes for a WSL2 instance to onboard itself. Short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Once any distribution has been running long enough (at least 30 minutes), it does show up.
40
+
- It takes a few minutes for the plug-in to fully instantiate, and up to 30 minutes for a WSL2 instance to onboard itself. Short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). When any distribution has been running long enough (at least 30 minutes), it does show up.
41
41
42
-
3. Running a custom kernel and custom kernel command line is not supported. Although the plug-in does not block running in that configuration, it does not guarantee visibility within WSL when you're running a custom kernel and custom kernel command line. We recommend to block such configurations with help of[Microsoft Intune wsl settings](/windows/wsl/intune).
42
+
- Running a custom kernel and custom kernel command line is not supported. Although the plug-in does not block running in that configuration, it does not guarantee visibility within WSL when you're running a custom kernel and custom kernel command line. We recommend blocking such configurations with [Microsoft Intune wsl settings](/windows/wsl/intune).
43
43
44
-
4. OS Distribution is displayed **None** in the **Device overview** page of a WSL device in the Microsoft Defender portal.
44
+
- The plug-in is not supported on machines with an ARM64 processor.
45
45
46
-
5. The plug-in is not supported on machines with ARM64 processor.
47
-
48
-
6. The plug-in provides visibility into events from WSL, but other features like antimalware, threat and vulnerability management, and response commands are not available for the WSL logical device.
46
+
- The plug-in provides visibility into events from WSL, but other features like antimalware, threat and vulnerability management, and response commands are not available for the WSL logical device.
49
47
50
48
## Software prerequisites
51
49
52
-
- WSL version 2.0.7.0 or later must be running with at least one active distro.
53
-
54
-
Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than `2.0.7.0`, run `wsl -–update –pre-release` to get the latest update.
50
+
- WSL version `2.0.7.0` or later must be running with at least one active distro. Run `wsl --update` to make sure you are on the latest version. If `wsl -–version` shows a version older than `2.0.7.0`, run `wsl -–update –pre-release` to get the latest update.
55
51
56
52
- The Windows client device must be onboarded to Defender for Endpoint.
57
53
@@ -97,6 +93,7 @@ If your Windows Subsystem for Linux isn't installed yet, follow these steps:
97
93
98
94
> [!NOTE]
99
95
> If `WslService` is running, it stops during the installation process. You do not need to onboard the subsystem separately. Instead, the plug-in automatically onboards to the tenant the Windows host is onboarded to.
96
+
> Microsoft Defender for Endpoint update for plug-in for WSL [KB Update](https://support.microsoft.com/en-us/topic/microsoft-defender-for-endpoint-update-for-plug-in-for-wsl-9f4b2ddc-c47f-4c59-bd02-a3456c667966).
100
97
101
98
## Installation validation checklist
102
99
@@ -143,9 +140,9 @@ For example, if your host machine has both `Winhttp proxy` and `Network & Intern
143
140
> [!NOTE]
144
141
> The `DefenderProxyServer` registry key is no longer supported. Follow the steps described earlier in this article to configure proxy in plug-in.
145
142
146
-
## Connectivity test for Defender running in WSL
143
+
## Connectivity test for Defender for Endpoint running in WSL
147
144
148
-
The defender connectivity test is triggered whenever there is a proxy modification on your device and is scheduled to run every hour.
145
+
The Defender for Endpoint connectivity test is triggered whenever there is a proxy modification on your device and is scheduled to run every hour.
149
146
150
147
On starting your wsl machine, wait for 5 minutes and then run `healthcheck.exe` (located at `%ProgramFiles%\Microsoft Defender for Endpoint plug-in for WSL\tools` for the results of the connectivity test). If successful, you can see that the connectivity test was a success. If failed, you can see that the connectivity test was `invalid` indicating that the client connectivity from MDE plug-in for WSL to Defender for Endpoint service URLs is failing.
151
148
@@ -255,6 +252,16 @@ DeviceProcessEvents
255
252
256
253
## Troubleshooting
257
254
255
+
### Installation failure
256
+
257
+
If you see an error on launching WSL, such as `A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND`, it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
258
+
259
+
1. In Control Panel, go to **Programs** > **Programs and Features**.
260
+
261
+
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right files in the expected directories.
262
+
263
+
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
264
+
258
265
### The command `healthcheck.exe` shows the output, "Launch WSL distro with 'bash' command and retry in five minutes."
@@ -357,41 +364,39 @@ Collect the networking logs by following these steps:
357
364
358
365
:::image type="content" source="media/mdeplugin-wsl/wsl-health-check-overview.png" alt-text="Screenshot showing status in PowerShell output." lightbox="media/mdeplugin-wsl/wsl-health-check-overview.png":::
359
366
360
-
2. Microsoft Defender Endpoint for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
367
+
### WSL1 vs WSL2
361
368
362
-
1. Go to your [Microsoft Intune admin center](https://intune.microsoft.com).
369
+
Microsoft Defender Endpoint plug-in for WSL supports Linux distributions running on WSL 2. If they're associated with WSL 1, you might encounter issues. Therefore, it's advised to disable WSL 1. To do so with the Intune policy, perform the following steps:
363
370
364
-
2. Go to **Devices** > **Configuration Profiles** > **Create** > **New Policy**.
371
+
1. Go to your [Microsoft Intune admin center](https://intune.microsoft.com).
365
372
366
-
3. Select**Windows 10 and later** > **Settings catalog**.
373
+
2. Go to **Devices** >**Configuration Profiles** > **Create** > **New Policy**.
367
374
368
-
4. Create a name for the new profile, and search for **Windows Subsystem for Linux** to see and add the full list of available settings.
375
+
3. Select **Windows 10 and later** > **Settings catalog**.
369
376
370
-
5. Set the **Allow WSL1** setting to **Disabled**, to ensure that only WSL 2 distributions can be used.
377
+
4. Create a name for the new profile, and search for **Windows Subsystem for Linux** to see and add the full list of available settings.
371
378
372
-
Alternately, if you want to keep using WSL 1, or not use the Intune Policy, you can selectively associate your installed distributions to run on WSL 2, by running the command in PowerShell:
379
+
5. Set the **Allow WSL1** setting to **Disabled**, to ensure that only WSL 2 distributions can be used.
373
380
374
-
```powershell
375
-
wsl --set-version <YourDistroName> 2
376
-
```
381
+
Alternately, if you want to keep using WSL 1, or not use the Intune Policy, you can selectively associate your installed distributions to run on WSL 2, by running the command in PowerShell:
377
382
378
-
To have WSL 2 as your default WSL version for new distributions to be installed in the system, run the following command in PowerShell:
383
+
```powershell
384
+
wsl --set-version <YourDistroName> 2
385
+
```
386
+
387
+
To have WSL 2 as your default WSL version for new distributions to be installed in the system, run the following command in PowerShell:
379
388
380
-
```powershell
381
-
wsl --set-default-version 2
382
-
```
389
+
```powershell
390
+
wsl --set-default-version 2
391
+
```
383
392
384
-
3. The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set `OverrideReleaseRing` to one of the following under registry and restart WSL:
393
+
### Override Release ring
394
+
395
+
- The plug-in uses the Windows EDR ring by default. If you wish to switch to an earlier ring, set `OverrideReleaseRing` to one of the following under registry and restart WSL:
385
396
386
397
-**Name**: `OverrideReleaseRing`
387
398
-**Type**: `REG_SZ`
388
399
-**Value**: `Dogfood or External or InsiderFast or Production`
389
400
-**Path**: `Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Defender for Endpoint plug-in for WSL`
390
401
391
-
4. If you see an error on launching WSL, such as "A fatal error was returned by plugin 'DefenderforEndpointPlug-in' Error code: Wsl/Service/CreateInstance/CreateVm/Plugin/ERROR_FILE_NOT_FOUND", it means the Defender for Endpoint plug-in for WSL installation is faulty. To repair it, follow these steps:
392
-
393
-
1. In Control Panel, go to **Programs** > **Programs and Features**.
394
-
395
-
2. Search for and select **Microsoft Defender for Endpoint plug-in for WSL**. Then select **Repair**. This action should fix the problem by placing the right files in the expected directories.
396
402
397
-
:::image type="content" source="media/mdeplugin-wsl/plug-in-repair-control-panel.png" alt-text="Screenshot showing MDE plug-in for WSL repair option in control panel." lightbox="media/mdeplugin-wsl/plug-in-repair-control-panel.png":::
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection-macos.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent macOS connections to bad sites
3
3
description: Protect your network by preventing macOS users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 09/27/2024
6
+
ms.date: 11/10/2024
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -38,7 +38,7 @@ search.appverid: met150
38
38
- Microsoft Edge for macOS browser
39
39
40
40
> [!NOTE]
41
-
> Microsoft Edge for macOS does not currently support web content filtering, custom indicators, or other enterprise features. However, network protection provides this protection to Microsoft Edge for macOS if network protection is enabled.
41
+
> SmartScreen in Microsoft Edge for macOS does not currently support web content filtering, custom indicators, or other enterprise features. However, network protection provides this protection to Microsoft Edge for macOS if network protection is enabled.
Copy file name to clipboardExpand all lines: defender-endpoint/specify-cloud-protection-level-microsoft-defender-antivirus.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
6
6
ms.topic: how-to
7
7
author: denisebmsft
8
8
ms.author: deniseb
9
-
ms.date: 07/25/2024
9
+
ms.date: 11/10/2024
10
10
manager: deniseb
11
11
ms.custom: nextgen
12
12
ms.subservice: ngp
@@ -38,16 +38,16 @@ Cloud protection works together with Microsoft Defender Antivirus to deliver pro
38
38
39
39
3. Select an antivirus profile. If you don't have one yet, or if you want to create a new profile, see [Configure device restriction settings in Microsoft Intune](/mem/intune/configuration/device-restrictions-configure).
40
40
41
-
4.Select **Properties**. Then, next to **Configuration settings**, choose **Edit**.
41
+
4.Next to **Configuration settings**, choose **Edit**.
42
42
43
-
5.Expand **Cloud protection**, and then in the **Cloud-delivered protection level** list, select one of the following:
43
+
5.Scroll down to **Cloud Block Level**, and select one of the following:
44
44
45
45
-**Not configured**: Default state.
46
46
-**High**: Applies a strong level of detection.
47
-
-**High plus**: Uses the **High** level and applies extra protection measures (might affect client performance).
48
-
-**Zero tolerance**: Blocks all unknown executables.
47
+
-**High Plus**: Uses the **High** level and applies extra protection measures (might affect client performance).
48
+
-**Zero Tolerance**: Blocks all unknown executables.
49
49
50
-
6. Choose **Review + save**, and then choose **Save**.
0 commit comments