You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 09/03/2024
9
+
ms.date: 10/17/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -67,13 +67,13 @@ Understand the following prerequisites before you create indicators for files:
67
67
68
68
### macOS prerequisites
69
69
70
-
-[File hash computation is enabled](https://learn.microsoft.com/en-us/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
70
+
-[File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
71
71
72
72
### linux prerequisites
73
73
74
74
- Available in Defender for Endpoint version 101.85.27 or later.
75
75
76
-
-[File hash computation is enabled] from the portal or in the managed JSON (https://learn.microsoft.com/en-us/defender-endpoint/linux-preferences#configure-file-hash-computation-feature)
76
+
-[File hash computation is enabled] from the portal or in the managed JSON (/defender-endpoint/linux-preferences#configure-file-hash-computation-feature)
77
77
78
78
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web.
79
79
@@ -117,28 +117,28 @@ Files automatically blocked by an indicator won't show up in the file's Action c
117
117
118
118
The current supported actions for file IOC are allow, audit and block, and remediate. After choosing to block a file, you can choose whether triggering an alert is needed. In this way, you'll be able to control the number of alerts getting to your security operations teams and make sure only required alerts are raised.
119
119
120
-
In Microsoft Defender XDR, go to **Settings** > **Endpoints** > **Indicators** > **Add New File Hash**.
120
+
1.In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Indicators** > **Add New File Hash**.
121
121
122
-
Choose to Block and remediate the file.
122
+
2.Choose to block and remediate the file.
123
123
124
-
Choose if to Generate an alert on the file block event and define the alerts settings:
124
+
3. Specify whether to generate an alert on the file block event and define the alerts settings:
125
125
126
-
- The alert title
127
-
- The alert severity
128
-
- Category
129
-
- Description
130
-
- Recommended actions
126
+
- The alert title
127
+
- The alert severity
128
+
- Category
129
+
- Description
130
+
- Recommended actions
131
131
132
-
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
132
+
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
133
133
134
-
> [!IMPORTANT]
135
-
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
136
-
- If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
137
-
- In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
138
-
- If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
139
-
140
-
> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
141
-
>> For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
134
+
> [!IMPORTANT]
135
+
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
136
+
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash
137
+
IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
138
+
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
139
+
> - If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
140
+
> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
141
+
> For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
0 commit comments