Skip to content

Commit 78c99fe

Browse files
authored
Merge pull request #3101 from MicrosoftDocs/main
pushing fixes live
2 parents b09c404 + 00e0ef8 commit 78c99fe

File tree

5 files changed

+59
-42
lines changed

5 files changed

+59
-42
lines changed

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
17-
ms.date: 03/04/2025
17+
ms.date: 03/11/2025
1818
ms.subservice: onboard
1919
---
2020

@@ -55,8 +55,8 @@ Defender for Endpoint supports non-persistent VDI session onboarding. There migh
5555
- In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
5656

5757
- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal. In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
58-
5958
- Multiple entries for each device - one for each VDI instance.
59+
- For all VDI machines, when they onboard for the first time, there's a client delay of approximately 3-4 hours.
6060

6161
> [!IMPORTANT]
6262
> If you're deploying non-persistent VDIs through cloning technology, make sure that your internal template VMs are not onboarded to Defender for Endpoint. This recommendation is to avoid cloned VMs from being onboarded with the same senseGuid as your template VMs, which could prevent VMs from showing up as new entries in the Devices list.

defender-endpoint/linux-preferences.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 03/05/2025
9+
ms.date: 03/11/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -662,6 +662,20 @@ Determines whether module load events (file open events on shared libraries) are
662662
|**Possible values**|disabled (default) <p> enabled|*n/a*|
663663
|**Comments**|Available in Defender for Endpoint version `101.68.80` or later.||
664664

665+
#### Remediate Infected File feature
666+
667+
Determines whether infected processes that open or load any infected file will get remediated or not.
668+
669+
> [!NOTE]
670+
> When enabled the processes that open or load any infected file will be remediated in RTP mode. These processes will not appear in the threat list as these are not malicious but are only being terminated because they were loading the threat file in memory.
671+
672+
|Description|JSON Value|Defender Portal Value|
673+
|---|---|---|
674+
|**Key**|remediateInfectedFile|*Not available*|
675+
|**Data type**|String|*n/a*|
676+
|**Possible values**|disabled (default) <p> enabled|*n/a*|
677+
|**Comments**|Available in Defender for Endpoint version `101.24122.0001` or later.||
678+
665679
#### Supplementary sensor configurations
666680

667681
The following settings can be used to configure certain advanced supplementary sensor features.
@@ -963,7 +977,8 @@ The following configuration profile contains entries for all settings described
963977
"sendLowfiEvents":"disabled"
964978
},
965979
"ebpfSupplementaryEventProvider":"enabled",
966-
"offlineDefinitionUpdateVerifySig": "disabled"
980+
"offlineDefinitionUpdateVerifySig": "disabled",
981+
"remediateInfectedFile": "enabled"
967982
},
968983
"networkProtection":{
969984
"enforcementLevel":"disabled",

defender-endpoint/network-devices.md

Lines changed: 30 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
search.appverid: met150
17-
ms.date: 01/02/2025
17+
ms.date: 03/11/2025
1818
---
1919

2020
# Network device discovery and vulnerability management
@@ -23,15 +23,14 @@ ms.date: 01/02/2025
2323

2424
**Applies to:**
2525

26-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26+
- [Microsoft Defender for Endpoint Plan 1 and Plan 2](microsoft-defender-endpoint.md)
2827
- [Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management)
2928
- [Microsoft Defender XDR](/defender-xdr)
3029

3130
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-portaloverview-abovefoldlink)
3231
3332
> [!NOTE]
34-
> The [Network device discovery and vulnerability assessments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-device-discovery-and-vulnerability-assessments/ba-p/2267548) Blog \(published 04-13-2021\) provides insights into the new **Network device discovery** capabilities in Defender for Endpoint. This article provides an overview of the challenge that **Network device discovery** is designed to address, and detailed information about how get started using these new capabilities.
33+
> The [Tech Community Blog: Network device discovery and vulnerability assessments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-device-discovery-and-vulnerability-assessments/ba-p/2267548) (published 04-13-2021) provides insights into the new **Network device discovery** capabilities in Defender for Endpoint. This article provides an overview of the challenge that **Network device discovery** is designed to address, and detailed information about how to get started using these new capabilities.
3534
3635
Network discovery capabilities are available in the **Device inventory** section of the [Microsoft Defender portal](https://security.microsoft.com) and Microsoft Defender XDR consoles.
3736

@@ -43,6 +42,9 @@ Once the network devices are discovered and classified, security administrators
4342

4443
Network devices aren't managed as standard endpoints since Defender for Endpoint doesn't have a sensor built into the network devices themselves. These types of devices require an agentless approach where a remote scan obtains the necessary information from the devices. Depending on the network topology and characteristics, a single device or a few devices onboarded to Microsoft Defender for Endpoint performs authenticated scans of network devices using SNMP (read-only).
4544

45+
> [!NOTE]
46+
> Authenticated scans support `SNMPv2` and `SNMPv3`.
47+
4648
There are two types of devices to keep in mind:
4749

4850
- **Scanning device**: A device that's already onboarded that you use to scan the network devices.
@@ -85,9 +87,9 @@ Your first step is to select a device that performs the authenticated network sc
8587

8688
8. To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
8789

88-
- \*.security.microsoft.com
89-
- login.microsoftonline.com
90-
- \*.blob.core.windows.net/networkscannerstable/\*
90+
- `*.security.microsoft.com`
91+
- `login.microsoftonline.com`
92+
- `*.blob.core.windows.net/networkscannerstable/*`
9193

9294
> [!NOTE]
9395
> Not all URLs are specified in the Defender for Endpoint documented list of allowed data collection.
@@ -96,7 +98,7 @@ Your first step is to select a device that performs the authenticated network sc
9698

9799
To configure scan jobs, the following user permission option is required: **Manage security settings in Defender**. You can find the permission by going to **Settings** \> **Roles**. For more information, see [Create and manage roles for role-based access control](user-roles.md).
98100

99-
## Windows version pre-requisite for the scanner
101+
## Windows version prerequisite for the scanner
100102

101103
The scanner is supported on Windows 10, version 1903 and Windows Server, version 1903 and later. For more information, see [Windows 10, version 1903 and Windows Server, version 1903](https://support.microsoft.com/topic/windows-10-update-history-e6058e7c-4116-38f1-b984-4fcacfba5e5d).
102104

@@ -109,7 +111,7 @@ The scanner is supported on Windows 10, version 1903 and Windows Server, version
109111

110112
2. Download the scanner and install it on the designated Defender for Endpoint scanning device.
111113

112-
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan-new.png" alt-text="Screenshot of the add new authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan-new.png":::
114+
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan-new.png" alt-text="Screenshot of the add new authenticated scan screen." lightbox="/defender/media/defender-endpoint/network-authenticated-scan-new.png":::
113115

114116
## Scanner installation & registration
115117

@@ -122,8 +124,8 @@ To complete the scanner registration process:
122124

123125
1. Copy and follow the URL that appears on the command line and use the provided installation code to complete the registration process.
124126

125-
> [!NOTE]
126-
> You may need to change Command Prompt settings to be able to copy the URL.
127+
> [!NOTE]
128+
> You may need to change Command Prompt settings to be able to copy the URL.
127129
128130
2. Enter the code and sign in using a Microsoft account that has the Defender for Endpoint permission called "Manage security settings in Defender."
129131

@@ -141,7 +143,7 @@ If there's a difference between the two versions, the update process determines
141143

142144
2. Select **Add new scan** and choose **Network device authenticated scan** and select **Next**.
143145

144-
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan.png":::
146+
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen." lightbox="/defender/media/defender-endpoint/network-authenticated-scan.png":::
145147

146148
3. Choose whether to **Activate scan**.
147149

@@ -151,17 +153,17 @@ If there's a difference between the two versions, the update process determines
151153

152154
6. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file overrides any manually added addresses.
153155

154-
7. Select the **Scan interval:** By default, the scan runs every four hours, you can change the scan interval or have it only run once, by selecting **Don't repeat**.
156+
7. Select the **Scan interval:** By default, the scan runs every four hours. You can change the scan interval or have it only run once, by selecting **Don't repeat**.
155157

156158
8. Choose your **Authentication method**.
157159

158160
You can select to **Use azure KeyVault for providing credentials:** If you manage your credentials in Azure KeyVault, you can enter the Azure KeyVault URL and Azure KeyVault secret name to be accessed by the scanning device to provide credentials. The secret value is dependent on the Authenticated Method you choose, as described in the following table:
159161

160162
|Authentication Method|Azure KeyVault secret value|
161163
|:----|:----:|
162-
|AuthPriv|Username;AuthPassword;PrivPassword|
163-
|AuthNoPriv|Username;AuthPassword|
164-
|CommunityString |CommunityString|
164+
|`AuthPriv`|Username;AuthPassword;PrivPassword|
165+
|`AuthNoPriv`|Username;AuthPassword|
166+
|`CommunityString` |CommunityString|
165167

166168
9. Select **Next** to run or skip the test scan.
167169

@@ -172,38 +174,38 @@ If there's a difference between the two versions, the update process determines
172174
173175
### Scan and add network devices
174176

175-
During the set-up process, you can perform a one time test scan to verify that:
177+
During the setup process, you can perform a one time test scan to verify that:
176178

177179
- There's connectivity between the Defender for Endpoint scanning device and the configured target network devices.
178180
- The configured SNMP credentials are correct.
179181

180-
Each scanning device can support up to 1,500 successful IP addresses scan. For example, if you scan 10 different subnets where only 100 IP addresses return successful results, you'll be able to scan 1,400 IP additional addresses from other subnets on the same scanning device.
182+
Each scanning device can support up to 1,500 successful IP addresses scan. For example, if you scan 10 different subnets where only 100 IP addresses return successful results, you can scan 1,400 IP more addresses from other subnets on the same scanning device.
181183

182184
If there are multiple IP address ranges/subnets to scan, the test scan results take several minutes to show up. A test scan is available for up to 1,024 addresses.
183185

184-
Once the results show up, you can choose which devices will be included in the periodic scan. If you skip viewing the scan results, all configured IP addresses are added to the network device authenticated scan (regardless of the device's response). The scan results can also be exported.
186+
Once the results show up, you can choose which devices to include in the periodic scan. If you skip viewing the scan results, all configured IP addresses are added to the network device authenticated scan (regardless of the device's response). The scan results can also be exported.
185187

186188
## Device inventory
187189

188-
Newly discovered devices are shown under the new **Network devices** tab in the **Device inventory** page. It may take up to two hours after adding a scanning job until the devices are updated.
190+
Newly discovered devices are shown under the new **Network devices** tab in the **Device inventory** page. It might take up to two hours after adding a scanning job until the devices are updated.
189191

190-
:::image type="content" source="/defender/media/defender-endpoint/network-devices-inventory.png" alt-text="Screenshot of the network device tab in the device inventory" lightbox="/defender/media/defender-endpoint/network-devices-inventory.png":::
192+
:::image type="content" source="/defender/media/defender-endpoint/network-devices-inventory.png" alt-text="Screenshot of the network device tab in the device inventory." lightbox="/defender/media/defender-endpoint/network-devices-inventory.png":::
191193

192194
## Troubleshooting
193195

194-
### Scanner installation has failed
196+
### Scanner installation failed
195197

196198
Verify that the required URLs are added to the allowed domains in your firewall settings. Also, make sure proxy settings are configured as described in [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
197199

198-
### The Microsoft.com/devicelogin web page did not show up
200+
### The Microsoft.com/devicelogin web page didn't show up
199201

200202
Verify that the required URLs are added to the allowed domains in your firewall. Also, make sure proxy settings are configured as described in [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
201203

202-
### Network devices are not shown in the device inventory after several hours
204+
### Network devices aren't shown in the device inventory after several hours
203205

204206
The scan results should be updated a few hours after the initial scan that took place after completing the network device authenticated scan configuration.
205207

206-
If devices are still not shown, verify that the service 'MdatpNetworkScanService' is running on your devices being scanned, on which you installed the scanner, and perform a "Run scan" in the relevant network device authenticated scan configuration.
208+
If devices are still not shown, verify that the service `MdatpNetworkScanService` is running on your devices being scanned, on which you installed the scanner, and perform a "Run scan" in the relevant network device authenticated scan configuration.
207209

208210
If you still don't get results after 5 minutes, restart the service.
209211

@@ -215,9 +217,9 @@ Validate that the scanner is running properly. Then go to the scan definition an
215217

216218
As the authenticated scanner currently uses an encryption algorithm that isn't compliant with [Federal Information Processing Standards (FIPS)](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing/), the scanner can't operate when an organization enforces the use of FIPS compliant algorithms.
217219

218-
To allow algorithms that aren't compliant with FIPS, set the following value in the registry for the devices where the scanner will run:
220+
To allow algorithms that aren't compliant with FIPS, set the following value in the registry for the devices where the scanner runs:
219221

220-
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy with a DWORD value named **Enabled** and value of **0x0**
222+
Computer`\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy` with a DWORD value named `Enabled` and value of `0x0`.
221223

222224
FIPS compliant algorithms are only used in relation to departments and agencies of the United States federal government.
223225

@@ -242,4 +244,4 @@ Change command-line settings on your device to allow copying and change text siz
242244
- [Device inventory](machines-view-overview.md)
243245
- [Windows authenticated scan](/defender-vulnerability-management/windows-authenticated-scan)
244246

245-
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
247+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)