Skip to content

Commit 7ad059c

Browse files
authored
Merge pull request #1218 from YongRhee-MSFT/docs-editor/indicator-file-1724686056
Update indicator-file.md
2 parents dadf268 + d35cac8 commit 7ad059c

File tree

1 file changed

+14
-12
lines changed

1 file changed

+14
-12
lines changed

defender-endpoint/indicator-file.md

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: siosulli
77
author: siosulli
88
ms.localizationpriority: medium
9-
ms.date: 03/20/2024
9+
ms.date: 08/26/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -115,17 +115,15 @@ Choose if to Generate an alert on the file block event and define the alerts set
115115
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
116116

117117
> [!IMPORTANT]
118-
>
119-
> - Typically, file blocks are enforced and removed within a couple of minutes, but can take upwards of 30 minutes.
120-
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
121-
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
122-
> - If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
123-
>
118+
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
119+
- If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
120+
- In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
121+
- If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
122+
124123
> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
125-
>
126-
> For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
124+
> > For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
127125
128-
## Advanced hunting capabilities (preview)
126+
> ## Advanced hunting capabilities (preview)
129127
130128
> [!IMPORTANT]
131129
> Information in this section (**Public Preview for Automated investigation and remediation engine**) relates to prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
@@ -158,11 +156,17 @@ The response action activity can also be viewable in the device timeline.
158156
Cert and File IoC policy handling conflicts follow this order:
159157

160158
1. If the file isn't allowed by Windows Defender Application Control and AppLocker enforce mode policies, then **Block**.
159+
161160
2. Else, if the file is allowed by the Microsoft Defender Antivirus exclusions, then **Allow**.
161+
162162
3. Else, if the file is blocked or warned by a block or warn file IoCs, then **Block/Warn**.
163+
163164
4. Else, if the file is blocked by SmartScreen, then **Block**.
165+
164166
5. Else, if the file is allowed by an allow file IoC policy, then **Allow**.
167+
165168
6. Else, if the file is blocked by attack surface reduction rules, controlled folder access, or antivirus protection, then **Block**.
169+
166170
7. Else, **Allow** (passes Windows Defender Application Control & AppLocker policy, no IoC rules apply to it).
167171

168172
> [!NOTE]
@@ -184,15 +188,13 @@ Microsoft Defender Vulnerability Management's block vulnerable application featu
184188
|Windows Defender Application Control|Allow|Block|Allow|
185189
|Windows Defender Application Control|Block|Allow|Block|
186190
|Microsoft Defender Antivirus exclusion|Allow|Block|Allow|
187-
|
188191

189192
## See also
190193

191194
- [Create indicators](manage-indicators.md)
192195
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
193196
- [Create indicators based on certificates](indicator-certificates.md)
194197
- [Manage indicators](indicator-manage.md)
195-
196198
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
197199

198200
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)