You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-deploy-manage-intune.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.date: 07/25/2024
7
+
ms.date: 07/30/2024
8
8
ms.topic: overview
9
9
ms.service: defender-endpoint
10
10
ms.subservice: asr
@@ -80,7 +80,7 @@ You can add audit policies, and you can add Allow/Deny policies. It is recommend
80
80
> If you only configure audit policies, the permissions are inherited from the default enforcement setting.
81
81
82
82
> [!NOTE]
83
-
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to Deny, any allow policy results in blocking actions.
83
+
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to `Deny`, and create an `Allow`policy to be applied specific devices, all devices are blocked except for any devices that are set in the `Allow` policy.
84
84
85
85
## Defining Settings with OMA-URI
86
86
@@ -104,13 +104,13 @@ When you create policies with OMA-URI in Intune, create one XML file for each po
104
104
In the **Add Row** pane, specify the following settings:
105
105
106
106
- In the **Name** field, type `Allow Read Activity`.
107
-
- In the **OMA-URI** field, type `/Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`.
107
+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`. (You could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[PolicyRule Id]`.)
108
108
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
109
109
110
110
You can use parameters to set conditions for specific entries. Here's a [group example XML file for Allow Read access for each removable storage](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Intune%20OMA-URI/Allow%20Read.xml).
111
111
112
112
> [!NOTE]
113
-
> Comments using XML comment notation <!-- COMMENT --> can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
113
+
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
114
114
115
115
### Creating groups with OMA-URI
116
116
@@ -121,7 +121,7 @@ When you create groups with OMA-URI in Intune, create one XML file for each grou
121
121
In the **Add Row** pane, specify the following settings:
122
122
123
123
- In the **Name** field, type `Any Removable Storage Group`.
124
-
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b**[GroupId]**%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**.)
124
+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b[GroupId]%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**. Or, you could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[GroupId]`.)
125
125
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
3.[How to configure the list of exclusions](#how-to-configure-the-list-of-exclusions)
30
-
4.[Validate exclusions lists with the EICAR test file](#validate-exclusions-lists-with-the-eicar-test-file)
31
-
5.[Allow threats](#allow-threats)
32
-
33
25
**Applies to:**
34
26
35
27
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
@@ -41,7 +33,7 @@ ms.date: 07/23/2024
41
33
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
42
34
43
35
> [!IMPORTANT]
44
-
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
36
+
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
45
37
46
38
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux.
47
39
@@ -81,7 +73,8 @@ Process|A specific process (specified either by the full path or file name) and
81
73
File, folder, and process exclusions support the following wildcards:
82
74
83
75
> [!NOTE]
84
-
> Wildcards are not supported while configuring global exclusions.
76
+
> File path needs to be present before adding or removing file exclusions with scope as global.
77
+
> Wildcards are not supported while configuring global exclusions.
85
78
86
79
Wildcard|Description|Examples|
87
80
---|---|---
@@ -114,7 +107,7 @@ mdatp exclusion
114
107
115
108
Examples:
116
109
117
-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
110
+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
118
111
119
112
```bash
120
113
mdatp exclusion extension add --name .txt
@@ -132,7 +125,7 @@ Examples:
132
125
Extension exclusion removed successfully
133
126
```
134
127
135
-
- Add/Remove an exclusion for a file:
128
+
- Add/Remove an exclusion fora file *(File path should already be presentincase of adding or removing exclusion with global scope)*:
Copy file name to clipboardExpand all lines: defender-endpoint/linux-preferences.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Set preferences for Microsoft Defender for Endpoint on Linux
3
-
ms.reviewer: gopkr
3
+
ms.reviewer: gopkr, ardeshmukh
4
4
description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
5
5
ms.service: defender-endpoint
6
6
ms.author: dansimp
7
7
author: dansimp
8
8
ms.localizationpriority: medium
9
-
ms.date: 07/23/2024
9
+
ms.date: 07/31/2024
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -79,7 +79,7 @@ Specifies the enforcement preference of antivirus engine. There are three values
79
79
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
80
80
> It is recommended to also use [scheduled scans](/defender-endpoint/linux-schedule-scan-mde) as per requirement.
81
81
82
-
#### Enable/disable behavior-monitoring
82
+
#### Enable/disable behaviormonitoring
83
83
84
84
Determines whether behavior monitoring and blocking capability is enabled on the device or not.
85
85
@@ -136,9 +136,6 @@ Specifies the degree of parallelism for on-demand scans. This corresponds to the
136
136
137
137
#### Exclusion merge policy
138
138
139
-
> [!NOTE]
140
-
> ExclusionSetting - you can use
141
-
142
139
Specifies the merge policy for exclusions. It can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). Administrator-defined (admin_only) are exclusions that are configured by Defender for Endpoint policy. This setting can be used to restrict local users from defining their own exclusions.
143
140
144
141
|Description|JSON Value|Defender Portal Value|
@@ -149,6 +146,7 @@ Specifies the merge policy for exclusions. It can be a combination of administra
149
146
150
147
> [!NOTE]
151
148
> Available in Defender for Endpoint version `100.83.73` or later.
149
+
> Can also configure exclusions under [exclusionSettings](#exclusion-setting-preferences)
152
150
153
151
#### Scan exclusions
154
152
@@ -215,7 +213,7 @@ Specifies a process for which all file activity is excluded from scanning. The p
215
213
|**Possible values**|any string|any string|
216
214
|**Comments**|Applicable only if *$type* is *excludedFileName*|Accessed in *Configure instance* popup|
217
215
218
-
#### Muting Non Exec mounts
216
+
#### Muting non-exec mounts
219
217
220
218
Specifies the behavior of RTP on mount point marked as noexec. There are two values for setting are:
221
219
@@ -234,7 +232,7 @@ Specifies the behavior of RTP on mount point marked as noexec. There are two val
234
232
> [!NOTE]
235
233
> Available in Defender for Endpoint version `101.85.27` or later.
236
234
237
-
#### Unmonitor Filesystems
235
+
#### Unmonitor filesystems
238
236
239
237
Configure filesystems to be unmonitored/excluded from real-time protection (RTP). The filesystems configured are validated against Microsoft Defender's list of permitted filesystems. Filesystems can only be monitored after successful validation. These configured unmonitored filesystems are still scanned by Quick, Full, and custom scans in Microsoft Defender Antivirus.
240
238
@@ -266,7 +264,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, do the followi
266
264
```
267
265
268
266
> [!NOTE]
269
-
> Here;s the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
267
+
> Here's the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
270
268
>
271
269
> If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
272
270
@@ -380,10 +378,12 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
380
378
> [!NOTE]
381
379
> Available in Defender for Endpoint version `101.04.76` or later.
382
380
383
-
### Exclusion Setting preferences [**PREVIEW**]
381
+
### Exclusion setting preferences
382
+
383
+
**Exlusion setting preferences are currently in preview**.
384
384
385
385
> [!NOTE]
386
-
> Available in Defender for Endpoint version `101.23092.0012` or later.
386
+
> Available in Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring.
387
387
388
388
The *exclusionSettings* section of the configuration profile is used to configure various exclusions for Microsoft Defender for Endpoint for Linux.
389
389
@@ -444,6 +444,7 @@ If nothing is specified in for an exclusion under *exclusionSettings* in managed
444
444
445
445
> [!NOTE]
446
446
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions will be (`epp`) since they were added under (`antivirusEngine`).
447
+
447
448
##### Path to excluded content
448
449
449
450
Used to exclude content from the scan by full file path.
@@ -457,7 +458,10 @@ Used to exclude content from the scan by full file path.
457
458
458
459
##### Path type (file / directory)
459
460
460
-
Indicates if the *path* property refers to a file or directory.
461
+
Indicates if the *path* property refers to a file or directory.
462
+
463
+
> [!NOTE]
464
+
> File path must already exist if adding file exclusion with global scope.
Copy file name to clipboardExpand all lines: defender-endpoint/mac-support-perf.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: macos
16
16
search.appverid: met150
17
-
ms.date: 05/29/2024
17
+
ms.date: 08/05/2024
18
18
---
19
19
20
20
# Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
@@ -85,7 +85,7 @@ To troubleshoot and mitigate performance issues, follow these steps:
85
85
4. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on macOS. Run the following command to enable it:
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
37
+
> The **Endpoint Security Policies** page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is available only for users who have access to all devices and possess `Core security settings (manage)` permissions. Any user role without these permissions, such as `Security Reader`, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
38
38
39
39
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal":::
0 commit comments