Skip to content

Commit 7ad8662

Browse files
authored
Merge pull request #1080 from MicrosoftDocs/main
Publish main to live, Monday 10:30AM PDT, 08/05
2 parents a5e0191 + a69fd9f commit 7ad8662

File tree

7 files changed

+82
-57
lines changed

7 files changed

+82
-57
lines changed

defender-endpoint/device-control-deploy-manage-intune.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo
44
author: siosulli
55
ms.author: siosulli
66
manager: deniseb
7-
ms.date: 07/25/2024
7+
ms.date: 07/30/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -80,7 +80,7 @@ You can add audit policies, and you can add Allow/Deny policies. It is recommend
8080
> If you only configure audit policies, the permissions are inherited from the default enforcement setting.
8181
8282
> [!NOTE]
83-
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to Deny, any allow policy results in blocking actions.
83+
> - The order in the which policies are listed in the user interface isn't preserved for policy enforcement. The best practice is to use **Allow/Deny policies**. Ensure that the **Allow/Deny policies** option is non-intersecting by explicitly adding devices to be excluded. Using Intune's graphical interface, you cannot change the default enforcement. If you change the default enforcement to `Deny`, and create an `Allow` policy to be applied specific devices, all devices are blocked except for any devices that are set in the `Allow` policy.
8484
8585
## Defining Settings with OMA-URI
8686

@@ -104,13 +104,13 @@ When you create policies with OMA-URI in Intune, create one XML file for each po
104104
In the **Add Row** pane, specify the following settings:
105105

106106
- In the **Name** field, type `Allow Read Activity`.
107-
- In the **OMA-URI** field, type `/Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`.
107+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyRules/%7b[PolicyRule Id]%7d/RuleData`. (You could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[PolicyRule Id]`.)
108108
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
109109

110110
You can use parameters to set conditions for specific entries. Here's a [group example XML file for Allow Read access for each removable storage](https://github.com/microsoft/mdatp-devicecontrol/blob/main/windows/device/Intune%20OMA-URI/Allow%20Read.xml).
111111

112112
> [!NOTE]
113-
> Comments using XML comment notation <!-- COMMENT --> can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
113+
> Comments using XML comment notation `<!-- COMMENT -->` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file.
114114
115115
### Creating groups with OMA-URI
116116

@@ -121,7 +121,7 @@ When you create groups with OMA-URI in Intune, create one XML file for each grou
121121
In the **Add Row** pane, specify the following settings:
122122

123123
- In the **Name** field, type `Any Removable Storage Group`.
124-
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b**[GroupId]**%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**.)
124+
- In the **OMA-URI** field, type `./Vendor/MSFT/Defender/Configuration/DeviceControl/PolicyGroups/%7b[GroupId]%7d/GroupData`. (To get your GroupID, in the Intune admin center, go to **Groups**, and then select **Copy the Object ID**. Or, you could use the PowerShell command `New-Guid` to generate a new Guid, and replace `[GroupId]`.)
125125
- In the **Data Type** field, select **String (XML file)**, and use **Custom XML**.
126126

127127
> [!NOTE]

defender-endpoint/linux-exclusions.md

Lines changed: 7 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Provide and validate exclusions for Microsoft Defender for Endpoint
44
ms.service: defender-endpoint
55
ms.author: dansimp
66
author: dansimp
7-
ms.reviewer: gopkr
7+
ms.reviewer: gopkr, ardeshmukh
88
ms.localizationpriority: medium
99
manager: deniseb
1010
audience: ITPro
@@ -15,21 +15,13 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/23/2024
18+
ms.date: 07/31/2024
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

25-
**In this article:**
26-
27-
1. [Supported exclusion scopes](#supported-exclusion-scopes)
28-
2. [Supported exclusion types](#supported-exclusion-types)
29-
3. [How to configure the list of exclusions](#how-to-configure-the-list-of-exclusions)
30-
4. [Validate exclusions lists with the EICAR test file](#validate-exclusions-lists-with-the-eicar-test-file)
31-
5. [Allow threats](#allow-threats)
32-
3325
**Applies to:**
3426

3527
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
@@ -41,7 +33,7 @@ ms.date: 07/23/2024
4133
This article provides information on how to define antivirus and global exclusions for Microsoft Defender for Endpoint. Antivirus exclusions apply to on-demand scans, real-time protection (RTP), and behavior monitoring (BM). Global exclusions apply to real-time protection (RTP), behavior monitoring (BM), and endpoint detection and response (EDR), thus stopping all the associated antivirus detections, EDR alerts, and visibility for the excluded item.
4234

4335
> [!IMPORTANT]
44-
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
36+
> The antivirus exclusions described in this article apply to only antivirus capabilities and not endpoint detection and response (EDR). Files that you exclude using the antivirus exclusions described in this article can still trigger EDR alerts and other detections. Whereas the global exclusions described in this section apply to antivirus as well as endpoint detection and response capabilities thus stopping all associated AV protection, EDR alerts and detection. Global exclusions are available from Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring. For EDR exclusions, [contact support](/microsoft-365/admin/get-help-support).
4537
4638
You can exclude certain files, folders, processes, and process-opened files from Defender for Endpoint on Linux.
4739

@@ -81,7 +73,8 @@ Process|A specific process (specified either by the full path or file name) and
8173
File, folder, and process exclusions support the following wildcards:
8274

8375
> [!NOTE]
84-
> Wildcards are not supported while configuring global exclusions.
76+
> File path needs to be present before adding or removing file exclusions with scope as global.
77+
> Wildcards are not supported while configuring global exclusions.
8578
8679
Wildcard|Description|Examples|
8780
---|---|---
@@ -114,7 +107,7 @@ mdatp exclusion
114107
115108
Examples:
116109

117-
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
110+
- Add an exclusion for a file extension *(Extension exclusion isn't supported for global exclusion scope)* :
118111

119112
```bash
120113
mdatp exclusion extension add --name .txt
@@ -132,7 +125,7 @@ Examples:
132125
Extension exclusion removed successfully
133126
```
134127

135-
- Add/Remove an exclusion for a file:
128+
- Add/Remove an exclusion for a file *(File path should already be present in case of adding or removing exclusion with global scope)* :
136129

137130
```bash
138131
mdatp exclusion file add --path /var/log/dummy.log --scope epp

defender-endpoint/linux-preferences.md

Lines changed: 16 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Set preferences for Microsoft Defender for Endpoint on Linux
3-
ms.reviewer: gopkr
3+
ms.reviewer: gopkr, ardeshmukh
44
description: Describes how to configure Microsoft Defender for Endpoint on Linux in enterprises.
55
ms.service: defender-endpoint
66
ms.author: dansimp
77
author: dansimp
88
ms.localizationpriority: medium
9-
ms.date: 07/23/2024
9+
ms.date: 07/31/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -79,7 +79,7 @@ Specifies the enforcement preference of antivirus engine. There are three values
7979
> Available in Defender for Endpoint version `101.10.72` or later. Default is changed from `real_time` to `passive` in Defender for Endpoint version `101.23062.0001` or later.
8080
> It is recommended to also use [scheduled scans](/defender-endpoint/linux-schedule-scan-mde) as per requirement.
8181
82-
#### Enable/disable behavior-monitoring
82+
#### Enable/disable behavior monitoring
8383

8484
Determines whether behavior monitoring and blocking capability is enabled on the device or not.
8585

@@ -136,9 +136,6 @@ Specifies the degree of parallelism for on-demand scans. This corresponds to the
136136
137137
#### Exclusion merge policy
138138

139-
> [!NOTE]
140-
> ExclusionSetting - you can use
141-
142139
Specifies the merge policy for exclusions. It can be a combination of administrator-defined and user-defined exclusions (`merge`) or only administrator-defined exclusions (`admin_only`). Administrator-defined (admin_only) are exclusions that are configured by Defender for Endpoint policy. This setting can be used to restrict local users from defining their own exclusions.
143140

144141
|Description|JSON Value|Defender Portal Value|
@@ -149,6 +146,7 @@ Specifies the merge policy for exclusions. It can be a combination of administra
149146

150147
> [!NOTE]
151148
> Available in Defender for Endpoint version `100.83.73` or later.
149+
> Can also configure exclusions under [exclusionSettings](#exclusion-setting-preferences)
152150
153151
#### Scan exclusions
154152

@@ -215,7 +213,7 @@ Specifies a process for which all file activity is excluded from scanning. The p
215213
|**Possible values**|any string|any string|
216214
|**Comments**|Applicable only if *$type* is *excludedFileName*|Accessed in *Configure instance* popup|
217215

218-
#### Muting Non Exec mounts
216+
#### Muting non-exec mounts
219217

220218
Specifies the behavior of RTP on mount point marked as noexec. There are two values for setting are:
221219

@@ -234,7 +232,7 @@ Specifies the behavior of RTP on mount point marked as noexec. There are two val
234232
> [!NOTE]
235233
> Available in Defender for Endpoint version `101.85.27` or later.
236234
237-
#### Unmonitor Filesystems
235+
#### Unmonitor filesystems
238236

239237
Configure filesystems to be unmonitored/excluded from real-time protection (RTP). The filesystems configured are validated against Microsoft Defender's list of permitted filesystems. Filesystems can only be monitored after successful validation. These configured unmonitored filesystems are still scanned by Quick, Full, and custom scans in Microsoft Defender Antivirus.
240238

@@ -266,7 +264,7 @@ To remove both NFS and Fuse from unmonitored list of filesystems, do the followi
266264
```
267265

268266
> [!NOTE]
269-
> Here;s the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
267+
> Here's the default list of monitored filesystems for RTP: `btrfs`, `ecryptfs`, `ext2`, `ext3`, `ext4`, `fuseblk`, `jfs`, `overlay`, `ramfs`, `reiserfs`, `tmpfs`, `vfat`, `xfs`.
270268
>
271269
> If any monitored filesystem needs to be added to the list of unmonitored filesystems,then it needs to be evaluated and enabled by Microsoft via cloud config. Following which customers can update managed_mdatp.json to unmonitor that filesystem.
272270
@@ -380,10 +378,12 @@ Specify the maximum number of entries to keep in the scan history. Entries inclu
380378
> [!NOTE]
381379
> Available in Defender for Endpoint version `101.04.76` or later.
382380
383-
### Exclusion Setting preferences [**PREVIEW**]
381+
### Exclusion setting preferences
382+
383+
**Exlusion setting preferences are currently in preview**.
384384

385385
> [!NOTE]
386-
> Available in Defender for Endpoint version `101.23092.0012` or later.
386+
> Available in Defender for Endpoint version `101.23092.0012` or later till Insider Slow Ring.
387387
388388
The *exclusionSettings* section of the configuration profile is used to configure various exclusions for Microsoft Defender for Endpoint for Linux.
389389

@@ -444,6 +444,7 @@ If nothing is specified in for an exclusion under *exclusionSettings* in managed
444444

445445
> [!NOTE]
446446
> Previously applied exclusions using (`mdatp_managed.json`) or by CLI will remain unaffected. The scope for those exclusions will be (`epp`) since they were added under (`antivirusEngine`).
447+
447448
##### Path to excluded content
448449

449450
Used to exclude content from the scan by full file path.
@@ -457,7 +458,10 @@ Used to exclude content from the scan by full file path.
457458

458459
##### Path type (file / directory)
459460

460-
Indicates if the *path* property refers to a file or directory.
461+
Indicates if the *path* property refers to a file or directory.
462+
463+
> [!NOTE]
464+
> File path must already exist if adding file exclusion with global scope.
461465
462466
|Description|JSON Value|
463467
|---|---|

defender-endpoint/mac-support-perf.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: macos
1616
search.appverid: met150
17-
ms.date: 05/29/2024
17+
ms.date: 08/05/2024
1818
---
1919

2020
# Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS
@@ -85,7 +85,7 @@ To troubleshoot and mitigate performance issues, follow these steps:
8585
4. To find the applications that are triggering the most scans, you can use real-time statistics gathered by Defender for Endpoint on macOS. Run the following command to enable it:
8686

8787
```bash
88-
mdatp config real-time-protection-statistics --value enabled.
88+
mdatp config real-time-protection-statistics --value enabled
8989
```
9090

9191
> [!TIP]

defender-endpoint/manage-security-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: how-to
1414
search.appverid: met150
15-
ms.date: 06/25/2024
15+
ms.date: 08/05/2024
1616
---
1717

1818
# Manage endpoint security policies in Microsoft Defender for Endpoint
@@ -34,7 +34,7 @@ Use security policies to manage security settings on devices. As a Security Admi
3434
You'll find endpoint security policies under **Endpoints** > **Configuration management** > **Endpoint security policies**.
3535

3636
> [!NOTE]
37-
> The **Endpoint Security Policies** page in the Microsoft Defender portal is available only for [users with the Security Administrator role assigned](assign-portal-access.md). Any other user role, such as Security Reader, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
37+
> The **Endpoint Security Policies** page in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is available only for users who have access to all devices and possess `Core security settings (manage)` permissions. Any user role without these permissions, such as `Security Reader`, cannot access the portal. When a user has the required permissions to view policies in the Microsoft Defender portal, the data is presented based on Intune permissions. If the user is in scope for Intune role-based access control, it applies to the list of policies presented in the Microsoft Defender portal. We recommend granting security administrators with the [Intune built-in role, "Endpoint Security Manager"](/mem/intune/fundamentals/role-based-access-control#built-in-roles) to effectively align the level of permissions between Intune and the Microsoft Defender portal.
3838
3939
:::image type="content" source="./media/endpoint-security-policies.png" alt-text="Managing Endpoint security policies in the Microsoft Defender portal":::
4040

0 commit comments

Comments
 (0)