Skip to content

Commit 7fecc92

Browse files
Merge pull request #2849 from MicrosoftDocs/main
Publish main to live, 02/19/25, 3:30 PM PT
2 parents 8372347 + 2558cab commit 7fecc92

9 files changed

+339
-194
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@
6666
- name: Evaluate Microsoft Defender Antivirus
6767
href: evaluate-microsoft-defender-antivirus.md
6868
items:
69+
- name: Guidance for pen testing and BAS scenarios
70+
href: guidance-for-pen-testing-and-bas.md
6971
- name: Evaluate Microsoft Defender Antivirus using PowerShell
7072
href: microsoft-defender-antivirus-using-powershell.md
7173
- name: Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management

defender-endpoint/api/device-health-export-antivirus-health-report-api.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
ms.author: deniseb
66
author: denisebmsft
77
ms.localizationpriority: medium
8-
ms.date: 06/25/2024
8+
ms.date: 02/19/2025
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -24,8 +24,8 @@ search.appverid: met150
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](../microsoft-defender-endpoint.md)
2827
- [Microsoft Defender for Endpoint Plan 2](../microsoft-defender-endpoint.md)
28+
2929
- [Microsoft Defender XDR](/defender-xdr)
3030

3131
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)

defender-endpoint/configure-notifications-microsoft-defender-antivirus.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ author: emmwalshh
88
ms.topic: conceptual
99
ms.author: ewalsh
1010
ms.custom: nextgen
11-
ms.date: 10/18/2021
11+
ms.date: 02/19/2025
1212
ms.reviewer: yongrhee
1313
manager: deniseb
1414
ms.collection:
@@ -31,12 +31,27 @@ search.appverid: met150
3131

3232
In Windows 10 and Windows 11, application notifications about malware detection and remediation are more robust, consistent, and concise. Microsoft Defender Antivirus notifications appear on endpoints when scans are completed and threats are detected. Notifications follow both scheduled and manually triggered scans. These notifications also appear in the **Notification Center**, and a summary of scans and threat detections appear at regular time intervals.
3333

34-
If you're part of your organization's security team, you can configure how notifications appear on endpoints, such as notifications that prompt for a system reboot or that indicate a threat has been detected and remediated.
34+
If you're part of your organization's security team, you can configure how notifications appear on endpoints, such as notifications that prompt for a system reboot or that indicate a threat was detected and remediated.
3535

3636
## Configure antivirus notifications using Group Policy or the Windows Security app
3737

3838
You can configure the display of more notifications, such as recent threat detection summaries, in the [Windows Security app](microsoft-defender-security-center-antivirus.md) and with Group Policy.
3939

40+
41+
| Setting| Description |
42+
| -------- | -------- |
43+
| Configure time interval for service health reports | This policy setting configures the time interval (in minutes) for the service health reports to be sent from endpoints. If you disable or don't configure this setting, the default value is applied. The default value is set at 60 minutes (1 hour). If you configure this setting to 0, no service health reports are sent. The maximum value allowed to be set is 14400 minutes (10 days). |
44+
| Configure time out for detections in critically failed state | This policy setting configures the time in minutes before a detection in the "critically failed" state to moves to either the "additional action" state or the "cleared" state. |
45+
| Configure time out for detections in noncritical failed state | This policy setting configures the time in minutes before a detection in the "non-critically failed" state moves to the "cleared" state. |
46+
| Configure time out for detections in recently remediated state | This policy setting configures the time in minutes before a detection in the "completed" state moves to the "cleared" state. |
47+
| Configure time out for detections in requiring additional action | This policy setting configures the time in minutes before a detection in the "additional action" state moves to the "cleared" state. |
48+
| Configure Watson events | This policy setting allows you to configure whether or not Watson events are sent. If you enable or don't configure this setting, Watson events are sent. If you disable this setting, Watson events aren't sent. |
49+
| Configure whether to report Dynamic Signature dropped events | This policy setting configures whether to report Dynamic Signature dropped events. If you don't configure this setting, the default value is applied. The default value is set to disabled (such events aren't reported). If you configure this setting to be enabled, Dynamic Signature dropped events are reported. If you configure this setting to disabled, Dynamic Signature dropped events aren't reported. |
50+
| Configure Windows software trace preprocessor components | This policy configures Windows software trace preprocessor (WPP Software Tracing) components. |
51+
| Configure WPP tracing level | This policy allows you to configure tracing levels for Windows software trace preprocessor (WPP Software Tracing). Tracing levels are defined as: 1 - Error 2 - Warning 3 - Info 4 - Debug |
52+
| Turn off enhanced notifications | Use this policy setting to specify if you want Microsoft Defender Antivirus enhanced notifications to display on clients. If you disable or do not configure this setting, Microsoft Defender Antivirus enhanced notifications will display on clients. If you enable this setting, Microsoft Defender Antivirus enhanced notifications will not display on clients. |
53+
54+
4055
> [!NOTE]
4156
> In Windows 10, version 1607 the feature was called **Enhanced notifications** and was configured under **Windows Settings** \> **Update & security** \> **Windows Defender**. In Group Policy settings for all versions of Windows 10 and Windows 11, the notification feature is called **Enhanced notifications**.
4257

defender-endpoint/device-health-microsoft-defender-antivirus-health.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: ewalsh
77
author: emmwalshh
88
ms.localizationpriority: medium
9-
ms.date: 02/11/2025
9+
ms.date: 02/19/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -23,9 +23,8 @@ ms.reviewer: mkaminska, yongrhee
2323
**Applies to:**
2424

2525
- [Microsoft Defender XDR](/defender-xdr)
26-
- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)
27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2826
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
27+
2928
- [Microsoft Defender for Business](/defender-business/mdb-overview)
3029

3130
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)

defender-endpoint/device-health-reports.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: ewalsh
77
author: emmwalshh
88
ms.localizationpriority: medium
9-
ms.date: 06/25/2024
9+
ms.date: 02/19/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -22,9 +22,8 @@ ms.reviewer: mkaminska
2222
**Applies to:**
2323

2424
- [Microsoft Defender XDR](/defender-xdr)
25-
- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2725
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26+
2827
- [Microsoft Defender for Business](/defender-business/mdb-overview)
2928

3029
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)

defender-endpoint/device-health-sensor-health-os.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,8 @@ ms.reviewer: mkaminska
2222
**Applies to:**
2323

2424
- [Microsoft Defender XDR](/defender-xdr)
25-
- [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2725
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26+
2827
- [Microsoft Defender for Business](/defender-business/mdb-overview)
2928

3029
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us)
@@ -34,7 +33,7 @@ The Device Health report provides information about the devices in your organiza
3433
> [!IMPORTANT]
3534
> For Windows Server 2012 R2 and Windows Server 2016 to appear in device health reports, these devices must be onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
3635
37-
In the Microsoft Defender portalnel, select **Reports**, and then open **Device health and compliance**.
36+
In the Microsoft Defender portal, select **Reports**, and then open **Device health and compliance**.
3837

3938
- The [**Sensor health & OS** tab](#sensor-health--os-tab) provides general operating system information, divided into three cards that display the following device attributes:
4039
- [Sensor health card](#sensor-health-card)
Lines changed: 128 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,128 @@
1+
---
2+
title: Guidance for pen testing and breach-and-attack-simulation (BAS) scenarios with Microsoft Defender for Endpoint
3+
description: This article provides guidance for conducting penetration testing and breach-and-attack simulation (BAS) scenarios using Microsoft Defender for Endpoint and Microsoft Defender Antivirus.
4+
ms.service: defender-endpoint
5+
ms.localizationpriority: medium
6+
ms.topic: conceptual
7+
author: emmwalshh
8+
ms.author: ewalsh
9+
ms.reviewer: yongrhee
10+
manager: deniseb
11+
ms.custom: nextgen
12+
ms.date: 02/19/2025
13+
ms.subservice: ngp
14+
ms.collection:
15+
- m365-security
16+
- tier2
17+
- mde-ngp
18+
search.appverid: met150
19+
---
20+
21+
# Guidance for penetration testing and breach-and-attack-simulation scenarios with Microsoft Defender for Endpoint
22+
23+
This article describes common challenges and potential misconfigurations that might arise during penetration testing (pen testing) or using breach and attack simulation (BAS) tools. This article also describes how to submit potential false negatives for investigation.
24+
25+
## Common challenges during pen testing
26+
27+
- Testing the current configuration of the environment, which might not be the optimal configuration for Microsoft Defender for Endpoint or Microsoft Defender Antivirus.
28+
29+
- Concerns about enabling [cloud protection](cloud-protection-microsoft-defender-antivirus.md), as it might proceed to cloud protection detonation if it doesn't find metadata. For more information about Microsoft Defender Antivirus and cloud protection, see [hybrid detection and protection](/defender-endpoint/adv-tech-of-mdav).
30+
31+
> [!NOTE]
32+
> If you're downloading multiple payloads and notice that Microsoft Defender Antivirus doesn't remediate some of the payloads, keep in mind that what's occurring might not be a true positive, and a non-Microsoft vendor might be showing a false positive. See [How to submit possible false negatives for investigation](#how-to-submit-possible-false-negatives-for-investigation) (in this article).
33+
34+
## Common misconfigurations of Microsoft Defender Antivirus during pen testing
35+
36+
It's common for penetration testers to disable features of Microsoft Defender Antivirus while executing their attack. Before doing so, confirm that the following settings are configured:
37+
38+
- [Tamper protection](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection) is enabled in block mode.
39+
40+
- Microsoft Defender Antivirus is running as the primary antivirus, and not in [passive mode](/defender-endpoint/microsoft-defender-antivirus-compatibility). If you're using non-Microsoft antivirus, we recommend uninstalling it during pen testing.
41+
42+
- [Platform update, engine update, and/or Security intelligence updates](/defender-endpoint/microsoft-defender-antivirus-updates) are up to date.
43+
44+
- [Real-time protection](configure-protection-features-microsoft-defender-antivirus.md) is enabled.
45+
46+
- [Behavior monitoring](/defender-endpoint/behavior-monitor) is enabled.
47+
48+
- Adding [antivirus exclusions](configure-exclusions-microsoft-defender-antivirus.md) to where the payload is, after the payload is copied. After you copy the payload to the device, remove the antivirus exclusion so that Microsoft Defender Antivirus can block detections during pen testing.
49+
50+
- Make sure that you don't have antivirus exclusions for your BAS tools, such as AttackIQ, Cymulate, SafeBreach, and others.
51+
52+
- [Cloud-delivered protection](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus) is enabled.
53+
54+
- [Cloud protection sample submission](/defender-endpoint/specify-cloud-protection-level-microsoft-defender-antivirus) is enabled.
55+
56+
- [Cloud protection network connection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is working.
57+
58+
- [Protection from potentially unwanted apps](/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus) (PUA) is enabled.
59+
60+
- [Attack surface reduction rules](/defender-endpoint/overview-attack-surface-reduction) (ASR rules) are set to block mode.
61+
62+
- [Network Protection](/defender-endpoint/enable-network-protection) is set to block mode.
63+
64+
- [Controlled Folder Access](/defender-endpoint/enable-controlled-folders) (CFA) is set to block mode.
65+
66+
It's important to get the settings correct. To resolve misconfiguration issues, use the following articles:
67+
68+
| OS | Management tool | Article |
69+
|--|--|--|
70+
| Windows | Microsoft Defender for Endpoint security settings management <br/>(*Recommended*) | [Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies)](evaluate-mda-using-mde-security-settings-management.md) |
71+
| Windows | Group Policy | [Evaluate Microsoft Defender Antivirus using Group Policy](evaluate-mdav-using-gp.md) |
72+
| Windows | PowerShell | [Evaluate Microsoft Defender Antivirus using PowerShell](microsoft-defender-antivirus-using-powershell.md) |
73+
| Mac | Jamf (or another tool) | [Set preferences for Microsoft Defender for Endpoint on macOS](mac-preferences.md) |
74+
| Linux | Configuration profile <br/> Defender for Endpoint security settings management | [Set preferences for Microsoft Defender for Endpoint on Linux](linux-preferences.md) |
75+
76+
## How to submit possible false negatives for investigation
77+
78+
### Step 1: Gather the Microsoft Defender for Endpoint diagnostic logs
79+
80+
#### Use the MDE Client Analyzer log
81+
82+
| Operating system | What to do |
83+
|--|--|
84+
| Windows | You can collect diagnostics logs by using [Live Response](/defender-endpoint/run-analyzer-windows) or [locally](/defender-endpoint/run-analyzer-windows). |
85+
| Mac | You can collect [locally](/defender-endpoint/run-analyzer-macos). |
86+
| Linux | You can collect using [Live Response](/defender-endpoint/run-analyzer-linux) or [locally](/defender-endpoint/run-analyzer-linux). |
87+
88+
#### Microsoft Defender Antivirus diagnostic data (MpSupport.cab)
89+
90+
| Operating system | What to do |
91+
|--|--|
92+
| Windows | 1. On the device, open Command Prompt as an administrator. <br/>2. Run the following command: [MpCmdRun.exe -getfiles](/defender-endpoint/collect-diagnostic-data). <br/><br/>You can also [collect the investigation package](/defender-endpoint/respond-machine-alerts#collect-investigation-package-from-devices) in the Microsoft Defender portal. |
93+
| Mac | 1. On the device, open Terminal (shell session). <br/>2. Run the following command: `mdatp log level set--level debug`. <br/>3. Run the following command: `sudo mdatp diagnostic create`. <br/><br/>For more information, see [Resources for Microsoft Defender for Endpoint on Mac](/defender-endpoint/mac-resources). |
94+
| Linux | 1. On the device, open Terminal (shell session). <br/>2. Run the following command: `mdatp log level set--level debug`. <br/>`sudo mdatp diagnostic create`. <br/><br/>For more information, see [Microsoft Defender for Endpoint on Linux resources](/defender-endpoint/linux-resources). |
95+
96+
### Step 2: Gather information
97+
98+
Ensure you have the following information ready
99+
100+
- **Microsoft Defender OrgID**. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Microsoft Defender XDR** > **Account** > **Org ID**.
101+
102+
- **Device ID**. In the [Microsoft Defender portal](https://security.microsoft.com), open the device page.
103+
104+
- Binary names.
105+
106+
- Start and end of when testing was done in `HH:MM:SS UTC` format.
107+
108+
- It would be highly beneficial if you could provide the steps to reproduce the issue, along with a sample of the payload.
109+
110+
### Step 3: Submit data to Microsoft as soon as possible
111+
112+
It's crucial to report to Microsoft as soon as possible. The advanced hunting telemetry data wraps around and overwrites itself after 30 days. You can use either the Microsoft Defender Security Intelligence (MDSI) portal or the Microsoft Defender portal to submit your files.
113+
114+
| Portal | Description |
115+
|--|--|
116+
| MDSI portal | The MDSI portal is a service provided by Microsoft Security Intelligence. It allows users to submit files for malware analysis. Microsoft security researchers analyze these files to determine if they're threats, unwanted applications, or normal files. The portal is used to report detection concerns to Microsoft Defender Research, submit files for analysis, and track the results of submissions.<br/><br/>This portal was formerly known as the Windows Defender Security Intelligence (WSDI). Because it currently supports Mac, Linux, and Android submissions, its name changed. |
117+
| Microsoft Defender portal | If you have a subscription to Microsoft Defender XDR, or your subscription includes Defender for Endpoint Plan 2, you can use the **Submissions** page in the Microsoft Defender portal. |
118+
119+
1. Submit the data you gathered during steps 1-2 by using either the MDSI portal or the Microsoft Defender portal.
120+
121+
- **MDSI portal**: Go to the [MDSI portal](https://www.microsoft.com/en-us/wdsi), and then select **Submit files**. Follow the guidance on the page.
122+
- **The Microsoft Defender portal**: See [Use admin submission for submitting files in Microsoft Defender for Endpoint](/defender-endpoint/admin-submissions-mde).
123+
124+
2. After you upload the files, note the `Submission ID` for your sample submission (for example, `7c6c214b-17d4-4703-860b-7f1e9da03f7f`).
125+
126+
3. Wait for an update. After Microsoft receives the sample, the file is investigated, and a determination is made. If Microsoft determines that the sample file is malicious, we take corrective action to prevent the malware from going undetected.
127+
128+
If you have questions, [contact support](/defender-endpoint/contact-support).

0 commit comments

Comments
 (0)