Skip to content

Commit 809e325

Browse files
committed
Merge branch 'WI402856-update-file-monitoring-m365-doc' of https://github.com/DeCohen/defender-docs-pr into WI402856-update-file-monitoring-m365-doc
2 parents 95c7c59 + c6267bf commit 809e325

File tree

5 files changed

+60
-39
lines changed

5 files changed

+60
-39
lines changed

ATPDocs/health-alerts.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,12 @@ This section describes all the health issues for each component, listing the cau
3939

4040
Sensor-specific health issues are displayed in the **Sensor health issues** tab and domain related or aggregated health issues are displayed in the **Global health issues** tab as detailed in the following tables:
4141

42+
### Network configuration mismatch for sensors running on VMware
43+
44+
|Alert|Description|Resolution|Severity|Displayed in|
45+
|----|----|----|----|----|
46+
|The virtual machines that the listed Defender for Identity sensors are installed on has a network configuration mismatch. This issue may affect the performance and reliability of the sensors.|Review the network interface settings, including disabling the Large Send Offload (LSO), and follow the instructions in [here](https://aka.ms/mdi/vmware-sensor-issue).|High|Sensors health issues tab|
47+
4248
### A domain controller is unreachable by a sensor
4349

4450
|Alert|Description|Resolution|Severity|Displayed in|

ATPDocs/troubleshooting-known-issues.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -224,7 +224,7 @@ Suggested possible workarounds:
224224

225225
## VMware virtual machine sensor issue
226226

227-
If you have a Defender for Identity sensor on VMware virtual machines, you might receive the health alert **Some network traffic is not being analyzed**. This can happen because of a configuration mismatch in VMware.
227+
If you have a Defender for Identity sensor on VMware virtual machines, you might receive one or both of the following health alerts **Some network traffic is not being analyzed** and **Network configuratuin mismatch for sensors running on VMware**. This can happen because of a configuration mismatch in VMware.
228228

229229
To resolve the issue:
230230

@@ -273,8 +273,6 @@ The domain controller hasn't been granted permission to retrieve the password of
273273

274274
Validate that the computer running the sensor has been granted permissions to retrieve the password of the gMSA account. For more information, see [Grant permissions to retrieve the gMSA account's password](deploy/create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password).
275275

276-
277-
278276
### Cause 2
279277

280278
The sensor service runs as *LocalService* and performs impersonation of the Directory Service account.
@@ -446,16 +444,16 @@ Ensure that the sensor can browse to \*.atp.azure.com directly or through the co
446444
For more information, see [Run a silent installation with a proxy configuration](install-sensor.md#run-a-silent-installation-with-a-proxy-configuration) and [Install the Microsoft Defender for Identity sensor](deploy/install-sensor.md).
447445
448446
> [!IMPORTANT]
449-
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that are not present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
447+
> Microsoft recommends that you use the most secure authentication flow available. The authentication flow described in this procedure requires a very high degree of trust in the application, and carries risks that aren't present in other flows. You should only use this flow when other more secure flows, such as managed identities, aren't viable.
450448
>
451449
452-
## Sensor service could not run and remains in Starting state
450+
## Sensor service couldn't run and remains in Starting state
453451
454452
The following errors will appear in the **System log** in **Event viewer**:
455453
456454
- The Open procedure for service ".NETFramework" in DLL "C:\Windows\system32\mscoree.dll" failed with error code Access is denied. Performance data for this service won't be available.
457-
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service will not be available.
458-
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device is not ready". Performance data for this service won't be available.
455+
- The Open procedure for service "Lsa" in DLL "C:\Windows\System32\Secur32.dll" failed with error code Access is denied. Performance data for this service won't be available.
456+
- The Open procedure for service "WmiApRpl" in DLL "C:\Windows\system32\wbem\wmiaprpl.dll" failed with error code "The device isn't ready". Performance data for this service won't be available.
459457
460458
The Microsoft.TriSensorError.log will contain an error similar to this:
461459

defender-endpoint/configure-endpoints-vdi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- tier2
1515
ms.custom: admindeeplinkDEFENDER
1616
ms.topic: conceptual
17-
ms.date: 03/04/2025
17+
ms.date: 03/11/2025
1818
ms.subservice: onboard
1919
---
2020

@@ -55,8 +55,8 @@ Defender for Endpoint supports non-persistent VDI session onboarding. There migh
5555
- In a VDI environment, VDI instances can have short lifespans. VDI devices can appear in the Microsoft Defender portal as either single entries for each VDI instance or multiple entries for each device.
5656

5757
- Single entry for each VDI instance. If the VDI instance was already onboarded to Microsoft Defender for Endpoint, and at some point deleted, and then recreated with the same host name, a new object representing this VDI instance is NOT be created in the portal. In this case, the *same* device name must be configured when the session is created, for example using an unattended answer file.
58-
5958
- Multiple entries for each device - one for each VDI instance.
59+
- For all VDI machines, when they onboard for the first time, there's a client delay of approximately 3-4 hours.
6060

6161
> [!IMPORTANT]
6262
> If you're deploying non-persistent VDIs through cloning technology, make sure that your internal template VMs are not onboarded to Defender for Endpoint. This recommendation is to avoid cloned VMs from being onboarded with the same senseGuid as your template VMs, which could prevent VMs from showing up as new entries in the Devices list.

defender-endpoint/linux-preferences.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 03/05/2025
9+
ms.date: 03/11/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -662,6 +662,20 @@ Determines whether module load events (file open events on shared libraries) are
662662
|**Possible values**|disabled (default) <p> enabled|*n/a*|
663663
|**Comments**|Available in Defender for Endpoint version `101.68.80` or later.||
664664

665+
#### Remediate Infected File feature
666+
667+
Determines whether infected processes that open or load any infected file will get remediated or not.
668+
669+
> [!NOTE]
670+
> When enabled the processes that open or load any infected file will be remediated in RTP mode. These processes will not appear in the threat list as these are not malicious but are only being terminated because they were loading the threat file in memory.
671+
672+
|Description|JSON Value|Defender Portal Value|
673+
|---|---|---|
674+
|**Key**|remediateInfectedFile|*Not available*|
675+
|**Data type**|String|*n/a*|
676+
|**Possible values**|disabled (default) <p> enabled|*n/a*|
677+
|**Comments**|Available in Defender for Endpoint version `101.24122.0001` or later.||
678+
665679
#### Supplementary sensor configurations
666680

667681
The following settings can be used to configure certain advanced supplementary sensor features.
@@ -963,7 +977,8 @@ The following configuration profile contains entries for all settings described
963977
"sendLowfiEvents":"disabled"
964978
},
965979
"ebpfSupplementaryEventProvider":"enabled",
966-
"offlineDefinitionUpdateVerifySig": "disabled"
980+
"offlineDefinitionUpdateVerifySig": "disabled",
981+
"remediateInfectedFile": "enabled"
967982
},
968983
"networkProtection":{
969984
"enforcementLevel":"disabled",

0 commit comments

Comments
 (0)