Skip to content

Commit 81eb954

Browse files
authored
Merge branch 'main' into patch-1
2 parents 6e903fc + d53e3d3 commit 81eb954

File tree

144 files changed

+744
-854
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

144 files changed

+744
-854
lines changed

defender-endpoint/TOC.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -934,6 +934,11 @@
934934
antivirus windows defender antivirus
935935
- name: Troubleshoot performance issues related to real-time protection
936936
href: troubleshoot-performance-issues.md
937+
- name: Troubleshoot Microsoft Defender Antivirus performance issues with Process
938+
Monitor
939+
href: troubleshoot-av-performance-issues-with-procmon.md
940+
displayName: Troubleshoot Microsoft Defender Antivirus MDAV performance perf
941+
issues with Process Monitor ProcMon
937942
- name: Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus
938943
href: troubleshoot-microsoft-defender-antivirus.yml
939944
- name: Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution

defender-endpoint/adv-tech-of-mdav.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Advanced technologies at the core of Microsoft Defender Antivirus
33
description: Microsoft Defender Antivirus engines and advanced technologies
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: emmwalshh
5+
ms.author: ewalsh
6+
ms.reviewer: yongrhee
67
manager: deniseb
78
ms.service: defender-endpoint
89
ms.topic: overview

defender-endpoint/amsi-on-mdav.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: "Anti-malware Scan Interface (AMSI) integration with Microsoft Defender Antivirus"
33
description: Describes fileless malware and how Microsoft Defender Antivirus uses AMSI to protect against hidden threats.
4-
author: denisebmsft
5-
ms.author: deniseb
4+
author: emmwalshh
5+
ms.author: ewalsh
66
manager: deniseb
77
ms.reviewer: yongrhee
88
ms.date: 12/05/2024

defender-endpoint/analyzer-feedback.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,9 @@ description: Provide feedback on the Microsoft Defender for Endpoint client anal
44
ms.service: defender-endpoint
55
f1.keywords:
66
- NOCSH
7-
ms.author: deniseb
8-
author: denisebmsft
7+
ms.author: ewalsh
8+
author: emmwalshh
9+
ms.reviewer: yongrhee
910
ms.localizationpriority: medium
1011
manager: deniseb
1112
audience: ITPro

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 12/02/2024
18+
ms.date: 01/07/2025
1919
search.appverid: met150
2020
---
2121

@@ -51,7 +51,7 @@ Attack surface reduction rules are categorized as one of two types:
5151

5252
- **Standard protection rules**: Are the minimum set of rules which Microsoft recommends you always enable, while you're evaluating the effect and configuration needs of the other ASR rules. These rules typically have minimal-to-no noticeable impact on the end user.
5353

54-
- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md)
54+
- **Other rules**: Rules that require some measure of following the documented deployment steps [Plan > Test (audit) > Enable (block/warn modes)], as documented in the [Attack surface reduction rules deployment guide](attack-surface-reduction-rules-deployment.md).
5555

5656
For the easiest method to enable the standard protection rules, see: [Simplified standard protection option](attack-surface-reduction-rules-report.md#simplified-standard-protection-option).
5757

@@ -180,7 +180,7 @@ Toast notifications are generated for all rules in Block mode. Rules in any othe
180180

181181
For rules with the "Rule State" specified:
182182

183-
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High".
183+
- ASR rules with `\ASR Rule, Rule State\` combinations are used to surface alerts (toast notifications) on Microsoft Defender for Endpoint only for devices at cloud block level "High"
184184
- Devices that not at the high cloud block level don't generate alerts for any `ASR Rule, Rule State` combinations
185185
- EDR alerts are generated for ASR rules in the specified states, for devices at cloud block level "High+"
186186
- Toast notifications occur in block mode only and for devices at cloud block level "High"
@@ -320,7 +320,7 @@ Dependencies: Microsoft Defender Antivirus
320320
### Block credential stealing from the Windows local security authority subsystem
321321

322322
> [!NOTE]
323-
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
323+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled, this attack surface reduction rule is not required. For a more secure posture, we also recommend enabling [Credential Guard](/windows/security/identity-protection/credential-guard) with the LSA protection.
324324
325325
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326326

@@ -634,7 +634,7 @@ Dependencies: Microsoft Defender Antivirus
634634

635635
### Block Webshell creation for Servers
636636

637-
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, identifying potential targets etc.
637+
This rule blocks web shell script creation on Microsoft Server, Exchange Role. A web shell script is a specifically crafted script that allows an attacker to control the compromised server. A web shell may include functionalities such as receiving and executing malicious commands, downloading and executing malicious files, stealing and exfiltrating credentials and sensitive information, and identifying potential targets.
638638

639639
Intune name: `Block Webshell creation for Servers`
640640

defender-endpoint/behavior-monitor-macos.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Behavior Monitoring in Microsoft Defender Antivirus on macOS
33
description: Behavior Monitoring in Microsoft Defender Antivirus on macOS
4-
author: denisebmsft
5-
ms.author: deniseb
4+
author: emmwalshh
5+
ms.author: ewalsh
66
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview

defender-endpoint/behavior-monitor.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Behavior monitoring in Microsoft Defender Antivirus
33
description: Learn about Behavior monitoring in Microsoft Defender Antivirus and Defender for Endpoint.
4-
author: YongRhee-MSFT
5-
ms.author: yongrhee
4+
author: emmwalshh
5+
ms.author: ewalsh
6+
ms.reviewer: yongrhee
67
manager: deniseb
78
audience: ITPro
89
ms.topic: conceptual

defender-endpoint/built-in-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Built-in protection helps guard against ransomware
33
description: Learn how built-in protection protects against ransomware as part of Microsoft Defender for Endpoint.
44
search.appverid: MET150
5-
author: denisebmsft
6-
ms.author: deniseb
5+
author: emmwalshh
6+
ms.author: ewalsh
77
manager: deniseb
88
audience: IT Pro
99
ms.topic: overview

defender-endpoint/client-behavioral-blocking.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Client behavioral blocking
33
description: Client behavioral blocking is part of behavioral blocking and containment capabilities at Microsoft Defender for Endpoint
4-
author: denisebmsft
5-
ms.author: deniseb
4+
author: emmwalshh
5+
ms.author: ewalsh
66
manager: deniseb
77
ms.reviewer: shwetaj
88
audience: ITPro

defender-endpoint/cloud-protection-microsoft-antivirus-sample-submission.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Cloud protection and sample submission at Microsoft Defender Antivirus
33
description: Learn about cloud-delivered protection and Microsoft Defender Antivirus
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
author: denisebmsft
7-
ms.author: deniseb
6+
author: emmwalshh
7+
ms.author: ewalsh
88
ms.reviewer: mkaminska, yongrhee
99
manager: deniseb
1010
ms.subservice: ngp

0 commit comments

Comments
 (0)