Skip to content

Commit 86d0ae3

Browse files
authored
Merge pull request #3015 from MicrosoftDocs/main
publish main to live, 3:30 pm, 3/4/25
2 parents 5183a95 + 6c8d0a0 commit 86d0ae3

14 files changed

+139
-42
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -232,6 +232,8 @@
232232
href: mac-resources.md
233233
- name: Troubleshoot Microsoft Defender for Endpoint on macOS
234234
items:
235+
- name: Troubleshoot agent health issues
236+
href: mac-health-status.md
235237
- name: Troubleshooting mode on macOS
236238
href: mac-troubleshoot-mode.md
237239
- name: Troubleshoot macOS installation issues

defender-endpoint/api/get-assessment-browser-extensions.md

Lines changed: 4 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.topic: reference
1515
ms.subservice: reference
1616
ms.custom: api
1717
search.appverid: met150
18-
ms.date: 01/22/2025
18+
ms.date: 03/04/2025
1919
---
2020

2121
# Export browser extensions assessment per device
@@ -24,14 +24,9 @@ ms.date: 01/22/2025
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](../microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](../microsoft-defender-endpoint.md)
29-
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management)
30-
- [Microsoft Defender XDR](/defender-xdr)
31-
32-
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://go.microsoft.com/fwlink/p/?linkid=2225630&clcid=0x409&culture=en-us&country=us).
33-
34-
> Want to experience Microsoft Defender Vulnerability Management? Learn more about how you can sign up to the [Microsoft Defender Vulnerability Management public preview trial](/defender-vulnerability-management/get-defender-vulnerability-management).
27+
- [Microsoft Defender for Endpoint](/defender-endpoint/microsoft-defender-endpoint)
28+
- [Microsoft Defender Vulnerability Management](/defender-vulnerability-management/defender-vulnerability-management-capabilities#vulnerability-management-capabilities-for-endpoints) (add-on for Defender for Endpoint Plan 2 or the standalone version)
29+
- [Microsoft Defender for Cloud Plan 2](/azure/defender-for-cloud/defender-for-cloud-introduction)
3530

3631
Returns all known installed browser extensions and their details for all devices, on a per-device basis.
3732

defender-endpoint/api/get-live-response-result.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,8 @@ Before you can initiate a session on a device, make sure you fulfill the followi
6969

7070
- **Windows Server 2022**
7171

72+
- **Windows Server 2025**
73+
7274
## Permissions
7375

7476
One of the following permissions is required to call this API. To learn more,

defender-endpoint/api/initiate-autoir-investigation.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,13 @@ Your organization must have Defender for Endpoint (see [Minimum requirements for
4949

5050
Currently, AIR only supports the following OS versions:
5151

52-
- Windows Server 2019
53-
- Windows Server 2022
54-
- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441)) or later
55-
- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464/windows-10-update-kb4493464)) or later
56-
- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later
5752
- Windows 11
53+
- Windows 10, version [1803](/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later
54+
- Windows 10, version 1803 (OS Build 17134.704 with [KB4493464](https://support.microsoft.com/help/4493464/windows-10-update-kb4493464)) or later
55+
- Windows 10, version 1709 (OS Build 16299.1085 with [KB4493441](https://support.microsoft.com/help/4493441/windows-10-update-kb4493441)) or later
56+
- Windows Server 2025
57+
- Windows Server 2022
58+
- Windows Server 2019
5859

5960
## Permissions
6061

defender-endpoint/api/run-live-response.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,11 +85,15 @@ Before you can initiate a session on a device, make sure you fulfill the followi
8585
- Version 1809 (with [KB4537818](https://support.microsoft.com/help/4537818/windows-10-update-kb4537818))
8686

8787
- **Windows Server 2022**
88+
89+
- **Windows Server 2025**
90+
8891
- **macOS** [(requires other configuration profiles)](../microsoft-defender-endpoint-mac.md)
8992
- 13 (Ventura)
9093
- 12 (Monterey)
9194
- 11 (Big Sur)
92-
- **Linux**
95+
96+
- **Linux Server**
9397
- [Supported Linux server distributions and kernel versions](../microsoft-defender-endpoint-linux.md)
9498

9599
## Permissions
Lines changed: 94 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,94 @@
1+
---
2+
title: Troubleshoot agent health issues with Defender for Endpoint on Mac
3+
description: Investigate macOS Defender agent health issues
4+
author: emmwalshh
5+
ms.author: ewalsh
6+
ms.reviewer: lianx; joshbregman
7+
manager: deniseb
8+
ms.localizationpriority: medium
9+
audience: ITPro
10+
ms.service: defender-endpoint
11+
ms.subservice: macos
12+
ms.topic: troubleshooting-general
13+
ms.date: 03/04/2025
14+
ms.collection:
15+
- m365-security
16+
- tier3
17+
- mde-macos
18+
search.appverid: met150
19+
---
20+
21+
# Troubleshoot agent health issues
22+
23+
## Defender for Endpoint health status
24+
25+
The following table provides information about the values that are returned when you run the `mdatp health` command and their corresponding descriptions.
26+
27+
| Value | Description |
28+
|---|---|
29+
|`app_version` | Displays Microsoft Defender application version.|
30+
|`automatic_definition_update_enabled`|`True` if automatic antivirus definition updates are enabled; otherwise, `false`.|
31+
|`cloud_automatic_sample_submission_consent`|Current sample submission level. <br/><br/>Can have one of the following values: <br/>- **None**: No suspicious samples are submitted to Microsoft.<br/>- **safe**: Only suspicious samples that don't contain personal data are submitted automatically. This value is the default value for this setting.<br/>- **All**: All suspicious samples are submitted to Microsoft.|
32+
|`cloud_diagnostic_enabled`|`True` if optional diagnostic data collection is enabled; otherwise, `false`. <br/><br/>For more information related to Defender for Endpoint and other products and services like Microsoft Defender Antivirus and Windows, see [Microsoft Privacy Statement](https://go.microsoft.com/fwlink/?linkid=827576).|
33+
|`cloud_enabled`|`True` if cloud-delivered protection is enabled; otherwise, `false`.|
34+
|`cloud_pin_certificate_thumbs`| pinned cloud certificate's thumbprints. |
35+
|`conflicting_applications`|List of applications that are possibly conflicting with Microsoft Defender for Endpoint. This list includes, but isn't limited to, other security products and other applications known to cause compatibility issues.|
36+
|`data_loss_prevention_status`|Status of data loss prevention. Can have one of the following values: <br/>- **unknown**<br/>- **unsupported_os**<br/>- **unsupported_os_version**<br/>- **disabled**<br/>- **unhealthy**<br/>- **dormant**<br/>- **ready**<br/>- **active**|
37+
|`definitions_status`|Status of antivirus definitions. Can have one of the following values: <br/>- **up_to_date**<br/>- **updating**<br/>- **unavailable**|
38+
|`definitions_updated`|Date and time of last antivirus definition update.|
39+
|`definitions_updated_minutes_ago`|Number of minutes since last antivirus definition update.|
40+
|`definitions_version`|Antivirus definition version.|
41+
|`edr_client_version`|Version of the EDR client running on the device.|
42+
|`device_control_enforcement_level`| Device control activation statue. |
43+
|`edr_configuration_version`|EDR configuration version.|
44+
|`edr_device_tags`|List of tags associated with the device.|
45+
|`edr_early_preview_enabled`|Setting of EDR early preview. Can have one of the following values: <br/>- **disabled** <br/>- **enabled**|
46+
|`edr_group_ids`|Group ID that the device is associated with.|
47+
|`edr_machine_id`|Device identifier used in the Microsoft Defender portal.|
48+
|`engine_load_status`|Status of antivirus engine to determine whether it's running. <br/><br/>Can have one of the following values: <br/>- **Engine not loaded** - antivirus engine process is down<br/>- **Engine load succeeded** - antivirus engine process is up and running|
49+
|`engine_version`|Version of the antivirus engine.|
50+
|`healthy`|`True` if the product is healthy; otherwise, `false`.|
51+
|`health_issues`|Lists health issues if any.|
52+
|`licensed`|`True` if the device is onboarded to a tenant; otherwise, `false`.|
53+
|`log_level`|Current log level for the product. <br/><br/>Can have one of the following values: <br/>- **info** <br/>- **debug**|
54+
|`machine_guid`|Unique machine identifier used by the antivirus component.|
55+
|`network_protection_enforcement_level`|Mode of network protection. <br/><br/>Can have one of the following values: <br/>- **disabled** - all components associated with network protection are disabled<br/>- **block** - network protection prevents connection to malicious websites<br/>- **audit** - Check how blocks occur|
56+
|`network_protection_status`|Status of the network protection component (macOS only).<br/><br/> Can have one of the following values: <br/>- **starting** - Network protection is starting<br/>- **failed_to_start** - Network protection couldn't be started due to an error<br/>- **started** - Network protection is running on the device<br/>- **restarting** - Network protection is restarting<br/>- **stopping** - Network protection is stopping<br/>- **stopped** - Network protection isn't running|
57+
|`org_id`|Organization that the device is onboarded to. If the device isn't yet onboarded to any organization, it shows as `unavailable`. For more information on onboarding, see [Onboard to Microsoft Defender for Endpoint](onboarding.md).|
58+
|`passive_mode_enabled`|`True` if the antivirus component is set to run in passive mode; otherwise, `false`.|
59+
|`product_expiration`|Date and time when the current product version reaches end of support.|
60+
|`real_time_protection_available`|`True` if the real-time protection component is healthy; otherwise, `false`.|
61+
|`real_time_protection_enabled`|`True` if real-time antivirus protection is enabled; otherwise, `false`. |
62+
|`real_time_protection_subsystem`|Subsystem used to serve real-time protection. If real-time protection isn't operating as expected, it shows as `unavailable`.|
63+
|`release_ring`|Release ring. For more information, see [Deployment rings](onboarding.md).|
64+
|`tamper_protection`| Status of tamper protection feature. <br/><br/>Can have one of the following values: <br/>- **disabled** - tamper protection is off.<br/>- **audit** - tamper protection is on but doesn't block any event.<br/>- **block** - tamper protection is monitoring events and block them as needed. |
65+
|`troubleshooting_mode`| `True` if Defender for Endpoint is in troubleshooting mode; otherwise, `false`. see [Troubleshooting mode](mac-troubleshoot-mode.md).|
66+
67+
## Component specific health
68+
69+
You can get more detailed health information for different features in Defender for Endpoint by using the command, `mdatp health --details <feature>`. Here are some examples:
70+
71+
```bash
72+
73+
mdatp health --details permissions
74+
75+
mdatp health --details system_extensions
76+
77+
mdatp health --details edr
78+
79+
mdatp health --details definitions
80+
81+
mdatp health --details help
82+
83+
```
84+
85+
You can run `mdatp health --help` on recent versions to list all supported features.
86+
87+
## See also
88+
89+
- [What's new in Microsoft Defender for Endpoint on Mac](mac-whatsnew.md)
90+
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
91+
92+
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
93+
94+

defender-endpoint/respond-file-alerts.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 06/26/2024
17+
ms.date: 03/04/2025
1818
---
1919

2020
# Take response actions on a file
@@ -200,7 +200,8 @@ This feature doesn't work if sample submission is turned off. If automatic sampl
200200
> - Antivirus engine version is 1.1.17300.4 or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
201201
> - Cloud–based protection is enabled. See [Turn on cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)
202202
> - Sample submission is turned on
203-
> - Devices have Windows 10 version 1703 or later, or Windows server 2016 or 2019, or Windows Server 2022, or Windows 11
203+
> - Client devices must be running Windows 11 or Windows 10, version 1703 or later
204+
> - Server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, or Windows Server 2016
204205
205206
### Collect files
206207

defender-endpoint/respond-machine-alerts.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
ms.author: diannegali
66
author: diannegali
77
ms.localizationpriority: medium
8-
ms.date: 12/03/2024
8+
ms.date: 03/04/2025
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -211,7 +211,7 @@ Depending on the severity of the attack and the sensitivity of the device, you m
211211
**Important points to keep in mind**:
212212

213213
- Isolating devices from the network is supported for macOS for client version 101.98.84 and above. You can also use live response to run the action. For more information on live response, see [Investigate entities on devices using live response](live-response.md)
214-
- Full isolation is available for devices running Windows 11, Windows 10, version 1703 or later, Windows Server 2022, Windows Server 2019, Windows Server 2016 and Windows Server 2012 R2.
214+
- Full isolation is available for devices running Windows 11, Windows 10, version 1703 or later, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016 and Windows Server 2012 R2.
215215
- You can use the device isolation capability on all supported Microsoft Defender for Endpoint on Linux listed in [System requirements](microsoft-defender-endpoint-linux.md#system-requirements). Ensure that the following prerequisites are enabled:
216216
- `iptables`
217217
- `ip6tables`

defender-endpoint/sandbox-mdav.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,8 @@ Microsoft Defender Antivirus with its built-in antivirus capabilities can run wi
4444
Before you begin, you must meet the following requirements:
4545

4646
- Microsoft Defender Antivirus (active mode)
47-
- Windows 11 or Windows 10 version 1703 or newer
48-
- Windows Server 2022 or Windows Server 2019 or Windows Server 2016 or newer
47+
- Windows client devices must be running Windows 11 or Windows 10 version 1703 or newer
48+
- Windows server devices must be running Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016
4949

5050
## Why run Microsoft Defender Antivirus in a sandbox?
5151

defender-endpoint/switch-to-mde-phase-2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ The specific exclusions to configure depend on which version of Windows your end
160160
| OS |Exclusions |
161161
|:--|:--|
162162
|[Windows 11](/windows/whats-new/windows-11-overview) <br/><br/>Windows 10, [version 1803](/lifecycle/announcements/windows-server-1803-end-of-servicing) or later (See [Windows 10 release information](/windows/release-health/release-information))<br/><br/>Windows 10, version 1703 or 1709 with [KB4493441](https://support.microsoft.com/help/4493441) installed |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCM.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseNdr.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\Classification\SenseCE.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseTVM.exe`|
163-
|[Windows Server 2022](/windows/release-health/status-windows-server-2022)<br/><br/>[Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019) <br/><br/>[Windows Server 2016](/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/><br/>[Windows Server 2012 R2](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows Server, version 1803](/windows-server/get-started/whats-new-in-windows-server-1803) | On Windows Server 2012 R2 and Windows Server 2016 running the [modern, unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution), the following exclusions are required after updating the Sense EDR component using [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac):<br/> <br/> `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\MsSense.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCnCProxy.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseIR.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCE.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseSampleUploader.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCM.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseTVM.exe` |
163+
|Windows Server 2025 <br/>[Windows Server 2022](/windows/release-health/status-windows-server-2022)<br/><br/>[Windows Server 2019](/windows/release-health/status-windows-10-1809-and-windows-server-2019) <br/><br/>[Windows Server 2016](/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/><br/>[Windows Server 2012 R2](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows Server, version 1803](/windows-server/get-started/whats-new-in-windows-server-1803) | On Windows Server 2012 R2 and Windows Server 2016 running the [modern, unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution), the following exclusions are required after updating the Sense EDR component using [KB5005292](https://support.microsoft.com/topic/microsoft-defender-for-endpoint-update-for-edr-sensor-f8f69773-f17f-420f-91f4-a8e5167284ac):<br/> <br/> `C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\MsSense.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCnCProxy.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseIR.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCE.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseSampleUploader.exe`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseCM.exe` <br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\DataCollection`<br/><br/>`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Platform\*\SenseTVM.exe` |
164164
|[Windows 8.1](/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/><br/>[Windows 7](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)<br/><br/>[Windows Server 2008 R2 SP1](/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`<br/><br/>**NOTE**: Monitoring Host Temporary Files 6\45 can be different numbered subfolders.<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` |
165165

166166
> [!IMPORTANT]

0 commit comments

Comments
 (0)