Skip to content

Commit 874b21a

Browse files
authored
Merge branch 'main' into poliveria-mdti-new-ux-09052024
2 parents 7c516dc + 63b6799 commit 874b21a

11 files changed

+61
-17
lines changed

defender-endpoint/edr-block-mode-faqs.yml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ metadata:
1515
- partner-contribution
1616
ms.topic: faq
1717
ms.collection: m365-security
18-
ms.date: 04/26/2024
18+
ms.date: 09/07/2024
1919

2020
title: Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)
2121
summary: |
@@ -38,14 +38,12 @@ sections:
3838
- question: |
3939
Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
4040
answer: |
41-
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) or by [automated investigation & remediation capabilities](automated-investigations.md) in block mode.
42-
43-
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product.
41+
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. However, there are scenarios where EDR in block mode might be beneficial, such as if Microsoft Defender Antivirus is misconfigured, or if [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) is not enabled. In such cases, EDR in block mode can automatically remediate detections like PUA.
4442
4543
- question: |
4644
Will EDR in block mode affect a user's antivirus protection?
4745
answer: |
48-
EDR in block mode does not affect third-party antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
46+
EDR in block mode does not affect non-Microsoft antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
4947
5048
- question: |
5149
Why do I need to keep Microsoft Defender Antivirus up to date?

defender-endpoint/schedule-antivirus-scans-group-policy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
author: siosulli
77
ms.author: siosulli
88
ms.custom: nextgen
9-
ms.date: 03/06/2023
9+
ms.date: 09/07/2024
1010
ms.reviewer: pauhijbr, ksarens
1111
manager: deniseb
1212
ms.subservice: ngp
@@ -80,7 +80,7 @@ For more information, see the [Manage when protection updates should be download
8080
| Location | Setting | Description | Default setting (if not configured) |
8181
|:---|:---|:---|:---|
8282
| Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never |
83-
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. |
83+
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) Note that if this setting is set to 0, daily quick scans do not run.| 2 a.m. |
8484

8585
## Group Policy settings for scheduling scans after protection updates
8686

@@ -97,4 +97,5 @@ For more information, see the [Manage when protection updates should be download
9797
> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
9898
> - [Configure Defender for Endpoint on Android features](android-configure.md)
9999
> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
100+
100101
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
224 KB
Loading

defender-for-iot/set-up-sites.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-for-iot
55
author: limwainstein
66
ms.author: lwainstein
77
ms.localizationpriority: medium
8-
ms.date: 06/26/2024
8+
ms.date: 08/26/2024
99
ms.topic: how-to
1010
---
1111

@@ -61,10 +61,12 @@ In this stage, you configure Defender for IoT to associate OT devices to the sit
6161

6262
Check each location, because Defender for IoT might list your OT devices in more than one suggested location. If this happens, select all of the suggested locations that include an identified OT device. You can select any number of locations. However, you can't edit the list of devices that appear at a specific location.
6363

64-
1. Review the devices and select the suggested sites to add. You might need to select more than one suggested site.
64+
1. Review the devices and select the suggested sites to associate with the site. You might need to select more than one suggested site.
6565

66-
:::image type="content" source="media/set-up-sites/site-security-associate-devices-new.png" alt-text="Screenshot showing the associate devices screen and the suggested list of OT devices per location in the site set-up page of Microsoft Defender for IoT in the Microsoft Defender portal.":::
66+
Use the **Group** column to check the ID for each suggested site. Sites with the same ID indicate that the devices are likely located at the same physical location. As these suggested sites are expected to belong to the same site, review and confirm that the devices listed are correct before making your selections and associating the suggested sites.
6767

68+
:::image type="content" source="media/set-up-sites/site-security-associate-group.png" alt-text="Screenshot showing the associate devices screen and the suggested list of OT devices per location with the Group column in the site set-up page of Microsoft Defender for IoT in the Microsoft Defender portal." lightbox="media/set-up-sites/site-security-associate-group.png":::
69+
6870
1. Select **Next** to review the site details.
6971

7072
## Review site details

defender-xdr/advanced-hunting-deviceevents-table.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceEvents
@@ -92,6 +92,16 @@ For information on other tables in the advanced hunting schema, [see the advance
9292
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9393
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9494
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
95+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
96+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
97+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
98+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
99+
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
100+
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
101+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process’s RDP session was initiated |
102+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process’s RDP session was initiated |
103+
104+
95105

96106
## Related topics
97107
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-devicefileevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceFileEvents
@@ -89,6 +89,11 @@ For information on other tables in the advanced hunting schema, [see the advance
8989
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9090
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9191
| `AdditionalFields` | `string` | Additional information about the entity or event |
92+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
93+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
94+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
95+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
96+
9297

9398
> [!NOTE]
9499
> File hash information will always be shown when it is available. However, there are several possible reasons why a SHA1, SHA256, or MD5 cannot be calculated. For instance, the file might be located in remote storage, locked by another process, compressed, or marked as virtual. In these scenarios, the file hash information appears empty.

defender-xdr/advanced-hunting-deviceimageloadevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceImageLoadEvents
@@ -73,6 +73,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7373
| `InitiatingProcessParentCreationTime` | `datetime` | Date and time when the parent of the process responsible for the event was started |
7474
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7575
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
76+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
77+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
78+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
79+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
80+
7681

7782
## Related topics
7883
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-devicelogonevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 01/16/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceLogonEvents
@@ -82,6 +82,11 @@ For information on other tables in the advanced hunting schema, [see the advance
8282
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
8383
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8484
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
85+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
86+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
87+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
88+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
89+
8590

8691
> [!NOTE]
8792
> The collection of DeviceLogonEvents is not supported on Windows 7 or Windows Server 2008R2 devices onboarded to Defender for Endpoint. We recommend upgrading to a more recent operating system for optimal visibility into user logon activity.

defender-xdr/advanced-hunting-devicenetworkevents-table.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceNetworkEvents
@@ -78,6 +78,11 @@ For information on other tables in the advanced hunting schema, [see the advance
7878
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
7979
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
8080
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
81+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
82+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
83+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
84+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
85+
8186

8287
## Related topics
8388
- [Advanced hunting overview](advanced-hunting-overview.md)

defender-xdr/advanced-hunting-deviceprocessevents-table.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
ms.topic: reference
18-
ms.date: 04/11/2024
18+
ms.date: 09/06/2024
1919
---
2020

2121
# DeviceProcessEvents
@@ -96,6 +96,14 @@ For information on other tables in the advanced hunting schema, [see the advance
9696
| `ReportId` | `long` | Event identifier based on a repeating counter. To identify unique events, this column must be used in conjunction with the DeviceName and Timestamp columns. |
9797
| `AppGuardContainerId` | `string` | Identifier for the virtualized container used by Application Guard to isolate browser activity |
9898
| `AdditionalFields` | `string` | Additional information about the event in JSON array format |
99+
| `InitiatingProcessSessionId` | `long` | Windows session ID of the initiating process |
100+
| `IsInitiatingProcessRemoteSession` | `bool` | Indicates whether the initiating process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
101+
| `InitiatingProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the initiating process’s RDP session was initiated |
102+
| `InitiatingProcessRemoteSessionIP` | `string` | IP address of the remote device from which the initiating process’s RDP session was initiated |
103+
| `CreatedProcessSessionId` | `long` | Windows session ID of the created process |
104+
|`IsProcessRemoteSession` | `bool` | Indicates whether the created process was run under a remote desktop protocol (RDP) session (true) or locally (false) |
105+
| `ProcessRemoteSessionDeviceName` | `string` | Device name of the remote device from which the created process’s RDP session was initiated |
106+
| `ProcessRemoteSessionIP` | `string` | IP address of the remote device from which the created process’s RDP session was initiated |
99107

100108

101109
## Related topics

0 commit comments

Comments
 (0)