You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-configure.md
+14-38Lines changed: 14 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,36 +61,32 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
61
61
62
62
1. In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
63
63
64
-
> [!div class="mx-imgBorder"]
65
-
> 
66
-
64
+
> [!div class="mx-imgBorder"]
67
65
1. Provide a name and description to uniquely identify the policy. Select **'Android Enterprise'** as the platform and **'Personally-owned work profile only'** as the profile type and **'Microsoft Defender'** as the Targeted app.
68
66
69
-
> [!div class="mx-imgBorder"]
70
-
> 
71
-
67
+
> [!div class="mx-imgBorder"]
68
+
> 
69
+
72
70
1. In Settings page, select **'Use configuration designer'** and add **'Enable Network Protection in Microsoft Defender'** as the key and value as **'1'** to enable Network Protection. (Network protection is disabled by default)
73
71
74
-
> [!div class="mx-imgBorder"]
75
-
> 
76
-
77
-
> [!div class="mx-imgBorder"]
78
-
> 
79
-
72
+
> [!div class="mx-imgBorder"]
73
+
> 
74
+
75
+
> [!div class="mx-imgBorder"]
76
+
> 
77
+
80
78
1. If your organization uses root CAs that are private, you must establish explicit trust between Intune (MDM solution) and user devices. Establishing trust helps prevent Defender from flagging root CAs as rogue certificates.
81
79
82
80
To establish trust for the root CAs, use **'Trusted CA certificate list for Network Protection'** as the key. In the value, add the **'comma separated list of certificate thumbprints (SHA 1)'**.
83
81
84
82
**Example of Thumbprint format to add**: `50 30 06 09 1d 97 d4 f5 ae 39 f7 cb e7 92 7d 7d 65 2d 34 31, 503006091d97d4f5ae39f7cbe7927d7d652d3431`
85
83
86
-
> [!IMPORTANT]
84
+
> [!IMPORTANT]
87
85
> Certificate SHA-1 Thumbprint characters should be with either white space separated, or non separated.
88
86
>
89
87
> This format is invalid: `50:30:06:09:1d:97:d4:f5:ae:39:f7:cb:e7:92:7d:7d:65:2d:34:31`
90
88
91
-
Any other separation characters are invalid.
92
-
93
-
> 
89
+
Any other separation characters are invalid.
94
90
95
91
1. For other configurations related to Network protection, add the following keys and appropriate corresponding value.
96
92
@@ -119,26 +115,6 @@ Network protection in Microsoft Defender for endpoint is disabled by default. Ad
119
115
120
116
> [!NOTE]
121
117
> Users need to enable location permission (which is an optional permission); this enables Defender for Endpoint to scan their networks and alert them when there are WIFI-related threats. If the location permission is denied by the user, Defender for Endpoint will only be able to provide limited protection against network threats and will only protect the users from rogue certificates.
122
-
123
-
## Configure Low Touch Onboarding
124
-
125
-
Admins can configure Microsoft Defender for Endpoint in low touch onboarding mode. In this scenario, administrators creates a deployment profile and the user is simply required to provide a reduced set of permissions to complete onboarding.
126
-
127
-
Android low touch onboarding is disabled by default. Admins can enable it through app configuration policies on Intune by following these steps:
128
-
129
-
1. Push the Defender app to target user group by following these [steps](android-intune.md#add-microsoft-defender-for-endpoint-on-android-as-a-managed-google-play-app).
130
-
2. Push a VPN profile to the user's device by following the instructions [here](android-intune.md#auto-setup-of-always-on-vpn).
131
-
3. In Apps > Application configuration policies, select Managed Devices.
132
-
4. Provide a name to uniquely identify the policy. Select 'Android Enterprise' as the Platform, the required Profile type and 'Microsoft Defender: Antivirus' as the targeted app. Click on Next.
133
-
5. Add runtime permissions. Select Location access (fine)(This permission is not supported for Android 13 and above), POST_NOTIFICATIONS and change the Permission state to 'Auto grant'.
134
-
6. Under configuration settings, select 'Use Configuration designer' and click on Add.
135
-
7. Select Low touch onboarding and User UPN. For User UPN, change the Value type to 'Variable' and Configuration value to 'User Principal Name' from the drop down Enable Low touch onboarding by changing the configuration value to 1.
136
-
>[!div class="mx-imgBorder"]
137
-
>
138
-
139
-
8. Assign the policy to the target user group.
140
-
9. Review and create the policy.
141
-
142
118
## Privacy Controls
143
119
144
120
Following privacy controls are available for configuring the data that is sent by Defender for Endpoint from Android devices:
@@ -347,11 +323,11 @@ Use the following steps to configure the Device tags:
347
323
5. Click Next and assign this policy to targeted devices and users.
348
324
349
325
350
-
> [!NOTE]
326
+
> [!NOTE]
351
327
> The Defender app needs to be opened for tags to be synced with Intune and passed to Security Portal. It may take up to 18 hours for tags to reflect in the portal.
352
-
353
328
## Related articles
354
329
355
330
-[Overview of Microsoft Defender for Endpoint on Android](microsoft-defender-endpoint-android.md)
331
+
356
332
-[Deploy Microsoft Defender for Endpoint on Android with Microsoft Intune](android-intune.md)
357
333
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
"description": "A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could impersonate a user request by crafting HTTP queries. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabilities in web services.To exploit the vulnerability, the user must click a specially crafted URL. In an email attack scenario, an attacker could send an email message containing the specially crafted URL to the user in an attempt to convince the user to click it.In a web-based attack scenario, an attacker could host a specially crafted website designed to appear as a legitimate website to the user. However, the attacker would have no way to force the user to visit the specially crafted website. The attacker would have to convince the user to visit the specially crafted website, typically by way of enticement in an email or instant message, and then convince the user to interact with content on the website.The update addresses the vulnerability by correcting how Microsoft Browsers parses HTTP responses.",
100
-
"severity": "Medium",
101
-
"cvssV3": 4.3,
97
+
"id": "CVE-2024-7256",
98
+
"name": "CVE-2024-7256",
99
+
"description": "Summary: Google Chrome is vulnerable to a security bypass due to insufficient data validation in Dawn. An attacker can exploit this vulnerability by tricking a user into visiting a malicious website, allowing them to bypass security restrictions. Impact: If successfully exploited, this vulnerability could allow a remote attacker to bypass security restrictions in Google Chrome. Remediation: Apply the latest patches and updates provided by the respective vendors. Generated by AI",
Copy file name to clipboardExpand all lines: defender-endpoint/api/vulnerability.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,5 +64,7 @@ exploitInKit|Boolean|Exploit is part of an exploit kit
64
64
exploitTypes|String collection|Exploit affect. Possible values are: **Local privilege escalation**, **Denial of service**, or **Local**
65
65
exploitUris|String collection|Exploit source URLs
66
66
CveSupportability| String collection| Possible values are: **Supported**, **Not Supported**, or **SupportedInPremium**
67
+
EPSS|Numeric| Represents the probability that a vulnerability will be exploited. This probability is expressed as a number between 0 and 1 (0%-100%) according to the EPSS model.
68
+
67
69
68
70
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]
# EDR detection test for verifying device's onboarding and reporting services
@@ -76,7 +76,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
76
76
77
77
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
78
78
79
-
<!---
80
79
### macOS
81
80
82
81
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,7 +128,6 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129
128
130
129
Look at the alert details and the device timeline, and perform the regular investigation steps.
Copy file name to clipboardExpand all lines: defender-endpoint/endpoint-attack-notifications.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: edr
16
16
search.appverid: met150
17
-
ms.date: 09/23/2022
17
+
ms.date: 08/15/2024
18
18
---
19
19
20
20
# Endpoint Attack Notifications
@@ -31,7 +31,7 @@ ms.date: 09/23/2022
31
31
> This covers threat hunting on your Microsoft Defender for Endpoint service. However, if you're interested to explore the service beyond your current license, and proactively hunt threats not just on endpoints but also across Office 365, cloud applications, and identity, refer to [Microsoft Defender Experts for Hunting](/defender-xdr/defender-experts-for-hunting).
32
32
33
33
> [!NOTE]
34
-
> Customers who signed up for Experts on Demand prior to sunset will have access to Ask Defender Experts until the expiration of their current contract.
34
+
> The intake of new customers to the Endpoint Attack Notifications service is currently on pause. For customers interested in a managed service, sign up the [Defender Experts service request form](https://aka.ms/IWantDefenderExperts).
35
35
36
36
Endpoint Attack Notifications (previously referred to as Microsoft Threat Experts - Targeted Attack Notification) provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyber-espionage. These notifications show up as a new alert. The managed hunting service includes:
Copy file name to clipboardExpand all lines: defender-endpoint/internet-facing-devices.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- tier2
14
14
ms.topic: conceptual
15
15
search.appverid: met150
16
-
ms.date: 07/10/2023
16
+
ms.date: 07/31/2024
17
17
---
18
18
19
19
# Internet-facing devices
@@ -64,6 +64,10 @@ You can use filters to focus in on internet-facing devices and investigate the r
64
64
65
65
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-filter.png" alt-text="Screenshot of the internet-facing filter" lightbox="/defender/media/defender-endpoint/internet-facing-filter.png":::
66
66
67
+
The internet-facing device tag also appears in Microsoft Defender Vulnerability Management. This allows you to filter for internet-facing devices from the [weaknesses](/defender-vulnerability-management/tvm-weaknesses) and the [security recommendations](/defender-vulnerability-management/tvm-security-recommendation) pages in the Microsoft Defender portal.
68
+
69
+
:::image type="content" source="/defender/media/defender-endpoint/internet-facing-weaknesses.png" alt-text="Screenshot of the internet-facing weaknesses" lightbox="/defender/media/defender-endpoint/internet-facing-weaknesses.png":::
70
+
67
71
> [!NOTE]
68
72
> If no new events for a device occur for 48 hours, the Internet-facing tag is removed and it will no longer be visible in the Microsoft Defender portal.
Copy file name to clipboardExpand all lines: defender-endpoint/linux-exclusions.md
+47-1Lines changed: 47 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,53 @@ For antivirus exclusions, when using the * wildcard at the end of the path, it w
88
88
89
89
### Using the management console
90
90
91
-
For more information on how to configure exclusions from Puppet, Ansible, or another management console, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
91
+
To configure exclusions from Puppet, Ansible, or another management console, please refer to the following sample `mdatp_managed.json`.
92
+
```JSON
93
+
{
94
+
"exclusionSettings":{
95
+
"exclusions":[
96
+
{
97
+
"$type":"excludedPath",
98
+
"isDirectory":true,
99
+
"path":"/home/*/git<EXAMPLE DO NOT USE>",
100
+
"scopes": [
101
+
"epp"
102
+
]
103
+
},
104
+
{
105
+
"$type":"excludedPath",
106
+
"isDirectory":true,
107
+
"path":"/run<EXAMPLE DO NOT USE>",
108
+
"scopes": [
109
+
"global"
110
+
]
111
+
},
112
+
{
113
+
"$type":"excludedPath",
114
+
"isDirectory":false,
115
+
"path":"/var/log/system.log<EXAMPLE DO NOT USE><EXCLUDED IN ALL SCENARIOS>",
116
+
"scopes": [
117
+
"epp", "global"
118
+
]
119
+
},
120
+
{
121
+
"$type":"excludedFileExtension",
122
+
"extension":".pdf<EXAMPLE DO NOT USE>",
123
+
"scopes": [
124
+
"epp"
125
+
]
126
+
},
127
+
{
128
+
"$type":"excludedFileName",
129
+
"name":"/bin/cat<EXAMPLE DO NOT USE><NO SCOPE PROVIDED - GLOBAL CONSIDERED>"
130
+
}
131
+
],
132
+
"mergePolicy":"admin_only"
133
+
}
134
+
}
135
+
```
136
+
137
+
For more information, see [Set preferences for Defender for Endpoint on Linux](linux-preferences.md).
0 commit comments