Skip to content

Commit 8e4bb4e

Browse files
committed
Merge branch 'main' into diannegali-cloudresponse
2 parents a7968ac + 3ab52fa commit 8e4bb4e

File tree

98 files changed

+1217
-815
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

98 files changed

+1217
-815
lines changed

.openpublishing.redirection.defender.json

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,11 +110,20 @@
110110
"redirect_url": "/defender-endpoint/mde-demonstration-amsi",
111111
"redirect_document_id": true
112112
},
113+
{
114+
"source_path": "defender-endpoint/manage-indicators.md",
115+
"redirect_url": "/defender-endpoint/indicators-overview",
116+
"redirect_document_id": true
117+
},
113118
{
114119
"source_path": "defender-endpoint/techniques-device-timeline.md",
115120
"redirect_url": "/defender-endpoint/device-timeline-event-flag#techniques-in-the-device-timeline",
116121
"redirect_document_id": true
117122
},
123+
{
124+
"source_path": "defender-endpoint/submissions-suppressions-exclusions.md",
125+
"redirect_url": "/defender-endpoint/navigate-defender-endpoint-antivirus-exclusions",
126+
},
118127
{
119128
"source_path": "defender-endpoint/linux-support-rhel.md",
120129
"redirect_url": "/defender-endpoint/comprehensive-guidance-on-linux-deployment",
@@ -131,4 +140,4 @@
131140
"redirect_document_id": false
132141
}
133142
]
134-
}
143+
}

defender-endpoint/TOC.yml

Lines changed: 28 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -200,25 +200,25 @@
200200
href: mac-install-manually.md
201201
- name: Configure Defender for Endpoint on macOS
202202
items:
203-
- name: Configure and validate exclusions
203+
- name: Configure and validate exclusions on Mac
204204
href: mac-exclusions.md
205-
- name: Set preferences
205+
- name: Set preferences on Mac
206206
href: mac-preferences.md
207-
- name: Detect and block Potentially Unwanted Applications
207+
- name: Detect and block potentially unwanted applications on Mac
208208
href: mac-pua.md
209209
- name: Protect macOS security settings using tamper protection
210210
href: tamperprotection-macos.md
211211
- name: Device control
212212
items:
213-
- name: Device control overview
213+
- name: Device control overview on Mac
214214
href: mac-device-control-overview.md
215215
- name: JAMF examples
216216
href: mac-device-control-jamf.md
217217
- name: Intune examples
218218
href: mac-device-control-intune.md
219219
- name: macOS Device Control frequently asked questions (FAQ)
220220
href: mac-device-control-faq.md
221-
- name: Schedule scans
221+
- name: Schedule scans on Mac
222222
href: mac-schedule-scan.md
223223
- name: Update Defender for Endpoint on macOS
224224
href: mac-updates.md
@@ -271,7 +271,7 @@
271271
href: mde-linux-deployment-on-sap.md
272272
- name: Configure Defender for Endpoint on Linux
273273
items:
274-
- name: Configure and validate exclusions
274+
- name: Configure and validate exclusions on Linux
275275
href: linux-exclusions.md
276276
- name: Static proxy configuration
277277
href: linux-static-proxy-configuration.md
@@ -350,29 +350,28 @@
350350
href: machine-groups.md
351351
- name: Create and manage device tags
352352
href: machine-tags.md
353-
- name: Rules and Exclusions
353+
- name: Rules and exclusions
354354
items:
355355
- name: Exclusions overview
356356
href: navigate-defender-endpoint-antivirus-exclusions.md
357-
- name: Using submissions, suppressions and exclusions
358-
href: submissions-suppressions-exclusions.md
359357
- name: Manage suppression rules
360358
href: manage-suppression-rules.md
361-
- name: Create indicators
362-
href: manage-indicators.md
359+
- name: Indicators
363360
items:
364-
- name: Create indicators for files
365-
href: indicator-file.md
366-
- name: Create indicators for IPs and URLs/domains
367-
href: indicator-ip-domain.md
368-
- name: Create indicators for certificates
369-
href: indicator-certificates.md
370-
- name: Manage indicators
371-
href: indicator-manage.md
372-
- name: Manage automation file uploads
373-
href: manage-automation-file-uploads.md
374-
- name: Manage automation folder exclusions
375-
href: manage-automation-folder-exclusions.md
361+
- name: Overview of indicators
362+
href: indicators-overview.md
363+
- name: Create indicators for files
364+
href: indicator-file.md
365+
- name: Create indicators for IPs and URLs/domains
366+
href: indicator-ip-domain.md
367+
- name: Create indicators for certificates
368+
href: indicator-certificates.md
369+
- name: Manage indicators
370+
href: indicator-manage.md
371+
- name: Manage automation file uploads
372+
href: manage-automation-file-uploads.md
373+
- name: Manage automation folder exclusions
374+
href: manage-automation-folder-exclusions.md
376375

377376
- name: Device management
378377
items:
@@ -392,6 +391,10 @@
392391

393392
- name: Safeguard and manage your environment
394393
items:
394+
- name: Managing exclusions reference
395+
href: managing-exclusions.md
396+
- name: Address unwanted behaviors with exclusions, indicators, and other techniques
397+
href: address-unwanted-behaviors-mde.md
395398
- name: Safe deployment practices
396399
href: mde-sdp-strategy.md
397400

@@ -712,6 +715,8 @@
712715
href: microsoft-defender-antivirus-on-windows-server.md
713716
- name: Enable and update Microsoft Defender Antivirus on Windows Server
714717
href: enable-update-mdav-to-latest-ws.md
718+
- name: Microsoft Defender Antivirus in the Windows Security app
719+
href: microsoft-defender-security-center-antivirus.md
715720
- name: Better together - Microsoft Defender Antivirus and Microsoft Defender for Endpoint
716721
href: why-use-microsoft-defender-antivirus.md
717722
- name: Better together - Microsoft Defender Antivirus and Office 365
Lines changed: 156 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,156 @@
1+
---
2+
title: Address unwanted behaviors in Microsoft Defender for Endpoint with exclusions, indicators, and other techniques
3+
description: Learn how to use exclusions, indicators, and other techniques to address unwanted behaviors in Microsoft Defender for Endpoint.
4+
author: denisebmsft
5+
ms.author: deniseb
6+
manager: deniseb
7+
ms.date: 11/14/2024
8+
ms.topic: how-to
9+
ms.service: defender-endpoint
10+
ms.subservice: onboard
11+
ms.localizationpriority: medium
12+
ms.reviewer: joshbregman
13+
search.appverid: MET150
14+
f1.keywords: NOCSH
15+
audience: ITPro
16+
ms.custom:
17+
- partner-contribution
18+
ms.collection:
19+
- m365-security
20+
- tier2
21+
---
22+
23+
# Address unwanted behaviors in Microsoft Defender for Endpoint with exclusions, indicators, and other techniques
24+
25+
The primary function of Defender for Endpoint is to prevent and detect access to malicious processes and files. Defender for Endpoint is designed to allow people in your organization to be protected from threats while remaining productive by default security settings and policies. Occasionally, unwanted behaviors might occur, such as:
26+
27+
- **False positives**: A false positive is when an entity, such as a file or a process, was detected and identified as malicious, even though the entity isn't a threat
28+
- **Poor performance**: Applications experience performance issues when certain features of Defender for Endpoint are enabled
29+
- **Application incompatibility**: Applications don't function properly when certain features of Defender for Endpoint are enabled
30+
31+
This article describes how to address these types of unwanted behaviors and includes some example scenarios.
32+
33+
> [!NOTE]
34+
> Creating an indicator or an exclusion should only be considered after thoroughly understanding the root cause of the unexpected behavior.
35+
36+
## How to address unwanted behaviors with Defender for Endpoint
37+
38+
At a high level, the general process for addressing an unwanted behavior in Defender for Endpoint is as follows:
39+
40+
1. Identify which capability is causing the unwanted behavior. You need to know if there's a misconfiguration with Microsoft Defender Antivirus, endpoint detection and response, attack surface reduction, controlled folder access, and so on, in Defender for Endpoint. You can use information in the Microsoft Defender portal or on the device to make your determination.
41+
42+
| Location | What to do |
43+
|---|---|
44+
| The [Microsoft Defender portal](https://security.microsoft.com) | Take one or more of the following actions to help identify what's happening: <br/>- [Investigate alerts](alerts-queue.md) <br/>- [Use advanced hunting](/defender-xdr/advanced-hunting-overview) <br/>- [View reports](threat-protection-reports.md) |
45+
| On the device | Take one or more of the following steps to identify the issue: <br/>- [Use performance analyzer tools](tune-performance-defender-antivirus.md) <br/>- [Review event logs and error codes](troubleshoot-microsoft-defender-antivirus.yml) <br/>- [Check your protection history](microsoft-defender-security-center-antivirus.md) |
46+
47+
2. Depending on your findings from the previous step, you might take one or more of the following actions:
48+
49+
- [Suppress alerts in the Microsoft Defender portal](manage-suppression-rules.md)
50+
- [Define custom remediation actions](configure-remediation-microsoft-defender-antivirus.md)
51+
- [Submit a file to Microsoft for analysis](admin-submissions-mde.md)
52+
- [Define exclusions for Microsoft Defender Antivirus](configure-exclusions-microsoft-defender-antivirus.md)
53+
- [Create indicators for Defender for Endpoint](indicator-manage.md)
54+
55+
Keep in mind that tamper protection affects whether exclusions can be modified or added. See [What happens when tamper protection is turned on](prevent-changes-to-security-settings-with-tamper-protection.md#what-happens-when-tamper-protection-is-turned-on).
56+
57+
3. Verify that your changes have addressed the issue.
58+
59+
## Examples of unwanted behaviors
60+
61+
This section includes several example scenarios that can be addressed by using exclusions and indicators. For more information about exclusions, see [Exclusions overview](navigate-defender-endpoint-antivirus-exclusions.md).
62+
63+
### An app is detected by Microsoft Defender Antivirus when the application runs
64+
65+
In this scenario, whenever a user runs a certain application, the application is detected by Microsoft Defender Antivirus as a potential threat.
66+
67+
<!---**How to observe**: CONTENT NEEDED--->
68+
69+
**How to address**: Create an "allow" indicator for Microsoft Defender for Endpoint. For example, you can create an "allow" indicator for a file, such as an executable. See [Create indicators for files](indicator-file.md).
70+
71+
### A custom, self-signed app is detected by Microsoft Defender Antivirus when the application runs
72+
73+
In this scenario, a custom app is detected by Microsoft Defender Antivirus as a potential threat. The app is updated periodically and is self-signed.
74+
75+
**How to address**: Create "allow" indicators for certificates or files. See the following articles:
76+
77+
- [Create indicators based on certificates](indicator-certificates.md)
78+
- [Create indicators for files](indicator-file.md)
79+
80+
### A custom app accesses a set of file types that is detected as malicious when the application runs
81+
82+
In this scenario, a custom app accesses a set file types, and the set is detected as malicious by Microsoft Defender Antivirus whenever the application runs.
83+
84+
**How to observe**: When the application is running, it's detected by Microsoft Defender Antivirus as a behavior monitoring detection.
85+
86+
**How to address**: Define exclusions for Microsoft Defender Antivirus, such as a file or path exclusion that might include wildcards. Or define a custom file path exclusion. See the following articles:
87+
88+
- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
89+
- [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)
90+
91+
### An application is detected by Microsoft Defender Antivirus as a "behavior" detection
92+
93+
In this scenario, an application is detected by Microsoft Defender Antivirus because of certain behavior, even though the application isn't a threat.
94+
95+
**How to address**: Define a process exclusion. See the following articles:
96+
97+
- [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)
98+
- [Configure exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)
99+
100+
### An app is considered a potentially unwanted application (PUA)
101+
102+
In this scenario, an app is detected as PUA, and you want to allow it to run.
103+
104+
**How to address**: Define an exclusion for the app. See the following articles:
105+
106+
- [Exclude files from PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md#exclude-files-from-pua-protection)
107+
- [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)
108+
109+
### An app is blocked from writing to a protected folder
110+
111+
In this scenario, a legitimate app is blocked from writing to folders that are protected by controlled folder access.
112+
113+
**How to address**: Add the app to the "allowed" list for controlled folder access. See [Allow specific apps to make changes to controlled folders](customize-controlled-folders.md#allow-specific-apps-to-make-changes-to-controlled-folders).
114+
115+
### A third-party app is detected as malicious by Microsoft Defender Antivirus
116+
117+
In this scenario, a third-party app that isn't a threat is detected and identified as malicious by Microsoft Defender Antivirus.
118+
119+
**How to address**: Submit the app to Microsoft for analysis. See [How to submit a file to Microsoft for analysis](/defender-xdr/submission-guide#how-do-i-submit-a-file-to-microsoft-for-analysis).
120+
121+
### An app is incorrectly detected and identified as malicious by Defender for Endpoint
122+
123+
In this scenario, a legitimate app is detected and identified as malicious by an attack surface reduction rule in Defender for Endpoint. Whenever a user uses the app, the app and any downloaded content are blocked by the attack surface reduction rule, [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content).
124+
125+
<!---**How to observe**: CONTENT NEEDED--->
126+
127+
**How to address**:
128+
129+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Reports**. Under **Reports**, select **Security report**.
130+
131+
2. Scroll down to devices to find your attack surface reduction cards. For more information, see [attack surface reduction rules report](attack-surface-reduction-rules-report.md).
132+
133+
3. Use the information to identify the files and folder locations to be excluded.
134+
135+
4. Add exclusions. See [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
136+
137+
### Word templates that contain macros that launch other apps are blocked
138+
139+
In this scenario, whenever a user opens documents that were created by using Microsoft Word templates that contain macros and those macros launch other applications, the attack surface reduction rule [Block Win32 API calls from Office macros](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros) blocks Microsoft Word.
140+
141+
<!---**How to observe**: CONTENT NEEDED--->
142+
143+
**How to address**:
144+
145+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Reports**. Under **Reports**, select **Security report**.
146+
147+
2. Scroll down to devices to find your attack surface reduction cards. For more information, see [attack surface reduction rules report](attack-surface-reduction-rules-report.md).
148+
149+
3. Use the information to identify the files and folder locations to be excluded.
150+
151+
4. Add exclusions. See [Configure and validate exclusions based on file extension and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
152+
153+
## See also
154+
155+
- [Exclusions overview](navigate-defender-endpoint-antivirus-exclusions.md)
156+
- [Managing exclusions reference](managing-exclusions.md)

defender-endpoint/advanced-features.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: onboard
1616
search.appverid: met150
17-
ms.date: 06/21/2024
17+
ms.date: 10/17/2024
1818
---
1919

2020
# Configure advanced features in Defender for Endpoint
@@ -98,7 +98,7 @@ Turning on this feature allows you to create indicators for IP addresses, domain
9898

9999
To use this feature, devices must be running Windows 10 version 1709 or later, or Windows 11. They should also have network protection in block mode and version 4.18.1906.3 or later of the antimalware platform [see KB 4052623](https://go.microsoft.com/fwlink/?linkid=2099834).
100100

101-
For more information, see [Manage indicators](manage-indicators.md).
101+
For more information, see [Overview of indicators](indicators-overview.md).
102102

103103
> [!NOTE]
104104
> Network protection leverages reputation services that process requests in locations that might be outside of the location you've selected for your Defender for Endpoint data.

defender-endpoint/android-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ For more information about how to set up Defender for Endpoint on Android and Co
3838
> [!NOTE]
3939
> Defender for Endpoint on Android only supports creating custom indicators for IP addresses and URLs/domains.
4040
41-
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Manage indicators](manage-indicators.md).
41+
Defender for Endpoint on Android enables admins to configure custom indicators to support Android devices as well. For more information on how to configure custom indicators, see [Overview of indicators](indicators-overview.md).
4242

4343
## Configure web protection
4444

defender-endpoint/api/import-ti-indicators.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,5 +148,5 @@ Here's an example of the response.
148148

149149
## Related article
150150

151-
- [Manage indicators](../manage-indicators.md)
151+
- [Manage indicators](../indicators-overview.md)
152152
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/post-ti-indicator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -118,5 +118,5 @@ POST https://api.securitycenter.microsoft.com/api/indicators
118118

119119
## Related article
120120

121-
- [Manage indicators](../manage-indicators.md)
121+
- [Manage indicators](../indicators-overview.md)
122122
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../../includes/defender-mde-techcommunity.md)]

defender-endpoint/api/ti-indicator.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The indicator action types supported by the API are:
7878
- BlockAndRemediate
7979
- Warn (Defender for Cloud Apps only)
8080

81-
For more information on the description of the response action types, see [Create indicators](../manage-indicators.md).
81+
For more information on the description of the response action types, see [Create indicators](../indicators-overview.md).
8282

8383
> [!NOTE]
8484
>

0 commit comments

Comments
 (0)