You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/android-whatsnew.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,18 +27,19 @@ ms.date: 11/15/2024
27
27
28
28
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
29
29
30
-
**Ending support for Device Administrator enrolled devices**
31
-
32
-
Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33
-
34
-
**For devices with access to GMS**
35
-
36
-
After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways:
37
-
38
-
- Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39
-
- Intune and Defender for Endpoint technical support will no longer support these devices.
30
+
> [!IMPORTANT]
31
+
> **Ending support for Device Administrator enrolled devices**
32
+
> Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33
+
>
34
+
> **For devices with access to GMS**
35
+
>
36
+
> After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways:
37
+
>
38
+
> - Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39
+
> - Intune and Defender for Endpoint technical support will no longer support these devices.
40
+
>
41
+
> For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
40
42
41
-
For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 11/10/2024
18
+
ms.date: 11/18/2024
19
19
search.appverid: met150
20
20
---
21
21
@@ -330,6 +330,11 @@ By default the state of this rule is set to block. In most cases, many processes
330
330
331
331
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
332
332
333
+
> [!TIP]
334
+
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
335
+
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It is also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled.
336
+
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode is not advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337
+
333
338
> [!NOTE]
334
339
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
335
340
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-device-connectivity.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,7 +173,7 @@ To test streamlined connectivity for devices not yet onboarded to Defender for E
173
173
174
174
- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.
175
175
176
-
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/BetaMDEAnalyzer
176
+
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/MDEClientAnalyzerPreview
Copy file name to clipboardExpand all lines: defender-endpoint/controlled-folders.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
3
3
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 11/06/2024
6
+
ms.date: 11/19/2024
7
7
author: denisebmsft
8
8
ms.author: deniseb
9
9
audience: ITPro
@@ -40,7 +40,7 @@ search.appverid: met150
40
40
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
41
41
42
42
> [!NOTE]
43
-
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](indicator-certificates.md).
43
+
> Scripting engines like PowerShell are not trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
44
44
45
45
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-exploit-protection.md
+69-4Lines changed: 69 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier2
16
16
- mde-asr
17
17
search.appverid: met150
18
-
ms.date: 11/15/2024
18
+
ms.date: 11/21/2024
19
19
---
20
20
21
21
# Evaluate exploit protection
@@ -37,7 +37,7 @@ In audit, you can see how mitigation works for certain apps in a test environmen
37
37
38
38
Exploit protection mitigations work at a low level in the operating system, and some kinds of software that perform similar low-level operations might have compatibility issues when they're configured to be protected by using exploit protection.
39
39
40
-
#### What kinds of Software shouldn't be protected by exploit protection?
40
+
#### What kinds of software shouldn't be protected by exploit protection?
41
41
42
42
- Anti-malware and intrusion prevention or detection software
43
43
- Debuggers
@@ -55,6 +55,40 @@ Services
55
55
- System services
56
56
- Network services
57
57
58
+
## Exploit protection mitigations enabled by default
59
+
60
+
| Mitigation | Enabled by default |
61
+
| -------- | -------- |
62
+
| Data Execution Prevention (DEP) | 64-bit and 32-bit applications |
Instead of using Exploit Protection for Office applications such as Outlook, Word, Excel, PowerPoint, and OneNote, consider using a more modern approach to prevent their misuse: Attack Surface Reduction rules (ASR rules):
79
+
80
+
-[Block executable content from email client and webmail ](attack-surface-reduction-rules-reference.md#block-executable-content-from-email-client-and-webmail)
81
+
-[Block Office applications from creating executable content](attack-surface-reduction-rules-reference.md#block-office-applications-from-creating-executable-content)
82
+
-[Block all Office applications from creating child processes](attack-surface-reduction-rules-reference.md#block-all-office-applications-from-creating-child-processes)
83
+
-[Block Office communication application from creating child processes](attack-surface-reduction-rules-reference.md#block-office-communication-application-from-creating-child-processes)
84
+
-[Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes)
85
+
-[Block execution of potentially obfuscated scripts](attack-surface-reduction-rules-reference.md#block-execution-of-potentially-obfuscated-scripts)
86
+
-[Block Win32 API calls from Office macros](attack-surface-reduction-rules-reference.md#block-win32-api-calls-from-office-macros)
87
+
88
+
For Adobe Reader use the following ASR rule:
89
+
90
+
• [Block Adobe Reader from creating child processes](attack-surface-reduction-rules-reference.md#block-adobe-reader-from-creating-child-processes)
91
+
58
92
## Application compatibility list
59
93
60
94
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
@@ -69,7 +103,7 @@ The following table lists specific products that have compatibility issues with
69
103
| DropBox | EAF |
70
104
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
71
105
| Google Chrome | EAF+ |
72
-
| Immidio Flex+ |Cell 4|
106
+
| Immidio Flex+ |EAF|
73
107
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
74
108
| Microsoft PowerPoint | EAF |
75
109
| Microsoft Teams | EAF+ |
@@ -82,7 +116,38 @@ The following table lists specific products that have compatibility issues with
82
116
83
117
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
84
118
85
-
## Enable exploit protection for testing
119
+
## Enable exploit protection system settings for testing
120
+
121
+
These Exploit Protection system settings are enabled by default on Windows 10 and later, Windows Server 2019 and later, and on Windows Server version 1803 core edition and later.
122
+
123
+
| System settings | Setting |
124
+
| -------- | -------- |
125
+
| Control flow guard (CFG) | Use default (On) |
126
+
| Data Execution Prevention (DEP) | Use default (On) |
127
+
| Force randomization for images (Mandatory ASRL) | Use default (On) |
## Enable exploit protection program settings for testing
148
+
149
+
> [!TIP]
150
+
> We highly recommend reviewing the modern approach for vulnerability mitigations, which is to use [Attack Surface Reduction rules (ASR rules)](attack-surface-reduction.md).
86
151
87
152
You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
| Disable Win32k system calls | ExploitGuardWin32SystemCallAudited <br/> ExploitGuardWin32SystemCallBlocked <br/>|
78
+
79
+
63
80
## Review exploit protection events in Windows Event Viewer
64
81
65
82
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:<br/><br/>
@@ -126,7 +143,6 @@ The table in this section indicates the availability and support of native mitig
126
143
|Validate image dependency integrity | Yes | No |
127
144
128
145
> [!NOTE]
129
-
130
146
> The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10 and Windows 11, which other EMET advanced settings are enabled by default, as part of enabling the anti-ROP mitigations for a process. For more information on how Windows 10 employs existing EMET technology, see the [Mitigation threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit).
Copy file name to clipboardExpand all lines: defender-endpoint/mac-whatsnew.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: deniseb
6
6
ms.author: deniseb
7
7
manager: deniseb
8
8
ms.localizationpriority: medium
9
-
ms.date: 10/30/2024
9
+
ms.date: 11/18/2024
10
10
audience: ITPro
11
11
ms.collection:
12
12
- m365-security
@@ -41,7 +41,7 @@ For more information on Microsoft Defender for Endpoint on other operating syste
41
41
42
42
- In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device control's ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS earlier than 14.3.1.
43
43
44
-
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.0.1 or newer.
44
+
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.1 or newer.
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-windows.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ You can collect the Defender for Endpoint analyzer support logs remotely using [
32
32
33
33
## Option 2: Run MDE Client Analyzer locally
34
34
35
-
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/BetaMDEAnalyzer) to the Windows device you want to investigate.
35
+
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate.
36
36
37
37
The file is saved to your Downloads folder by default.
0 commit comments