Skip to content

Commit 92904a7

Browse files
authored
Merge branch 'main' into docs-editor/virus-initiative-criteria-1731963855
2 parents c01cdae + fcf67d3 commit 92904a7

File tree

104 files changed

+992
-245
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

104 files changed

+992
-245
lines changed

defender-endpoint/android-intune.md

Lines changed: 56 additions & 79 deletions
Large diffs are not rendered by default.

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -27,18 +27,19 @@ ms.date: 11/15/2024
2727

2828
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
2929

30-
**Ending support for Device Administrator enrolled devices**
31-
32-
Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33-
34-
**For devices with access to GMS**
35-
36-
After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways: 
37-
38-
- Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39-
- Intune and Defender for Endpoint technical support will no longer support these devices.
30+
> [!IMPORTANT]
31+
> **Ending support for Device Administrator enrolled devices**
32+
> Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33+
>
34+
> **For devices with access to GMS**
35+
>
36+
> After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways:
37+
>
38+
> - Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39+
> - Intune and Defender for Endpoint technical support will no longer support these devices.
40+
>
41+
> For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
4042
41-
For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
4243

4344
**Aug-2024 (version: 1.0.6812.0101)**
4445

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/10/2024
18+
ms.date: 11/18/2024
1919
search.appverid: met150
2020
---
2121

@@ -330,6 +330,11 @@ By default the state of this rule is set to block. In most cases, many processes
330330

331331
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
332332

333+
> [!TIP]
334+
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
335+
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It is also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled. 
336+
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode is not advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337+
333338
> [!NOTE]
334339
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
335340
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.

defender-endpoint/configure-device-connectivity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ To test streamlined connectivity for devices not yet onboarded to Defender for E
173173

174174
- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.
175175

176-
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/BetaMDEAnalyzer
176+
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/MDEClientAnalyzerPreview
177177

178178

179179
> [!NOTE]

defender-endpoint/controlled-folders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 11/06/2024
6+
ms.date: 11/19/2024
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -40,7 +40,7 @@ search.appverid: met150
4040
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
4141

4242
> [!NOTE]
43-
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](indicator-certificates.md).
43+
> Scripting engines like PowerShell are not trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
4444
4545
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
4646

defender-endpoint/download-client-analyzer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Learn how to download the Microsoft Defender for Endpoint client analyzer on sup
2929
## Download client analyzer for Windows OS
3030

3131
1. The latest stable edition is available for download from following URL: <https://aka.ms/MDEAnalyzer>
32-
2. The latest preview edition is available for download from following URL: <https://aka.ms/BetaMDEAnalyzer>
32+
2. The latest preview edition is available for download from following URL: <https://aka.ms/MDEClientAnalyzerPreview>
3333

3434
## Download client analyzer for macOS or Linux
3535

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 69 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 11/15/2024
18+
ms.date: 11/21/2024
1919
---
2020

2121
# Evaluate exploit protection
@@ -37,7 +37,7 @@ In audit, you can see how mitigation works for certain apps in a test environmen
3737

3838
Exploit protection mitigations work at a low level in the operating system, and some kinds of software that perform similar low-level operations might have compatibility issues when they're configured to be protected by using exploit protection.
3939

40-
#### What kinds of Software shouldn't be protected by exploit protection?
40+
#### What kinds of software shouldn't be protected by exploit protection?
4141

4242
- Anti-malware and intrusion prevention or detection software
4343
- Debuggers
@@ -55,6 +55,40 @@ Services
5555
- System services
5656
- Network services
5757

58+
## Exploit protection mitigations enabled by default
59+
60+
| Mitigation | Enabled by default |
61+
| -------- | -------- |
62+
| Data Execution Prevention (DEP) | 64-bit and 32-bit applications |
63+
| Validate exception chains (SEHOP) | 64-bit applications |
64+
| Validate heap integrity | 64-bit and 32-bit applications |
65+
66+
## Deprecated "Program settings" mitigations
67+
68+
| “Program settings” mitigations | Reason |
69+
| -------- | -------- |
70+
| Export address filtering (EAF) | Application compatibility issues |
71+
| Import address filtering (IAF) | Application compatibility issues |
72+
| Simulate execution (SimExec) | Replaced with Arbitrary Code Guard (ACG) |
73+
| Validate API invocation (CallerCheck) | Replaced with Arbitrary Code Guard (ACG) |
74+
| Validate stack integrity (StackPivot) | Replaced with Arbitrary Code Guard (ACG) |
75+
76+
## Office application best practices
77+
78+
Instead of using Exploit Protection for Office applications such as Outlook, Word, Excel, PowerPoint, and OneNote, consider using a more modern approach to prevent their misuse: Attack Surface Reduction rules (ASR rules):
79+
80+
- [Block executable content from email client and webmail ](attack-surface-reduction-rules-reference.md#block-executable-content-from-email-client-and-webmail)
81+
- [Block Office applications from creating executable content](attack-surface-reduction-rules-reference.md#block-office-applications-from-creating-executable-content)
82+
- [Block all Office applications from creating child processes](attack-surface-reduction-rules-reference.md#block-all-office-applications-from-creating-child-processes)
83+
- [Block Office communication application from creating child processes](attack-surface-reduction-rules-reference.md#block-office-communication-application-from-creating-child-processes)
84+
- [Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes)
85+
- [Block execution of potentially obfuscated scripts](attack-surface-reduction-rules-reference.md#block-execution-of-potentially-obfuscated-scripts)
86+
- [Block Win32 API calls from Office macros](attack-surface-reduction-rules-reference.md#block-win32-api-calls-from-office-macros)
87+
88+
For Adobe Reader use the following ASR rule:
89+
90+
[Block Adobe Reader from creating child processes](attack-surface-reduction-rules-reference.md#block-adobe-reader-from-creating-child-processes)
91+
5892
## Application compatibility list
5993

6094
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
@@ -69,7 +103,7 @@ The following table lists specific products that have compatibility issues with
69103
| DropBox | EAF |
70104
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
71105
| Google Chrome | EAF+ |
72-
| Immidio Flex+ | Cell 4 |
106+
| Immidio Flex+ | EAF |
73107
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
74108
| Microsoft PowerPoint | EAF |
75109
| Microsoft Teams | EAF+ |
@@ -82,7 +116,38 @@ The following table lists specific products that have compatibility issues with
82116

83117
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
84118

85-
## Enable exploit protection for testing
119+
## Enable exploit protection system settings for testing
120+
121+
These Exploit Protection system settings are enabled by default on Windows 10 and later, Windows Server 2019 and later, and on Windows Server version 1803 core edition and later.
122+
123+
| System settings | Setting |
124+
| -------- | -------- |
125+
| Control flow guard (CFG) | Use default (On) |
126+
| Data Execution Prevention (DEP) | Use default (On) |
127+
| Force randomization for images (Mandatory ASRL) | Use default (On) |
128+
| Randomize memory allocations (Bottom-up ASRL) | Use default (On) |
129+
| High-entropy ASRL | Use default (On) |
130+
| Validate exception chains (SEHOP) | Use default (On) |
131+
132+
The xml sample is available below
133+
134+
```
135+
<?xml version="1.0" encoding="UTF-8"?>
136+
<MitigationPolicy>
137+
<SystemConfig>
138+
<DEP Enable="true" EmulateAtlThunks="false" />
139+
<ASLR ForceRelocateImages="true" RequireInfo="false" BottomUp="true" HighEntropy="true" />
140+
<ControlFlowGuard Enable="true" SuppressExports="false" />
141+
<SEHOP Enable="true" TelemetryOnly="false" />
142+
<Heap TerminateOnError="true" />
143+
</SystemConfig>
144+
</MitigationPolicy>
145+
```
146+
147+
## Enable exploit protection program settings for testing
148+
149+
> [!TIP]
150+
> We highly recommend reviewing the modern approach for vulnerability mitigations, which is to use [Attack Surface Reduction rules (ASR rules)](attack-surface-reduction.md).
86151
87152
You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
88153

defender-endpoint/exploit-protection.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 12/18/2020
19+
ms.date: 11/21/2024
2020
---
2121

2222
# Protect devices from exploits
@@ -60,6 +60,23 @@ DeviceEvents
6060
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
6161
```
6262

63+
### Exploit Protection and advanced hunting
64+
65+
Below are the advanced hunting actiontypes available for Exploit Protection.
66+
67+
| Exploit Protection mitigation name | Exploit Protection - Advanced Hunting - ActionTypes |
68+
|:---|:---|
69+
| Arbitrary code guard | ExploitGuardAcgAudited <br/> ExploitGuardAcgEnforced <br/>|
70+
| Don't allow child processes | ExploitGuardChildProcessAudited <br/> ExploitGuardChildProcessBlocked <br/> |
71+
| Export address filtering (EAF) | ExploitGuardEafViolationAudited <br/> ExploitGuardEafViolationBlocked <br/> |
72+
| Import address filtering (IAF) | ExploitGuardIafViolationAudited <br/> ExploitGuardIafViolationBlocked <br/> |
73+
| Block low integrity images | ExploitGuardLowIntegrityImageAudited <br/> ExploitGuardLowIntegrityImageBlocked <br/> |
74+
| Code integrity guard | ExploitGuardNonMicrosoftSignedAudited <br/> ExploitGuardNonMicrosoftSignedBlocked <br/> |
75+
|• Simulate execution (SimExec)<br/> • Validate API invocation (CallerCheck) <br/> • Validate stack integrity (StackPivot) <br/> | ExploitGuardRopExploitAudited <br/> ExploitGuardRopExploitBlocked <br/> |
76+
| Block remote images | ExploitGuardSharedBinaryAudited <br/> ExploitGuardSharedBinaryBlocked <br/> |
77+
| Disable Win32k system calls | ExploitGuardWin32SystemCallAudited <br/> ExploitGuardWin32SystemCallBlocked <br/>|
78+
79+
6380
## Review exploit protection events in Windows Event Viewer
6481

6582
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:<br/><br/>
@@ -126,7 +143,6 @@ The table in this section indicates the availability and support of native mitig
126143
|Validate image dependency integrity | Yes | No |
127144

128145
> [!NOTE]
129-
130146
> The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10 and Windows 11, which other EMET advanced settings are enabled by default, as part of enabling the anti-ROP mitigations for a process. For more information on how Windows 10 employs existing EMET technology, see the [Mitigation threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit).
131147
132148
## See also

defender-endpoint/mac-whatsnew.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: deniseb
66
ms.author: deniseb
77
manager: deniseb
88
ms.localizationpriority: medium
9-
ms.date: 10/30/2024
9+
ms.date: 11/18/2024
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -41,7 +41,7 @@ For more information on Microsoft Defender for Endpoint on other operating syste
4141

4242
- In macOS Sonoma 14.3.1, Apple made a change to the [handling of Bluetooth devices](https://developer.apple.com/forums/thread/738748) that impacts Defender for Endpoint device control's ability to intercept and block access to Bluetooth devices. At this time, the recommended mitigation is to use a version of macOS earlier than 14.3.1.
4343

44-
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.0.1 or newer.
44+
- In macOS Sequoia (version 15.0), if you have Network Protection enabled, you might see crashes of the network extension (NetExt). This issue results in intermittent network connectivity issues for end users. Please upgrade to macOS Sequoia version 15.1 or newer.
4545

4646
## Sequoia support
4747

defender-endpoint/run-analyzer-windows.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ You can collect the Defender for Endpoint analyzer support logs remotely using [
3232

3333
## Option 2: Run MDE Client Analyzer locally
3434

35-
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/BetaMDEAnalyzer) to the Windows device you want to investigate.
35+
1. Download the [MDE Client Analyzer tool](https://aka.ms/mdatpanalyzer) or [Beta MDE Client Analyzer tool](https://aka.ms/MDEClientAnalyzerPreview) to the Windows device you want to investigate.
3636

3737
The file is saved to your Downloads folder by default.
3838

0 commit comments

Comments
 (0)