Skip to content

Commit 97b55c1

Browse files
committed
fixes
1 parent 99ce64e commit 97b55c1

File tree

3 files changed

+23
-10
lines changed

3 files changed

+23
-10
lines changed

defender-endpoint/manage-automation-file-uploads.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- tier2
1313
ms.topic: conceptual
1414
search.appverid: met150
15-
ms.date: 05/08/2023
15+
ms.date: 06/25/2024
1616
---
1717

1818
# Manage automation file uploads
@@ -37,18 +37,23 @@ For example, if you add *exe* and *bat* as file or attachment extension names, t
3737
> [!NOTE]
3838
> Microsoft securely stores the files submitted for a six-month period. Files are promptly deleted after six months.
3939
40-
## Add file extension names and attachment extension names.
40+
## Add file extension names and attachment extension names
4141

42-
1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
42+
> [!IMPORTANT]
43+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
44+
45+
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
4346

4447
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation uploads**.
4548

4649
2. Toggle the content analysis setting between **On** and **Off**.
4750

4851
3. Configure the following extension names and separate extension names with a comma:
52+
4953
- **File extension names** - Suspicious files except email attachments will be submitted for additional inspection
5054

5155
## Related topics
5256

5357
- [Manage automation folder exclusions](manage-automation-folder-exclusions.md)
58+
5459
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/manage-automation-folder-exclusions.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 12/18/2020
17+
ms.date: 06/25/2024
1818
---
1919

2020
# Manage automation folder exclusions
@@ -41,13 +41,17 @@ You can control the following attributes about the folder that you'd like to be
4141

4242
- **File names**: You can specify the file names that you want to be excluded in a specific directory. The names are a way to prevent an attacker from using an excluded folder to hide an exploit. The names explicitly define which files to ignore.
4343

44+
> [!IMPORTANT]
45+
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
46+
47+
4448
## Add an automation folder exclusion
4549

46-
1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
50+
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
4751

4852
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation folder exclusions**.
4953

50-
2. Click **New folder exclusion**.
54+
2. Select **New folder exclusion**.
5155

5256
3. Enter the folder details:
5357

@@ -56,25 +60,29 @@ You can control the following attributes about the folder that you'd like to be
5660
- File names
5761
- Description
5862

59-
4. Click **Save**.
63+
4. Select **Save**.
6064

6165
> [!NOTE]
6266
> Live Response commands to collect or examine excluded files will fail with error: "File is excluded". In addition, automated investigations will ignore the excluded items.
6367
6468
## Edit an automation folder exclusion
6569

6670
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation folder exclusions**.
67-
2. Click **Edit** on the folder exclusion.
71+
72+
2. Select **Edit** on the folder exclusion.
73+
6874
3. Update the details of the rule and click **Save**.
6975

7076
## Remove an automation folder exclusion
7177

7278
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Automation folder exclusions**.
73-
2. Click **Remove exclusion**.
79+
80+
2. Select **Remove exclusion**.
7481

7582
## Related articles
7683

7784
- [Manage automation allowed/blocked lists](manage-indicators.md)
7885
- [Manage automation file uploads](manage-automation-file-uploads.md)
7986
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
87+
8088
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/manage-suppression-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ There might be scenarios where you need to suppress alerts from appearing in the
3434
You can view a list of all the suppression rules and manage them in one place. You can also turn an alert suppression rule on or off.
3535

3636

37-
1. Log in to [Microsoft Defender XDR](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
37+
1. Sign in to the [Microsoft Defender portal](https://go.microsoft.com/fwlink/p/?linkid=2077139) using an account with the Security administrator or Global administrator role assigned.
3838

3939
2. In the navigation pane, select **Settings** \> **Endpoints** \> **Rules** \> **Alert suppression**. The list of suppression rules that users in your organization have created is displayed.
4040

0 commit comments

Comments
 (0)