Skip to content

Commit 9a40b23

Browse files
authored
Merge branch 'public' into patch-1
2 parents 49e4b64 + 3573239 commit 9a40b23

36 files changed

+347
-205
lines changed

ATADocs/docfx.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,10 @@
4646
"layout": "Conceptual",
4747
"breadcrumb_path": "/advanced-threat-analytics/bread/toc.json",
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
49-
"searchScope": ["ATA"]
49+
"searchScope": ["ATA"],
50+
"contributors_to_exclude": [
51+
"beccarobins"
52+
]
5053
},
5154
"markdownEngineName": "markdig"
5255
}

CloudAppSecurityDocs/docfx.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,10 @@
4242
"ms.author": "bagol",
4343
"ms.collection": "M365-security-compliance",
4444
"ms.service": "defender-for-cloud-apps",
45-
"ms.suite": "ems"
45+
"ms.suite": "ems",
46+
"contributors_to_exclude": [
47+
"beccarobins"
48+
]
4649
},
4750
"fileMetadata": {},
4851
"template": [],

defender-business/docfx.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
62-
"alekyaj"
62+
"alekyaj",
63+
"beccarobins"
6364
]
6465
},
6566
"fileMetadata": {},

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/05/2024
18+
ms.date: 11/10/2024
1919
search.appverid: met150
2020
---
2121

@@ -348,6 +348,14 @@ Advanced hunting action type:
348348

349349
Dependencies: Microsoft Defender Antivirus
350350

351+
Known issues: These applications and "Block credential stealing from the Windows local security authority subsystem" rule, are incompatible:
352+
353+
|Application name|For information|
354+
| -------- | -------- |
355+
|Quest Dirsync Password Sync|[Dirsync Password Sync isn’t working when Windows Defender is installed, error: "VirtualAllocEx failed: 5" (4253914)](https://support.quest.com/kb/4253914/dirsync-password-sync-isn-t-working-when-windows-defender-is-installed-error-virtualallocex-failed-5)|
356+
357+
For technical support, contact the software vendor.
358+
351359
### Block executable content from email client and webmail
352360

353361
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
@@ -482,6 +490,15 @@ Advanced hunting action type:
482490

483491
Dependencies: Microsoft Defender Antivirus
484492

493+
Known issues: These applications and "Block Office applications from injecting code into other processes" rule, are incompatible:
494+
495+
|Application name|For information|
496+
| -------- | -------- |
497+
|Avecto (BeyondTrust) Privilege Guard|[September-2024 (Platform: 4.18.24090.11 | Engine 1.1.24090.11)](/defender-endpoint/microsoft-defender-antivirus-updates). |
498+
|Heimdal security|n/a|
499+
500+
For technical support, contact the software vendor.
501+
485502
### Block Office communication application from creating child processes
486503

487504
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.

defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.reviewer: yongrhee
1010
manager: deniseb
1111
ms.subservice: ngp
1212
ms.topic: conceptual
13-
ms.date: 07/25/2024
13+
ms.date: 11/10/2024
1414
ms.collection:
1515
- m365-security
1616
- tier2
@@ -64,7 +64,7 @@ You can specify the cloud block timeout period with an [endpoint security policy
6464

6565
3. Select (or create) an antivirus policy.
6666

67-
4. In the **Configuration settings** section, expand **Cloud protection**. Then, in the **Microsoft Defender Antivirus Extended Timeout In Seconds** box, specify the more time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
67+
4. In the **Configuration settings** section, scroll down to **Cloud Extended Timeout** and specify the timeout, in seconds, from 0 to 50 seconds. Whatever you specify is added to the default 10 seconds.
6868

6969
5. (This step is optional) Make any other changes to your antivirus policy. (Need help? See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)
7070

defender-endpoint/controlled-folders.md

Lines changed: 24 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 07/30/2024
6+
ms.date: 11/06/2024
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -33,12 +33,11 @@ search.appverid: met150
3333
**Applies to**
3434
- Windows
3535

36-
3736
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
3837
3938
## What is controlled folder access?
4039

41-
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).
40+
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
4241

4342
> [!NOTE]
4443
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](indicator-certificates.md).
@@ -66,15 +65,6 @@ The [protected folders](#review-controlled-folder-access-events-in-windows-event
6665

6766
You can use [audit mode](overview-attack-surface-reduction.md) to evaluate how controlled folder access would impact your organization if it were enabled.
6867

69-
Controlled folder access is supported on the following versions of Windows:
70-
71-
- [Windows 10, version 1709](/windows/whats-new/whats-new-windows-10-version-1709) and later
72-
- Windows 11
73-
- Windows 2012 R2
74-
- Windows 2016
75-
- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)
76-
- Windows Server 2022
77-
7868
## Windows system folders are protected by default
7969

8070
Windows system folders are protected by default, along with several other folders:
@@ -91,9 +81,9 @@ The protected folders include common system folders (including boot sectors), an
9181
- `c:\Users\Public\Music`
9282
- `c:\Users\<username>\Favorites`
9383

94-
Default folders appear in the user's profile, under **This PC**.
95-
> [!div class="mx-imgBorder"]
96-
> ![Protected Windows default systems folders](media/defaultfolders.png)
84+
Default folders appear in the user's profile, under **This PC**, as shown in the following image:
85+
86+
![Protected Windows default systems folders](media/defaultfolders.png)
9787

9888
> [!NOTE]
9989
> You can configure additional folders as protected, but you cannot remove the Windows system folders that are protected by default.
@@ -122,33 +112,45 @@ DeviceEvents
122112
You can review the Windows event log to see events that are created when controlled folder access blocks (or audits) an app:
123113

124114
1. Download the [Evaluation Package](https://aka.ms/mp7z2w) and extract the file *cfa-events.xml* to an easily accessible location on the device.
115+
125116
2. Type **Event viewer** in the Start menu to open the Windows Event Viewer.
117+
126118
3. On the left panel, under **Actions**, select **Import custom view...**.
119+
127120
4. Navigate to where you extracted *cfa-events.xml* and select it. Alternatively, [copy the XML directly](overview-attack-surface-reduction.md).
121+
128122
5. Select **OK**.
129123

130124
The following table shows events related to controlled folder access:
131125

132126
|Event ID|Description|
133127
|---|---|
134-
|5007|Event when settings are changed|
135-
|1124|Audited controlled folder access event|
136-
|1123|Blocked controlled folder access event|
137-
|1127|Blocked controlled folder access sector write block event|
138-
|1128|Audited controlled folder access sector write block event|
128+
|`5007`|Event when settings are changed|
129+
|`1124`|Audited controlled folder access event|
130+
|`1123`|Blocked controlled folder access event|
131+
|`1127`|Blocked controlled folder access sector write block event|
132+
|`1128`|Audited controlled folder access sector write block event|
139133

140134
## View or change the list of protected folders
141135

142136
You can use the Windows Security app to view the list of folders that are protected by controlled folder access.
143137

144138
1. On your Windows 10 or Windows 11 device, open the Windows Security app.
139+
145140
2. Select **Virus & threat protection**.
141+
146142
3. Under **Ransomware protection**, select **Manage ransomware protection**.
143+
147144
4. If controlled folder access is turned off, you'll need to turn it on. Select **protected folders**.
145+
148146
5. Do one of the following steps:
147+
149148
- To add a folder, select **+ Add a protected folder**.
150149
- To remove a folder, select it, and then select **Remove**.
151150

152-
> [!NOTE]
153-
> [Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
151+
> [!IMPORTANT]
152+
> Do not add local share paths (loopbacks) as protected folders. Use the local path instead. For example, if you have shared `C:\demo` as `\\mycomputer\demo`, do not add `\\mycomputer\demo` to the list of protected folders. Instead add `C:\demo`.
153+
154+
[Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list. Subfolders are also included in protection when you add a new folder to the list.
155+
154156
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/docfx.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
62-
"alekyaj"
62+
"alekyaj",
63+
"beccarobins"
6364
]
6465
},
6566
"fileMetadata": {},

defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
ms.topic: how-to
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 04/03/2024
9+
ms.date: 11/10/2024
1010
ms.reviewer: pahuijbr
1111
manager: deniseb
1212
ms.custom: nextgen
@@ -81,7 +81,7 @@ For more information about the specific network-connectivity requirements to ens
8181

8282
| Task | Steps |
8383
|---------|---------|
84-
| Create a new policy | 1. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**. Then choose **Next**. <br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
84+
| Create a new policy | 1. For **Platform**, select **Windows**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
8585
| Edit an existing policy | 1. Select the policy that you want to edit.<br/><br/>2. Under **Configuration settings**, choose **Edit**.<br/><br/>3. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>4. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>5. Select **Review + save**. |
8686

8787
> [!TIP]

defender-endpoint/mac-preferences.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22
title: Set preferences for Microsoft Defender for Endpoint on Mac
33
description: Configure Microsoft Defender for Endpoint on Mac in enterprise organizations.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: denisebmsft
6+
ms.author: deniseb
77
manager: deniseb
8+
ms.reviewer: yongrhee
89
ms.localizationpriority: medium
910
audience: ITPro
1011
ms.collection:
@@ -14,7 +15,7 @@ ms.collection:
1415
ms.topic: how-to
1516
ms.subservice: macos
1617
search.appverid: met150
17-
ms.date: 08/15/2024
18+
ms.date: 11/11/2024
1819
---
1920

2021
# Set preferences for Microsoft Defender for Endpoint on macOS
@@ -681,7 +682,7 @@ The following configuration profile (or, in case of JAMF, a property list that c
681682
<key>PayloadOrganization</key>
682683
<string>Microsoft</string>
683684
<key>PayloadIdentifier</key>
684-
<string>
685+
<string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
685686
<key>PayloadDisplayName</key>
686687
<string>Microsoft Defender for Endpoint settings</string>
687688
<key>PayloadDescription</key>

defender-endpoint/manage-indicators.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 01/18/2024
18+
ms.date: 11/05/2024
1919
---
2020

2121
# Create indicators
@@ -150,9 +150,10 @@ The functionality of pre-existing IoCs won't change. However, the indicators wer
150150
The IoC API schema and the threat IDs in advance hunting are updated to align with the renaming of the IoC response actions. The API scheme changes apply to all IoC Types.
151151

152152
> [!NOTE]
153-
>
154-
> There is a limit of 15,000 indicators per tenant. File and certificate indicators do not block [exclusions defined for Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus). Indicators are not supported in Microsoft Defender Antivirus when it is in passive mode.
155-
>
153+
> There is a limit of 15,000 indicators per tenant. Increases to this limit are not supported.
154+
>
155+
> File and certificate indicators do not block [exclusions defined for Microsoft Defender Antivirus](/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus). Indicators are not supported in Microsoft Defender Antivirus when it is in passive mode.
156+
>
156157
> The format for importing new indicators (IoCs) has changed according to the new updated actions and alerts settings. We recommend downloading the new CSV format that can be found at the bottom of the import panel.
157158
158159
## Known issues and limitations

0 commit comments

Comments
 (0)