Skip to content

Commit 9b1b533

Browse files
authored
Merge pull request #1276 from MicrosoftDocs/main
9/04 Publish for metadata update
2 parents 16746d9 + ebeff02 commit 9b1b533

File tree

5 files changed

+14
-9
lines changed

5 files changed

+14
-9
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 05/02/2024
18+
ms.date: 09/07/2024
1919
search.appverid: met150
2020
---
2121

@@ -109,7 +109,6 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
109109
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
110110

111111
> [!NOTE]
112-
>
113112
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114113
>
115114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
@@ -257,7 +256,6 @@ This rule prevents an application from writing a vulnerable signed driver to dis
257256
The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
258257

259258
> [!NOTE]
260-
>
261259
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
262260
>
263261
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
@@ -322,6 +320,9 @@ Dependencies: Microsoft Defender Antivirus
322320

323321
### Block credential stealing from the Windows local security authority subsystem
324322

323+
> [!NOTE]
324+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
325+
325326
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326327

327328
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.

defender-endpoint/defender-endpoint-false-positives-negatives.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- m365solution-fpfn
1717
- highpri
1818
- tier1
19-
ms.topic: how-to
19+
ms.topic: solution-overview
2020
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree, jcedola
2121
ms.custom:
2222
- FPFN

defender-endpoint/edr-detection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/15/2024
18+
ms.date: 09/04/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -57,7 +57,7 @@ Run an EDR detection test to verify that the device is properly onboarded and re
5757

5858

5959
```bash
60-
curl -o ~/Downloads/MDE Linux DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
60+
curl -o ~/Downloads/MDE-Linux-EDR-DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
6161
```
6262

6363
2. Extract the zip

defender-endpoint/linux-support-ebpf.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 08/22/2024
18+
ms.date: 09/07/2024
1919
---
2020

2121
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -62,6 +62,10 @@ The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the
6262
| Oracle Linux RHCK | 7.9 | 3.10.0-1160 |
6363
| Oracle Linux UEK | 7.9 | 5.4 |
6464
| Amazon Linux 2 | 2 | 5.4.261-174.360|
65+
| Rocky Linux 8 | 8.7 | 4.18.0-425 |
66+
| Rocky Linux 9 | 9.2 | 5.14.0-284 |
67+
| Alma Linux 8 | 8.4 | 4.18.0-305 |
68+
| Alma Linux 9 | 9.2 | 5.14.0-284 |
6569

6670
> [!NOTE]
6771
> Oracle Linux 8.8 with kernel version 5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64 will result in kernel hang when eBPF is enabled as supplementary subsystem provider. This kernel version should not be used for eBPF mode. Refer to Troubleshooting and Diagnostics section for mitigation steps.
@@ -153,7 +157,7 @@ The following two sets of data help analyze potential issues and determine the m
153157

154158
#### Troubleshooting performance issues
155159

156-
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirusexclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
160+
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirus exclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
157161

158162
```Bash
159163
sudo mdatp diagnostic ebpf-statistics

defender-endpoint/switch-to-mde-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365initiative-defender-endpoint
1515
- highpri
1616
- tier1
17-
ms.topic: overview
17+
ms.topic: solution-overview
1818
ms.custom: migrationguides
1919
ms.date: 10/24/2023
2020
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho, yongrhee

0 commit comments

Comments
 (0)