You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 04/16/2024
18
+
ms.date: 04/26/2024
19
19
search.appverid: met150
20
20
---
21
21
@@ -113,27 +113,27 @@ The following table lists the supported operating systems for rules that are cur
113
113
>
114
114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New functionality in the modern unified solution for Windows Server 2012 R2 and 2016 Preview](/defender-endpoint/configure-server-endpoints#new-functionality-in-the-modern-unified-solution-for-windows-server-2012-r2-and-2016-preview).
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers)| Y | Y | Y <br> version 1803 (Semi-Annual Enterprise Channel) or later | Y | Y |
119
-
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y <br> version 1809 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
119
+
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y <br> version 1809 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
120
120
|[Block all Office applications from creating child processes](#block-all-office-applications-from-creating-child-processes)| Y | Y | Y | Y | Y |
121
-
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
121
+
|[Block credential stealing from the Windows local security authority subsystem (lsass.exe)](#block-credential-stealing-from-the-windows-local-security-authority-subsystem)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
122
122
|[Block executable content from email client and webmail](#block-executable-content-from-email-client-and-webmail)| Y | Y | Y | Y | Y |
123
-
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
123
+
|[Block executable files from running unless they meet a prevalence, age, or trusted list criterion](#block-executable-files-from-running-unless-they-meet-a-prevalence-age-or-trusted-list-criterion)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
124
124
|[Block execution of potentially obfuscated scripts](#block-execution-of-potentially-obfuscated-scripts)| Y | Y | Y | Y | Y |
125
-
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y | Y | Y | N | Y |
126
-
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)| Y | Y | Y | Y | Y |
125
+
|[Block JavaScript or VBScript from launching downloaded executable content](#block-javascript-or-vbscript-from-launching-downloaded-executable-content)| Y | Y | Y | N |N|
126
+
|[Block Office applications from creating executable content](#block-office-applications-from-creating-executable-content)| Y | Y | Y | Y | Y |
127
127
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)| Y | Y | Y | Y | Y |
128
128
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y | Y | Y | Y | Y |
129
-
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later <sup>[[3](#fn1)]<sup></sup> | Y | Y <br> version 1903 (build 18362) or later | N | Y |
130
-
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
129
+
|[Block persistence through Windows Management Instrumentation (WMI) event subscription](#block-persistence-through-wmi-event-subscription)| Y <br> version 1903 (build 18362) or later <sup>[[3](#fn1)]</sup> | Y | Y <br> version 1903 (build 18362) or later | N |N|
130
+
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
131
131
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y | Y | Y | Y | Y |
132
132
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y | Y | Y | Y | Y |
133
133
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y | Y | Y | Y | Y |
134
134
|[Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange Role Only | Y <br>Exchange Role Only | Y <br>Exchange Role Only | N |
135
135
|[Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros)| Y | N | N | N | N |
136
-
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later <sup>[[3](#fn1)]<sup></sup> | Y | Y | Y | Y |
136
+
|[Use advanced protection against ransomware](#use-advanced-protection-against-ransomware)| Y <br> version 1803 or later <sup>[[3](#fn1)]</sup> | Y | Y | Y | Y |
137
137
138
138
(<aid="fn1">1</a>) Refers to the modern unified solution for Windows Server 2012 and 2016. For more information, see [Onboard Windows Servers to the Defender for Endpoint service](configure-server-endpoints.md).
139
139
@@ -145,7 +145,7 @@ The following table lists the supported operating systems for rules that are cur
145
145
146
146
Links to information about configuration management system versions referenced in this table are listed below this table.
147
147
148
-
|Rule name | Microsoft Intune | Microsoft Endpoint Configuration Manager |Group Policy<sup>[[1](#fn1)]<sup></sup> | PowerShell<sup>[[1](#fn1)]<sup></sup> |
148
+
|Rule name | Microsoft Intune | Microsoft Endpoint Configuration Manager |Group Policy<sup>[[1](#fn1)]</sup> | PowerShell<sup>[[1](#fn1)]</sup> |
149
149
|---|:---:|:---:|:---:|:---:|
150
150
|[Block abuse of exploited vulnerable signed drivers](#block-abuse-of-exploited-vulnerable-signed-drivers)| Y || Y | Y |
151
151
|[Block Adobe Reader from creating child processes](#block-adobe-reader-from-creating-child-processes)| Y || Y | Y |
@@ -159,7 +159,7 @@ Links to information about configuration management system versions referenced i
159
159
|[Block Office applications from injecting code into other processes](#block-office-applications-from-injecting-code-into-other-processes)| Y |Y <br><br> CB 1710 | Y | Y |
160
160
|[Block Office communication application from creating child processes](#block-office-communication-application-from-creating-child-processes)| Y |Y <br><br> CB 1710 | Y | Y |
161
161
|[Block persistence through WMI event subscription](#block-persistence-through-wmi-event-subscription)|Y ||Y | Y |
162
-
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y ||Y | Y |
162
+
|[Block process creations originating from PSExec and WMI commands](#block-process-creations-originating-from-psexec-and-wmi-commands)| Y ||Y | Y |
163
163
|[Block rebooting machine in Safe Mode (preview)](#block-rebooting-machine-in-safe-mode-preview)| Y || Y | Y |
164
164
|[Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb)| Y |Y <br><br> CB 1802 | Y | Y |
165
165
|[Block use of copied or impersonated system tools (preview)](#block-use-of-copied-or-impersonated-system-tools-preview)| Y || Y | Y |
Copy file name to clipboardExpand all lines: defender-endpoint/edr-block-mode-faqs.yml
+9-8Lines changed: 9 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -8,12 +8,14 @@ metadata:
8
8
audience: ITPro
9
9
author: siosulli
10
10
ms.author: siosulli
11
-
ms.reviewer: sugamar
11
+
ms.reviewer: sugamar, kausd
12
12
manager: deniseb
13
-
ms.custom: asr
13
+
ms.custom:
14
+
- asr
15
+
- partner-contribution
14
16
ms.topic: faq
15
17
ms.collection: m365-security
16
-
ms.date: 02/27/2024
18
+
ms.date: 04/26/2024
17
19
18
20
title: Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)
19
21
summary: |
@@ -36,11 +38,10 @@ sections:
36
38
- question: |
37
39
Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
38
40
answer: |
39
-
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. There is minimal benefit in enabling EDR in block mode when Microsoft Defender Antivirus is in active mode, because real-time protection is expected to catch and remediate detections first. We recommend enabling EDR in block mode on endpoints where Microsoft Defender for Antivirus is running in passive mode. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) or by [automated investigation & remediation capabilities](automated-investigations.md) in block mode.
40
-
41
-
> [!NOTE]
42
-
> Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus.
43
-
41
+
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) or by [automated investigation & remediation capabilities](automated-investigations.md) in block mode.
42
+
43
+
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product.
44
+
44
45
- question: |
45
46
Will EDR in block mode affect a user's antivirus protection?
Copy file name to clipboardExpand all lines: defender-endpoint/edr-in-block-mode.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about endpoint detection and response in block mode
4
4
author: siosulli
5
5
ms.author: siosulli
6
6
manager: deniseb
7
-
ms.reviewer: pahuijbr
7
+
ms.reviewer: pahuijbr, kausd
8
8
audience: ITPro
9
9
ms.topic: conceptual
10
10
ms.service: defender-endpoint
@@ -14,7 +14,7 @@ ms.custom:
14
14
- next-gen
15
15
- mde-edr
16
16
- admindeeplinkDEFENDER
17
-
ms.date: 04/11/2024
17
+
ms.date: 04/26/2024
18
18
ms.collection:
19
19
- m365-security
20
20
- tier2
@@ -36,7 +36,7 @@ search.appverid: met150
36
36
37
37
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
38
38
39
-
This recommendation is primarily for devices using an active non-Microsoft antivirus solution (with Microsoft Defender Antivirus in passive mode). There is little benefit to enabling EDR in block mode when Microsoft Defender Antivirus is the primary antivirus solution on devices.
39
+
This article describes EDR in block mode, which helps protect devices that are running a non-Microsoft antivirus solution (with Microsoft Defender Antivirus in passive mode).
Copy file name to clipboardExpand all lines: defender-endpoint/mde-plugin-wsl.md
+19-15Lines changed: 19 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,8 @@ ms.localizationpriority: medium
11
11
ms.collection:
12
12
- m365-security
13
13
- tier2
14
+
ms.custom:
15
+
- partner-contribution
14
16
audience: ITPro
15
17
ms.date: 04/25/2024
16
18
search.appverid: MET150
@@ -26,13 +28,11 @@ The Windows Subsystem for Linux (WSL) 2, which replaces the previous version of
26
28
27
29
Be aware of the following before you start:
28
30
29
-
1. The plug-in doesn't yet automatically update. When a new plug-in version is released, the new MSI package needs to be applied to perform the update. You can apply the new package by using any tool that deploys software. Updates are coming soon through Microsoft Update. If preferred, you can continue to use the MSI package method.
31
+
1. The plug-in does not currently support automatic updates. When a new version is released, a new MSI package needs to be applied to perform the update. This can be done through any of the software deployment tools. Updates will come through Microsoft updates.
30
32
31
33
2. As it takes a few minutes for the plug-in to fully instantiate and up to 30 minutes for a WSL2 instance to onboard itself, short-lived WSL container instances might result in the WSL2 instance not showing up in the Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)). Once a (any) distribution has been running long enough (at least 30 minutes), it does show up.
32
34
33
-
3. If you're using a proxy in your (test) environment, make sure that the plug-in is set up to use it correctly. WSL is typically not automatically configured to use a proxy. For more information, see the section, [Setting a proxy for Defender running in WSL](#setting-a-proxy-for-defender-running-in-wsl).
34
-
35
-
4. The use of a custom kernel in combination with the plug-in isn't supported. When you attempt to launch WSL with the plugin installed, you'll encounter the error *A fatal error was returned by plugin 'DefenderforEndpointPlug-in'. Error message: 'Custom Kernel/Configuration not supported.'*.
35
+
3. The use of a custom kernel in combination with the plug-in isn't supported. When you attempt to launch WSL with the plugin installed, you'll encounter the error *A fatal error was returned by plugin 'DefenderforEndpointPlug-in'. Error message: 'Custom Kernel/Configuration not supported.'*.
36
36
37
37
## Software prerequisites
38
38
@@ -42,7 +42,7 @@ Be aware of the following before you start:
42
42
43
43
- Defender for Endpoint must be onboarded and running on the Windows host OS.
44
44
45
-
- The host OS must be running Windows 10, version 2004 and higher (build 19044 and higher) or Windows 11 to support the Windows Subsystem for Linux versions that can work with the plug-in.
45
+
- The host OS must be running Windows 10 Client, version 2004 and higher (build 19044 and higher) or Windows 11 Client to support the Windows Subsystem for Linux versions that can work with the plug-in.
46
46
47
47
## Software components and installer file names
48
48
@@ -68,19 +68,20 @@ If your Windows Subsystem for Linux isn't installed yet, follow these steps:
68
68
69
69
2. Run the command `wsl -–install`.
70
70
71
-
### Confirm WSL is installed and running
71
+
### 1. Confirm WSL is installed and running
72
+
73
+
1. Using Terminal or Command Prompt, run `wsl –update` to make sure you have the latest version.
72
74
73
-
1. Using Terminal or Command Prompt, run`wsl –update`to make sure you have the latest version.
75
+
2. Run the`wsl` command to ensure WSL is running before testing.
74
76
75
-
2. Run the `wsl` command to ensure WSL is running before testing.
77
+
### 2. Install the plug-in
76
78
77
-
### Install the plug-in
78
79
79
-
After WSL is running and fully up to date, follow these steps to install the plug-in:
80
+
After WSL is running and fully up to date, follow these steps to install the plug-in:
80
81
81
-
1. Install the MSI file downloaded from the onboarding section in the Microsoft Defender portal (**Settings** > **Endpoints** > **Onboarding** > **Windows Subsystem for Linux 2 (plug-in)**.)
82
+
1. Install the MSI file downloaded from the onboarding section in the Microsoft Defender portal (**Settings** > **Endpoints** > **Onboarding** > **Windows Subsystem for Linux 2 (plug-in)**.)
82
83
83
-
2. Open a command prompt/terminal and run `wsl`.
84
+
2. Open a command prompt/terminal and run `wsl`.
84
85
85
86
You can [deploy the package using Microsoft Intune](/mem/intune/apps/lob-apps-windows).
86
87
@@ -108,11 +109,11 @@ After WSL is running and fully up to date, follow these steps to install the plu
108
109
109
110
This section describes how to configure proxy connectivity for the Defender for Endpoint plug-in. If your enterprise uses a proxy to provide connectivity to Defender for Endpoint running on the Windows host, continue reading to determine whether you need to configure it for the plug-in.
110
111
111
-
Reuse the Defender for Endpoint static proxy setting (`TelemetryProxyServer`).
112
+
If you want to use the host [windows EDR telemetry proxy](configure-proxy-internet.md) configuration for MDE for the WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
112
113
113
-
If you want to use the host [static proxy](configure-proxy-internet.md) configuration for MDE for the WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
114
+
If you want to use the host [winhttp proxy](/defender-endpoint/configure-proxy-internet#configure-the-proxy-server-manually-using-netsh-command) configuration for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
114
115
115
-
If you want to use the host network and network proxy setting for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
116
+
If you want to use the host [network and network proxy setting](https://support.microsoft.com/windows/use-a-proxy-server-in-windows-03096c53-0554-4ffe-b6ab-8b1deee8dae1#ID0EFD=Windows_11&preserve-view=true) for MDE for WSL plug-in, nothing more is required. This configuration is adopted by the plug-in automatically.
116
117
117
118
## Plug-in Proxy selection
118
119
@@ -126,6 +127,9 @@ If your host machine contains multiple proxy settings, the plug-in selects the p
126
127
127
128
Example: If your host machine has both *Winhttp proxy* and *Network & Internet proxy*, the plug-in selects `Winhttp proxy` as the proxy configuration.
128
129
130
+
> [!NOTE]
131
+
> The `DefenderProxyServer` registry key is no longer supported. Follow the above mentioned steps to configure proxy in plug-in.
132
+
129
133
## Connectivity test for Defender running in WSL
130
134
131
135
The following procedure describes how to confirm that Defender in Endpoint in WSL has internet connectivity.
0 commit comments