Skip to content

Commit 9ec2599

Browse files
authored
Merge branch 'main' into dhagarwal_working
2 parents 67c7934 + 3e00cb9 commit 9ec2599

27 files changed

+48
-55
lines changed

defender-endpoint/indicator-file.md

Lines changed: 11 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 02/06/2025
9+
ms.date: 03/04/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,9 +29,6 @@ search.appverid: met150
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
3030
- [Microsoft Defender for Business](/defender-business/mdb-overview)
3131

32-
> [!TIP]
33-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
34-
3532
> [!IMPORTANT]
3633
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
3734
@@ -52,37 +49,33 @@ There are three ways you can create indicators for files:
5249
Understand the following prerequisites before you create indicators for files:
5350

5451
- [Behavior Monitoring is enabled](behavior-monitor.md)
55-
5652
- [Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57-
5853
- [Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
59-
6054
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
6155

6256
### Windows prerequisites
6357

6458
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
65-
66-
- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
67-
59+
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
6860
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.
69-
7061
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
7162

7263
> [!NOTE]
7364
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
7465
7566
### macOS prerequisites
7667

77-
- [File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
78-
79-
### Linux prerequisites
68+
- Real-time protection (RTP) needs to be active.
69+
- [File hash computation must be enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line). Run the following command: `mdatp config enable-file-hash-computation --value enabled`
8070

81-
- Available in Defender for Endpoint version 101.85.27 or later.
71+
> [!NOTE]
72+
> On Mac, file indicators support Mach-O files (akin to `.exe` and `.dll` in Windows) scripts, such as sh/bash and AppleScript File (`.scpt`) files only.
8273
83-
- [File hash computation is enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
74+
### Linux prerequisites
8475

85-
- Behavior monitoring is preferred, but this will work with any other scan (RTP or Custom).
76+
- Available in Defender for Endpoint version `101.85.27` or later.
77+
- [File hash computation must be enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
78+
- Behavior monitoring enabled is preferred, but this feature works with any other scan (RTP or Custom).
8679

8780
## Create an indicator for files from the settings page
8881

@@ -95,9 +88,7 @@ Understand the following prerequisites before you create indicators for files:
9588
4. Specify the following details:
9689

9790
- Indicator: Specify the entity details and define the expiration of the indicator.
98-
9991
- Action: Specify the action to be taken and provide a description.
100-
10192
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
10293

10394
> [!NOTE]
@@ -156,7 +147,7 @@ Timestamp > ago(30d)
156147

157148
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
158149

159-
Below are other thread names that can be used in the sample query from above:
150+
Here are other thread names that can be used in the sample query:
160151

161152
Files:
162153

defender-vulnerability-management/tvm-browser-extensions.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Browser extensions assessment in Microsoft Defender Vulnerability Management
3-
description: Find out about the browsers extensions installed in your environment
3+
description: Find out about the browser extensions installed in your environment through Microsoft Defender Vulnerability Management.
44
ms.service: defender-vuln-mgmt
55
ms.pagetype: security
66
ms.author: deniseb
@@ -11,9 +11,10 @@ audience: ITPro
1111
ms.collection:
1212
- m365-security
1313
- Tier1
14-
ms.topic: conceptual
14+
ms.topic: concept-article
1515
search.appverid: met150
16-
ms.date: 02/23/2025
16+
ms.date: 03/04/2025
17+
#customer intent: To learn about the browser extensions installed in your environment through Microsoft Defender Vulnerability Management.
1718
---
1819

1920
# Browser extensions assessment in Microsoft Defender Vulnerability Management
@@ -32,71 +33,71 @@ The information available helps your security team learn about the installed ext
3233

3334
## View your browser extensions
3435

35-
1. Go to **Vulnerability management** \> **Inventories** in the [Microsoft Defender portal](https://security.microsoft.com).
36+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
3637

37-
2. Select the **Browser extensions** tab.
38+
2. Navigate to **Endpoints** \> **Vulnerability management** \> **Inventories**, then select the **Browser extensions** tab.
3839

3940
> [!NOTE]
4041
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Microsoft Edge, Chrome, and Firefox, appear in browser extension list.
4142
4243
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number of devices with the extensions turned on.
4344

44-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions.png" alt-text="Screenshot of the Browser extensions page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions.png":::
45+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-inventories-small.png" alt-text="Screenshot of the Browser extensions tab" lightbox="/defender/media/defender-vulnerability-management/mdvm-inventories.png":::
4546

4647
You can use the Browser filter to view the relevant list of extensions for a particular browser.
4748

4849
The **Requested permissions** and **Permissions risk** columns provide more specific information on the number of permissions requested by the extension, and the permissions risk level based on the type of access to devices or sites it requested.
4950

5051
Select a browser extension to open its flyout pane, where you can learn more about the extension:
5152

52-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_details.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_details.png":::
53+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdm-browserex-pane-small.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="/defender/media/defender-vulnerability-management/mdm-browserex-pane.png":::
5354

54-
Where applicable, there's a link available on this page to access the extension in the store it was installed from.
55+
Where applicable, there's a link available on the flyout pane to access the extension in the store it was installed from.
5556

5657
### Browser extension permissions
5758

5859
Browser extensions usually need different types of permission to run properly, for example, they might require permission to modify a webpage.
5960

6061
Select the **Permissions** tab, from the browser extension flyout pane, to see information on the permissions the browser extension needs to run, and whether this permission is optional or not.
6162

62-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_permissions.png" alt-text="Screenshot of the Browser extensions permissions page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_permissions.png":::
63+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-perms-small.png" alt-text="Screenshot of the Browser extensions permissions page" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-perms.png":::
6364

6465
The permission risk level generated is based on the type of access the permission is requesting. You can use this information to help make an informed decision on whether you want to allow or block this extension.
6566

6667
> [!NOTE]
67-
> Risk is subjective, and it's up to each organization to determine the types of risk they're willing to take on.
68+
> Risk is subjective. Each organization should determine the types of risk they're willing to take on.
6869
6970
Select a permission to see a further flyout with more information.
7071

7172
### View installed devices
7273

7374
To see the list of the devices the extension is installed on, choose the **Installed devices** tab from the browser extension flyout pane:
7475

75-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_devices.png" alt-text="Screenshot of the Browser extensions devices tab" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_devices.png":::
76+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-installtab-small.png" alt-text="Screenshot of the Browser extensions devices tab" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-installtab.png":::
7677

7778
From here, you can search for a particular device the extension is installed on, and you can export a list of the devices to a csv file.
7879

7980
### View extension versions
8081

81-
Select the **Extensions versions** tab, from the browser extension flyout pane, to see information on the versions of the extension installed in your organization.
82+
Select the **Extension versions** tab, from the browser extension flyout pane, to see information on the versions of the extension installed in your organization.
8283

83-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_versions.png" alt-text="Screenshot of the Browser extensions versions tab" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_versions.png":::
84+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-extension-small.png" alt-text="Screenshot of the Browser extensions versions tab" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-extension.png":::
8485

8586
### View extensions users
8687

8788
Select the **Users** tab, from the browser extension flyout pane, to see a list of users who installed the browser extension.
8889

89-
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-browser-ext-user-filter.png" alt-text="Screenshot of the Browser extensions user tab." lightbox="/defender/media/defender-vulnerability-management/tvm-browser-ext-user-filter.png":::
90+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-users-small.png" alt-text="Screenshot of the Browser extensions user tab." lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-users.png":::
9091

9192
### Browser extensions on devices
9293

9394
You can also view a list of extensions installed on a device:
9495

95-
1. Select the device from the **Installed devices** tab in the flyout panel and select **Open device page** or select the device directly from the **Device inventory** page.
96+
1. Select the device from the **Installed devices** tab in the flyout pane and select **Open device page** or select the device directly from the **Device inventory** page.
9697

9798
2. Select **Inventories** and then **Browser extensions** to see a list of extensions installed on that device.
9899

99-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_devicepage.png" alt-text="Screenshot of the Browser extensions in the devices page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_devicepage.png":::
100+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-devicepage-small.png" alt-text="Screenshot of the Browser extensions in the devices page" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-devicepage.png":::
100101

101102
### Browser extension APIs
102103

@@ -107,7 +108,7 @@ You can use APIs to view all browser extensions installed in your organization,
107108

108109
### Use advanced hunting
109110

110-
You can use advanced hunting queries to gain visibility on browser extensions in your organization. Find details about the browser extensions installed per device in the **DeviceTvmBrowserExtensions** table, or browser extension related information, including extensions permission information in the **DeviceTvmBrowserExtensionsKB** table.
111+
You can use advanced hunting queries to gain visibility on browser extensions in your organization. Find details about the browser extensions installed per device in the [**DeviceTvmBrowserExtensions**](/defender-xdr/advanced-hunting-devicetvmbrowserextensions-table) table, or browser extension related information, including extensions permission information in the [**DeviceTvmBrowserExtensionsKB**](/defender-xdr/advanced-hunting-devicetvmbrowserextensionskb-table) table.
111112

112113
## Related articles
113114

0 commit comments

Comments
 (0)