You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+11-20Lines changed: 11 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 02/06/2025
9
+
ms.date: 03/04/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -29,9 +29,6 @@ search.appverid: met150
29
29
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30
30
-[Microsoft Defender for Business](/defender-business/mdb-overview)
31
31
32
-
> [!TIP]
33
-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
34
-
35
32
> [!IMPORTANT]
36
33
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
37
34
@@ -52,37 +49,33 @@ There are three ways you can create indicators for files:
52
49
Understand the following prerequisites before you create indicators for files:
53
50
54
51
-[Behavior Monitoring is enabled](behavior-monitor.md)
55
-
56
52
-[Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57
-
58
53
-[Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
59
-
60
54
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
61
55
62
56
### Windows prerequisites
63
57
64
58
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
65
-
66
-
- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
67
-
59
+
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
68
60
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.
69
-
70
61
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
71
62
72
63
> [!NOTE]
73
64
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
74
65
75
66
### macOS prerequisites
76
67
77
-
-[File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
78
-
79
-
### Linux prerequisites
68
+
- Real-time protection (RTP) needs to be active.
69
+
-[File hash computation must be enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line). Run the following command: `mdatp config enable-file-hash-computation --value enabled`
80
70
81
-
- Available in Defender for Endpoint version 101.85.27 or later.
71
+
> [!NOTE]
72
+
> On Mac, file indicators support Mach-O files (akin to `.exe` and `.dll` in Windows) scripts, such as sh/bash and AppleScript File (`.scpt`) files only.
82
73
83
-
-[File hash computation is enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
74
+
### Linux prerequisites
84
75
85
-
- Behavior monitoring is preferred, but this will work with any other scan (RTP or Custom).
76
+
- Available in Defender for Endpoint version `101.85.27` or later.
77
+
-[File hash computation must be enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
78
+
- Behavior monitoring enabled is preferred, but this feature works with any other scan (RTP or Custom).
86
79
87
80
## Create an indicator for files from the settings page
88
81
@@ -95,9 +88,7 @@ Understand the following prerequisites before you create indicators for files:
95
88
4. Specify the following details:
96
89
97
90
- Indicator: Specify the entity details and define the expiration of the indicator.
98
-
99
91
- Action: Specify the action to be taken and provide a description.
100
-
101
92
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
102
93
103
94
> [!NOTE]
@@ -156,7 +147,7 @@ Timestamp > ago(30d)
156
147
157
148
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
158
149
159
-
Below are other thread names that can be used in the sample query from above:
150
+
Here are other thread names that can be used in the sample query:
Copy file name to clipboardExpand all lines: defender-vulnerability-management/tvm-browser-extensions.md
+18-17Lines changed: 18 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Browser extensions assessment in Microsoft Defender Vulnerability Management
3
-
description: Find out about the browsers extensions installed in your environment
3
+
description: Find out about the browser extensions installed in your environment through Microsoft Defender Vulnerability Management.
4
4
ms.service: defender-vuln-mgmt
5
5
ms.pagetype: security
6
6
ms.author: deniseb
@@ -11,9 +11,10 @@ audience: ITPro
11
11
ms.collection:
12
12
- m365-security
13
13
- Tier1
14
-
ms.topic: conceptual
14
+
ms.topic: concept-article
15
15
search.appverid: met150
16
-
ms.date: 02/23/2025
16
+
ms.date: 03/04/2025
17
+
#customer intent: To learn about the browser extensions installed in your environment through Microsoft Defender Vulnerability Management.
17
18
---
18
19
19
20
# Browser extensions assessment in Microsoft Defender Vulnerability Management
@@ -32,71 +33,71 @@ The information available helps your security team learn about the installed ext
32
33
33
34
## View your browser extensions
34
35
35
-
1.Go to **Vulnerability management**\>**Inventories** in the [Microsoft Defender portal](https://security.microsoft.com).
36
+
1.Sign in to the [Microsoft Defender portal](https://security.microsoft.com).
36
37
37
-
2.Select the **Browser extensions** tab.
38
+
2.Navigate to **Endpoints**\>**Vulnerability management**\>**Inventories**, then select the **Browser extensions** tab.
38
39
39
40
> [!NOTE]
40
41
> Browser extension assessment is only available on Windows devices. Only extensions that exist in Microsoft Edge, Chrome, and Firefox, appear in browser extension list.
41
42
42
43
The **Browser extensions** page opens with a list of the browser extensions installed across your organization, including details on the extension name, browser, the number of devices the extension is installed on, and the number of devices with the extensions turned on.
43
44
44
-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions.png" alt-text="Screenshot of the Browser extensions page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions.png":::
45
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-inventories-small.png" alt-text="Screenshot of the Browser extensions tab" lightbox="/defender/media/defender-vulnerability-management/mdvm-inventories.png":::
45
46
46
47
You can use the Browser filter to view the relevant list of extensions for a particular browser.
47
48
48
49
The **Requested permissions** and **Permissions risk** columns provide more specific information on the number of permissions requested by the extension, and the permissions risk level based on the type of access to devices or sites it requested.
49
50
50
51
Select a browser extension to open its flyout pane, where you can learn more about the extension:
51
52
52
-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_details.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_details.png":::
53
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdm-browserex-pane-small.png" alt-text="Screenshot of the Browser extensions details pane" lightbox="/defender/media/defender-vulnerability-management/mdm-browserex-pane.png":::
53
54
54
-
Where applicable, there's a link available on this page to access the extension in the store it was installed from.
55
+
Where applicable, there's a link available on the flyout pane to access the extension in the store it was installed from.
55
56
56
57
### Browser extension permissions
57
58
58
59
Browser extensions usually need different types of permission to run properly, for example, they might require permission to modify a webpage.
59
60
60
61
Select the **Permissions** tab, from the browser extension flyout pane, to see information on the permissions the browser extension needs to run, and whether this permission is optional or not.
61
62
62
-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_permissions.png" alt-text="Screenshot of the Browser extensions permissions page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_permissions.png":::
63
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-perms-small.png" alt-text="Screenshot of the Browser extensions permissions page" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-perms.png":::
63
64
64
65
The permission risk level generated is based on the type of access the permission is requesting. You can use this information to help make an informed decision on whether you want to allow or block this extension.
65
66
66
67
> [!NOTE]
67
-
> Risk is subjective, and it's up to each organization to determine the types of risk they're willing to take on.
68
+
> Risk is subjective. Each organization should determine the types of risk they're willing to take on.
68
69
69
70
Select a permission to see a further flyout with more information.
70
71
71
72
### View installed devices
72
73
73
74
To see the list of the devices the extension is installed on, choose the **Installed devices** tab from the browser extension flyout pane:
74
75
75
-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_devices.png" alt-text="Screenshot of the Browser extensions devices tab" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_devices.png":::
76
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-installtab-small.png" alt-text="Screenshot of the Browser extensions devices tab" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-installtab.png":::
76
77
77
78
From here, you can search for a particular device the extension is installed on, and you can export a list of the devices to a csv file.
78
79
79
80
### View extension versions
80
81
81
-
Select the **Extensions versions** tab, from the browser extension flyout pane, to see information on the versions of the extension installed in your organization.
82
+
Select the **Extension versions** tab, from the browser extension flyout pane, to see information on the versions of the extension installed in your organization.
82
83
83
-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_versions.png" alt-text="Screenshot of the Browser extensions versions tab" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_versions.png":::
84
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-extension-small.png" alt-text="Screenshot of the Browser extensions versions tab" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-extension.png":::
84
85
85
86
### View extensions users
86
87
87
88
Select the **Users** tab, from the browser extension flyout pane, to see a list of users who installed the browser extension.
88
89
89
-
:::image type="content" source="/defender/media/defender-vulnerability-management/tvm-browser-ext-user-filter.png" alt-text="Screenshot of the Browser extensions user tab." lightbox="/defender/media/defender-vulnerability-management/tvm-browser-ext-user-filter.png":::
90
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-users-small.png" alt-text="Screenshot of the Browser extensions user tab." lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-users.png":::
90
91
91
92
### Browser extensions on devices
92
93
93
94
You can also view a list of extensions installed on a device:
94
95
95
-
1. Select the device from the **Installed devices** tab in the flyout panel and select **Open device page** or select the device directly from the **Device inventory** page.
96
+
1. Select the device from the **Installed devices** tab in the flyout pane and select **Open device page** or select the device directly from the **Device inventory** page.
96
97
97
98
2. Select **Inventories** and then **Browser extensions** to see a list of extensions installed on that device.
98
99
99
-
:::image type="content" source="/defender/media/defender-vulnerability-management/browser_extensions_devicepage.png" alt-text="Screenshot of the Browser extensions in the devices page" lightbox="/defender/media/defender-vulnerability-management/browser_extensions_devicepage.png":::
100
+
:::image type="content" source="/defender/media/defender-vulnerability-management/mdvm-browserex-devicepage-small.png" alt-text="Screenshot of the Browser extensions in the devices page" lightbox="/defender/media/defender-vulnerability-management/mdvm-browserex-devicepage.png":::
100
101
101
102
### Browser extension APIs
102
103
@@ -107,7 +108,7 @@ You can use APIs to view all browser extensions installed in your organization,
107
108
108
109
### Use advanced hunting
109
110
110
-
You can use advanced hunting queries to gain visibility on browser extensions in your organization. Find details about the browser extensions installed per device in the **DeviceTvmBrowserExtensions** table, or browser extension related information, including extensions permission information in the **DeviceTvmBrowserExtensionsKB** table.
111
+
You can use advanced hunting queries to gain visibility on browser extensions in your organization. Find details about the browser extensions installed per device in the [**DeviceTvmBrowserExtensions**](/defender-xdr/advanced-hunting-devicetvmbrowserextensions-table) table, or browser extension related information, including extensions permission information in the [**DeviceTvmBrowserExtensionsKB**](/defender-xdr/advanced-hunting-devicetvmbrowserextensionskb-table) table.
0 commit comments