Skip to content

Commit a42b155

Browse files
authored
Merge branch 'main' into patch-1
2 parents 57dce5d + 0bc95dc commit a42b155

File tree

6 files changed

+62
-226
lines changed

6 files changed

+62
-226
lines changed

.openpublishing.redirection.defender.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -224,6 +224,11 @@
224224
"source_path": "defender-endpoint/defender-endpoint-demonstration-amsi.md",
225225
"redirect_url": "/defender-endpoint/mde-demonstration-amsi",
226226
"redirect_document_id": true
227-
}
227+
},
228+
{
229+
"source_path": "defender-xdr/device-profile.md",
230+
"redirect_url": "/defender-xdr/entity-page-device",
231+
"redirect_document_id": true
232+
}
228233
]
229234
}

defender-endpoint/android-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 08/30/2024
18+
ms.date: 10/18/2024
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -197,9 +197,9 @@ Defender for Endpoint supports vulnerability assessment of apps in the work prof
197197
1. In [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Apps** \> **App configuration policies** \\> **Add** > **Managed devices**.
198198
2. Give the policy a name; **Platform \> Android Enterprise**; select the profile type.
199199
3. Select **Microsoft Defender for Endpoint** as the target app.
200-
4. In Settings page, select **Use configuration designer** and add **DefenderTVMPrivacyMode** as the key and value type as **Integer**
200+
1. In Settings page, select **Use configuration designer** and add **Enable TVM Privacy** as the key and value type as **Integer**
201201

202-
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
202+
- To disable vulnerability of apps in the work profile, enter value as `1` and assign this policy to users. By default, this value is set to `0`.
203203
- For users with key set as `0`, Defender for Endpoint sends the list of apps from the work profile to the backend service for vulnerability assessment.
204204

205205
5. Select **Next** and assign this profile to targeted devices/users.

defender-endpoint/indicator-file.md

Lines changed: 40 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 09/03/2024
9+
ms.date: 10/17/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -32,46 +32,56 @@ search.appverid: met150
3232
> [!TIP]
3333
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
3434
35-
Prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization.
35+
> [!IMPORTANT]
36+
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
37+
38+
> [!NOTE]
39+
> For this feature to work on Windows Server 2016 and Windows Server 2012 R2, those devices must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2).
40+
> Custom file indicators with the Allow, Block and Remediate actions are now also available in the [enhanced antimalware engine capabilities for macOS and Linux](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enhanced-antimalware-engine-capabilities-for-linux-and-macos/ba-p/3292003).
41+
42+
File indicators prevent further propagation of an attack in your organization by banning potentially malicious files or suspected malware. If you know a potentially malicious portable executable (PE) file, you can block it. This operation will prevent it from being read, written, or executed on devices in your organization.
3643

3744
There are three ways you can create indicators for files:
3845

3946
- By creating an indicator through the settings page
4047
- By creating a contextual indicator using the add indicator button from the file details page
4148
- By creating an indicator through the [Indicator API](api/ti-indicator.md)
4249

43-
> [!NOTE]
44-
> For this feature to work on Windows Server 2016 and Windows Server 2012 R2, those devices must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2).
45-
> Custom file indicators with the Allow, Block and Remediate actions are now also available in the [enhanced antimalware engine capabilities for macOS and Linux](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enhanced-antimalware-engine-capabilities-for-linux-and-macos/ba-p/3292003).
50+
4651

4752
## Before you begin
4853

4954
Understand the following prerequisites before you create indicators for files:
5055

51-
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
5256
- [Behavior Monitoring is enabled](behavior-monitor.md)
5357

5458
- [Cloud-based protection is turned on](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
5559

5660
- [Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
5761

62+
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
63+
64+
### Windows prerequisites
65+
66+
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
5867
- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#monthly-platform-and-engine-versions)
5968

6069
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.
6170

62-
- In `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\`, the file hash computation feature should be set to **Enabled**
63-
64-
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
65-
66-
This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web.
71+
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
6772

6873
> [!NOTE]
6974
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
7075
76+
### macOS prerequisites
7177

78+
- [File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
7279

73-
> [!IMPORTANT]
74-
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
80+
### linux prerequisites
81+
82+
- Available in Defender for Endpoint version 101.85.27 or later.
83+
84+
- [File hash computation is enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) from the portal or in the managed JSON
7585

7686
## Create an indicator for files from the settings page
7787

@@ -105,28 +115,28 @@ Files automatically blocked by an indicator won't show up in the file's Action c
105115
106116
The current supported actions for file IOC are allow, audit and block, and remediate. After choosing to block a file, you can choose whether triggering an alert is needed. In this way, you'll be able to control the number of alerts getting to your security operations teams and make sure only required alerts are raised.
107117

108-
In Microsoft Defender XDR, go to **Settings** > **Endpoints** > **Indicators** > **Add New File Hash**.
109-
110-
Choose to Block and remediate the file.
118+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **Indicators** > **Add New File Hash**.
111119

112-
Choose if to Generate an alert on the file block event and define the alerts settings:
120+
2. Choose to block and remediate the file.
113121

114-
- The alert title
115-
- The alert severity
116-
- Category
117-
- Description
118-
- Recommended actions
122+
3. Specify whether to generate an alert on the file block event and define the alerts settings:
119123

120-
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
124+
- The alert title
125+
- The alert severity
126+
- Category
127+
- Description
128+
- Recommended actions
121129

122-
> [!IMPORTANT]
123-
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
124-
- If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
125-
- In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
126-
- If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
130+
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
127131

128-
> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
129-
> > For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
132+
> [!IMPORTANT]
133+
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
134+
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash
135+
IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
136+
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
137+
> - If the EnableFileHashComputation group policy is disabled, the blocking accuracy of the file IoC is reduced. However, enabling `EnableFileHashComputation` may impact device performance. For example, copying large files from a network share onto your local device, especially over a VPN connection, might have an effect on device performance.
138+
> For more information about the EnableFileHashComputation group policy, see [Defender CSP](/windows/client-management/mdm/defender-csp).
139+
> For more information on configuring this feature on Defender for Endpoint on Linux and macOS, see [Configure file hash computation feature on Linux](linux-preferences.md#configure-file-hash-computation-feature) and [Configure file hash computation feature on macOS](mac-preferences.md#configure-file-hash-computation-feature).
130140
131141
> ## Advanced hunting capabilities (preview)
132142

defender-office-365/attack-simulation-training-insights.md

Lines changed: 13 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.custom:
1414
description: Admins can learn how Attack simulation training in the Microsoft Defender portal affects users and can gain insights from simulation and training outcomes.
1515
search.appverid: met150
16-
ms.date: 08/14/2024
16+
ms.date: 10/18/2024
1717
appliesto:
1818
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 2</a>
1919
---
@@ -220,12 +220,18 @@ If you hover over a data point in the chart, the actual values are shown.
220220

221221
The details table below the chart shows the following information. You can sort the information by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. By default, all available columns are selected.
222222

223-
- **User**
224-
- **Simulation types**
225-
- **Simulations**
226-
- **Email address**
227-
- **Last repeat count**
228-
- **Repeat offenses**
223+
- **User**: Name of the user.
224+
- **Simulation types**: Type of simulations where the user was involved.
225+
- **Simulations**: Name of simulations where the user was involved.
226+
- **Email address**: Email address of the user.
227+
- **Latest repeat count**: Latest count of compromises for users categorized as repeat offenders. For example, if the repeat offender threshold is set to 3, and a user was compromised in 3 consecutive simulations, then the latest repeat count is 3. If the user was compromised in 4 consecutive simulations, then the latest repeat count is 4. If the user was compromised in 2 consecutive simulations, then the value N/A. The latest repeat count sets to 0 (N/A), every time a repeat offender flag is reset (meaning the user passes a simulation).
228+
- **Repeat offences**: Includes the number of times a user was classified as a repeat offender. For example:
229+
- The user was classified as a repeat offender in first few simulations (they were compromised 3 consecutive times, where repeat offender threshold is 2).
230+
- The user was classified as 'clean' after passing a simulation.
231+
- The user was classified as a repeat offender in the next few simulations (they were compromised 4 consecutive times, where repeat offender threshold is 2).
232+
233+
In these cases, the number of repeat offences is set to 2. The count updates every time a user is considered a repeat offender.
234+
229235
- **Last simulation name**
230236
- **Last simulation result**
231237
- **Last training assigned**

defender-xdr/TOC.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -549,8 +549,6 @@
549549
href: configure-email-notifications.md
550550
- name: Set time zone
551551
href: m365d-time-zone.md
552-
- name: View device profiles
553-
href: device-profile.md
554552
- name: Troubleshoot service issues
555553
href: troubleshoot.md
556554
- name: Set up dynamic rules for devices

0 commit comments

Comments
 (0)