Skip to content

Commit a70e06d

Browse files
committed
2 parents 1ba7059 + bc7922e commit a70e06d

30 files changed

+148
-188
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -543,7 +543,7 @@ Dependencies: Microsoft Defender Antivirus, RPC
543543
This rule blocks processes created through [PsExec](/sysinternals/downloads/psexec) and [WMI](/windows/win32/wmisdk/about-wmi) from running. Both PsExec and WMI can remotely execute code. There's a risk of malware abusing functionality of PsExec and WMI for command and control purposes, or to spread an infection throughout an organization's network.
544544

545545
> [!WARNING]
546-
> Only use this rule if you're managing your devices with [Intune](/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
546+
> Only use this rule if you're managing your devices with [Intune](/mem/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
547547
548548
Intune name: `Process creation from PSExec and WMI commands`
549549

defender-endpoint/behavioral-blocking-containment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ The following image shows an example of an alert that was triggered by behaviora
6262

6363
- **[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)** Malicious artifacts or behaviors that are observed through post-breach protection are blocked and contained. EDR in block mode works even if Microsoft Defender Antivirus isn't the primary antivirus solution. (EDR in block mode isn't enabled by default; you turn it on at Microsoft Defender XDR.)
6464

65-
Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap).
65+
Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=Microsoft%20365).
6666

6767
## Examples of behavioral blocking and containment in action
6868

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ Use the following steps to check the network connectivity of Microsoft Defender
102102
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
103103

104104
> [!NOTE]
105-
> - It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
105+
> - Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
106106
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
107107
108108
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).

defender-endpoint/edr-detection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 01/15/2024
18+
ms.date: 08/01/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -54,11 +54,11 @@ powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionP
5454

5555
### Linux
5656

57-
1. Download [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server
57+
1. Download [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server
5858

5959

6060
```bash
61-
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/LinuxDIY
61+
curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
6262
```
6363

6464
1. Extract the zip

defender-endpoint/indicator-certificates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: asr
1717
search.appverid: met150
18-
ms.date: 12/18/2020
18+
ms.date: 07/31/2024
1919
---
2020

2121
# Create indicators based on certificates
@@ -33,7 +33,7 @@ ms.date: 12/18/2020
3333
3434
You can create indicators for certificates. Some common use cases include:
3535

36-
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) and [controlled folder access](controlled-folders.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
36+
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
3737
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.
3838

3939
## Before you begin

defender-endpoint/linux-install-manually.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/01/2024
18+
ms.date: 08/01/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -42,7 +42,7 @@ This article describes how to deploy Microsoft Defender for Endpoint on Linux ma
4242
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems-1)
4343
- [Mariner](#mariner)
4444
- [Application installation](#application-installation)
45-
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
45+
- [RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
4646
- [SLES and variants](#sles-and-variants)
4747
- [Ubuntu and Debian systems](#ubuntu-and-debian-systems)
4848
- [Mariner](#mariner-1)
@@ -58,9 +58,9 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
5858
5959
## Configure the Linux software repository
6060

61-
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
61+
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted as *[channel]*): *insiders-fast*, *insiders-slow*, or `prod`. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
6262

63-
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
63+
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by `prod`.
6464

6565
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
6666

@@ -91,7 +91,7 @@ Options:
9191

9292
Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/installation).
9393

94-
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)
94+
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)
9595

9696
- Install `yum-utils` if it isn't installed yet:
9797

@@ -128,7 +128,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
128128
> [!TIP]
129129
> Use hostnamectl command to identify system related information including release *[version]*.
130130
131-
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the *prod* channel:
131+
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
132132

133133
```bash
134134
sudo yum-config-manager --add-repo=https://packages.microsoft.com/config/rhel/7/prod.repo
@@ -160,7 +160,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
160160
> [!TIP]
161161
> Use SPident command to identify system related information including release *[version]*.
162162
163-
For example, if you're running SLES 12 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
163+
For example, if you're running SLES 12 and wish to deploy Microsoft Defender for Endpoint on Linux from the `prod` channel:
164164

165165
```bash
166166
sudo zypper addrepo -c -f -n microsoft-prod https://packages.microsoft.com/config/sles/12/prod.repo
@@ -198,7 +198,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
198198
> [!TIP]
199199
> Use hostnamectl command to identify system related information including release *[version]*.
200200
201-
For example, if you're running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the *prod* channel:
201+
For example, if you're running Ubuntu 18.04 and wish to deploy Microsoft Defender for Endpoint on Linux from the `prod` channel:
202202

203203
```bash
204204
curl -o microsoft.list https://packages.microsoft.com/config/ubuntu/18.04/prod.list
@@ -210,7 +210,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
210210
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-[channel].list
211211
```
212212

213-
For example, if you chose *prod* channel:
213+
For example, if you chose `prod` channel:
214214

215215
```bash
216216
sudo mv ./microsoft.list /etc/apt/sources.list.d/microsoft-prod.list
@@ -263,7 +263,7 @@ curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | su
263263
> [!NOTE]
264264
> On Mariner, Insider Fast Channel is not available.
265265
266-
If you want to deploy Defender for Endpoint on Linux from the *prod* channel. Use the following commands
266+
If you want to deploy Defender for Endpoint on Linux from the `prod` channel. Use the following commands
267267

268268
```bash
269269
sudo dnf install mariner-repos-extras
@@ -476,7 +476,7 @@ Download the onboarding package from Microsoft Defender portal.
476476
curl -o /tmp/eicar.com.txt https://secure.eicar.org/eicar.com.txt
477477
```
478478
479-
- You can run additional detection tests on zip files using either of the following commands:
479+
- You can run more detection tests on zip files using either of the following commands:
480480
481481
```bash
482482
curl -o /tmp/eicar_com.zip https://secure.eicar.org/eicar_com.zip
@@ -493,7 +493,7 @@ Download the onboarding package from Microsoft Defender portal.
493493
494494
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
495495
496-
- Download and extract the [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
496+
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
497497
498498
- After a few minutes, a detection should be raised in Microsoft Defender XDR.
499499
@@ -503,16 +503,16 @@ Download the onboarding package from Microsoft Defender portal.
503503
504504
The following external package dependencies exist for the mdatp package:
505505
506-
- The mdatp RPM package requires "glibc >= 2.17", "audit", "policycoreutils", "semanage" "selinux-policy-targeted", "mde-netfilter"
507-
- For RHEL6 the mdatp RPM package requires "audit", "policycoreutils", "libselinux", "mde-netfilter"
508-
- For DEBIAN the mdatp package requires "libc6 >= 2.23", "uuid-runtime", "auditd", "mde-netfilter"
509-
- For Mariner the mdatp package requires "attr", "audit", "diffutils", "libacl", "libattr", "libselinux-utils", "selinux-policy", "policycoreutils", "mde-netfilter"
506+
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, `mde-netfilter`
507+
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, `mde-netfilter`
508+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
509+
- For Mariner the mdatp package requires `attr`, `audit`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
510510
511511
The mde-netfilter package also has the following package dependencies:
512512
513-
- For DEBIAN, the mde-netfilter package requires "libnetfilter-queue1", "libglib2.0-0"
514-
- For RPM, the mde-netfilter package requires "libmnl", "libnfnetlink", "libnetfilter_queue", "glib2"
515-
- For Mariner, the mde-netfilter package requires "libnfnetlink", "libnetfilter_queue"
513+
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1`, `libglib2.0-0`
514+
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2`
515+
- For Mariner, the mde-netfilter package requires `libnfnetlink`, `libnetfilter_queue`
516516
517517
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
518518
@@ -523,7 +523,7 @@ See [Log installation issues](linux-resources.md#log-installation-issues) for mo
523523
524524
## How to migrate from Insiders-Fast to Production channel
525525
526-
1. Uninstall the "Insiders-Fast channel" version of Defender for Endpoint on Linux.
526+
1. Uninstall the `Insiders-Fast channel` version of Defender for Endpoint on Linux.
527527
528528
```bash
529529
sudo yum remove mdatp
@@ -536,13 +536,13 @@ See [Log installation issues](linux-resources.md#log-installation-issues) for mo
536536
```
537537
538538
> [!NOTE]
539-
> The output should show "packages-microsoft-com-fast-prod".
539+
> The output should show `packages-microsoft-com-fast-prod`.
540540
541541
```bash
542542
sudo yum-config-manager --disable packages-microsoft-com-fast-prod
543543
```
544544
545-
1. Redeploy Microsoft Defender for Endpoint on Linux using the "Production channel".
545+
1. Redeploy Microsoft Defender for Endpoint on Linux using the Production channel.
546546
547547
## Uninstallation
548548

defender-endpoint/linux-whatsnew.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,32 @@ This article is updated frequently to let you know what's new in the latest rele
3232

3333
- [What's new in Defender for Endpoint on macOS](mac-whatsnew.md)
3434
- [What's new in Defender for Endpoint on iOS](ios-whatsnew.md)
35+
36+
<details>
37+
<summary> July-2024 (Build: 101.24062.0001 | Release version: 30.124062.0001.0)</summary>
38+
39+
## July-2024 Build: 101.24062.0001 | Release version: 30.124062.0001.0
40+
41+
&ensp;Released: **July 31, 2024**<br/>
42+
&ensp;Published: **July 31, 2024**<br/>
43+
&ensp;Build: **101.24062.0001**<br/>
44+
&ensp;Release version: **30.124062.0001.0**<br/>
45+
&ensp;Engine version: **1.1.24050.7**<br/>
46+
&ensp;Signature version: **1.411.410.0**<br/>
47+
48+
**What's new**
49+
50+
There are multiple fixes and new changes in this release.
51+
52+
- Fixes bug in which infected command-line threat information was not showing correctly in security portal.
53+
- Fixes a bug where disabling a preview feature required a Defender of Endpoint to disable it.
54+
- Global Exclusions feature using managed JSON is now in Public Preview. available in insiders slow from 101.23092.0012. For more information, see [linux-exclusions](linux-exclusions.md).
55+
- Updated the Linux default engine version to 1.1.24050.7 and default sigs Version to 1.411.410.0.
56+
- Stability and performance improvements.
57+
- Other bug fixes.
58+
59+
</details>
60+
3561
<details>
3662
<summary> June-2024 (Build: 101.24052.0002 | Release version: 30.24052.0002.0)</summary>
3763

@@ -1430,4 +1456,4 @@ As an alternative approach, follow the instructions to [uninstall](linux-resourc
14301456

14311457
</details>
14321458

1433-
</details><!--This </details> closes "2021 releases"-->
1459+
</details><!--This </details> closes "2021 releases"-->

0 commit comments

Comments
 (0)