You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -543,7 +543,7 @@ Dependencies: Microsoft Defender Antivirus, RPC
543
543
This rule blocks processes created through [PsExec](/sysinternals/downloads/psexec) and [WMI](/windows/win32/wmisdk/about-wmi) from running. Both PsExec and WMI can remotely execute code. There's a risk of malware abusing functionality of PsExec and WMI for command and control purposes, or to spread an infection throughout an organization's network.
544
544
545
545
> [!WARNING]
546
-
> Only use this rule if you're managing your devices with [Intune](/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
546
+
> Only use this rule if you're managing your devices with [Intune](/mem/intune) or another MDM solution. This rule is incompatible with management through [Microsoft Endpoint Configuration Manager](/configmgr) because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
547
547
548
548
Intune name: `Process creation from PSExec and WMI commands`
Copy file name to clipboardExpand all lines: defender-endpoint/behavioral-blocking-containment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ The following image shows an example of an alert that was triggered by behaviora
62
62
63
63
-**[Endpoint detection and response (EDR) in block mode](edr-in-block-mode.md)** Malicious artifacts or behaviors that are observed through post-breach protection are blocked and contained. EDR in block mode works even if Microsoft Defender Antivirus isn't the primary antivirus solution. (EDR in block mode isn't enabled by default; you turn it on at Microsoft Defender XDR.)
64
64
65
-
Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap).
65
+
Expect more to come in the area of behavioral blocking and containment, as Microsoft continues to improve threat protection features and capabilities. To see what's planned and rolling out now, visit the [Microsoft 365 roadmap](https://www.microsoft.com/microsoft-365/roadmap?filters=Microsoft%20365).
66
66
67
67
## Examples of behavioral blocking and containment in action
Copy file name to clipboardExpand all lines: defender-endpoint/comprehensive-guidance-on-linux-deployment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,7 +102,7 @@ Use the following steps to check the network connectivity of Microsoft Defender
102
102
3. Verify that the traffic isn't being inspected by SSL inspection (TLS inspection). This is the most common network related issue when setting up Microsoft Defender Endpoint, see [Verify SSL inspection isn't being performed on the network traffic](#step-3-verify-ssl-inspection-isnt-being-performed-on-the-network-traffic).
103
103
104
104
> [!NOTE]
105
-
> -It is generally recommended that traffic for Defender for Endpoint is not inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
105
+
> -Traffic for Defender for Endpoint should NOT be inspected by SSL inspection (TLS inspection). This applies to all supported operating systems (Windows, Linux, and MacOS).
106
106
> - To allow connectivity to the consolidated set of URLs or IP addresses, ensure your devices are running the latest component versions. See [Onboarding devices using streamlined connectivity for Microsoft Defender for Endpoint](configure-device-connectivity.md) for more information.
107
107
108
108
For more information see [Troubleshoot cloud connectivity issues](#troubleshoot-cloud-connectivity-issues).
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-certificates.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: asr
17
17
search.appverid: met150
18
-
ms.date: 12/18/2020
18
+
ms.date: 07/31/2024
19
19
---
20
20
21
21
# Create indicators based on certificates
@@ -33,7 +33,7 @@ ms.date: 12/18/2020
33
33
34
34
You can create indicators for certificates. Some common use cases include:
35
35
36
-
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md)and [controlled folder access](controlled-folders.md)but need to allow behaviors from signed applications by adding the certificate in the allow list.
36
+
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
37
37
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.
-[RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
45
+
-[RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)](#rhel-and-variants-centos-fedora-oracle-linux-amazon-linux-2-rocky-and-alma)
46
46
-[SLES and variants](#sles-and-variants)
47
47
-[Ubuntu and Debian systems](#ubuntu-and-debian-systems)
48
48
-[Mariner](#mariner-1)
@@ -58,9 +58,9 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
58
58
59
59
## Configure the Linux software repository
60
60
61
-
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted below as *[channel]*): *insiders-fast*, *insiders-slow*, or *prod*. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
61
+
Defender for Endpoint on Linux can be deployed from one of the following channels (denoted as *[channel]*): *insiders-fast*, *insiders-slow*, or `prod`. Each of these channels corresponds to a Linux software repository. The instructions in this article describe configuring your device to use one of these repositories.
62
62
63
-
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by *prod*.
63
+
The choice of the channel determines the type and frequency of updates that are offered to your device. Devices in *insiders-fast* are the first ones to receive updates and new features, followed later by *insiders-slow* and lastly by `prod`.
64
64
65
65
In order to preview new features and provide early feedback, it's recommended that you configure some devices in your enterprise to use either *insiders-fast* or *insiders-slow*.
66
66
@@ -91,7 +91,7 @@ Options:
91
91
92
92
Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/installation).
93
93
94
-
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky and Alma)
94
+
### RHEL and variants (CentOS, Fedora, Oracle Linux, Amazon Linux 2, Rocky, and Alma)
95
95
96
96
- Install `yum-utils` if it isn't installed yet:
97
97
@@ -128,7 +128,7 @@ Read more [here](https://github.com/microsoft/mdatp-xplat/tree/master/linux/inst
128
128
> [!TIP]
129
129
> Use hostnamectl command to identify system related information including release *[version]*.
130
130
131
-
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the *prod* channel:
131
+
For example, if you're running CentOS 7 and want to deploy Defender for Endpoint on Linux from the `prod` channel:
@@ -493,7 +493,7 @@ Download the onboarding package from Microsoft Defender portal.
493
493
494
494
- Verify that the onboarded Linux server appears in Microsoft Defender XDR. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
495
495
496
-
- Download and extract the [script file](https://aka.ms/LinuxDIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
496
+
- Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server and run the following command: `./mde_linux_edr_diy.sh`
497
497
498
498
- After a few minutes, a detection should be raised in Microsoft Defender XDR.
499
499
@@ -503,16 +503,16 @@ Download the onboarding package from Microsoft Defender portal.
503
503
504
504
The following external package dependencies exist for the mdatp package:
There are multiple fixes and new changes in this release.
51
+
52
+
- Fixes bug in which infected command-line threat information was not showing correctly in security portal.
53
+
- Fixes a bug where disabling a preview feature required a Defender of Endpoint to disable it.
54
+
- Global Exclusions feature using managed JSON is now in Public Preview. available in insiders slow from 101.23092.0012. For more information, see [linux-exclusions](linux-exclusions.md).
55
+
- Updated the Linux default engine version to 1.1.24050.7 and default sigs Version to 1.411.410.0.
0 commit comments