You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# EDR detection test for verifying device's onboarding and reporting services
@@ -33,7 +33,7 @@ ms.date: 08/01/2024
33
33
- macOS
34
34
- Microsoft Defender for Endpoint
35
35
- Microsoft Defender for Endpoint on Linux
36
-
- Microsoft Defender for Endpoint on macOS
36
+
<!---- Microsoft Defender for Endpoint on macOS--->
37
37
38
38
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
39
39
@@ -43,14 +43,13 @@ Run an EDR detection test to verify that the device is properly onboarded and re
43
43
44
44
1. Open a Command Prompt window
45
45
46
-
2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
46
+
2. At the prompt, copy and run the following command. The Command Prompt window closes automatically.
3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
52
+
3. If successful, the detection test is marked as completed and a new alert appears within a few minutes.
54
53
55
54
### Linux
56
55
@@ -64,7 +63,7 @@ curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
64
63
1. Extract the zip
65
64
66
65
```bash
67
-
unzip ~/Downloads/MDELinuxDIY.zip
66
+
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
68
67
```
69
68
70
69
1. And run the following command:
@@ -77,6 +76,7 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
77
76
78
77
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
79
78
79
+
<!---
80
80
### macOS
81
81
82
82
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,12 +129,16 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129
129
130
130
Look at the alert details and the device timeline, and perform the regular investigation steps.
131
131
132
-
Next steps that you can consider performing are to add AV exclusions as needed for application compatibility or performance:
132
+
--->
133
+
134
+
## Next steps
135
+
136
+
If you're experiencing issues with application compatibility or performance, you might consider adding exclusions. See the following articles for more information:
133
137
134
138
-[Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
135
139
-[Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
- Release date: **August 7, 2024** (Engine and Platform)
105
+
- Platform: **4.18.24070.5**
106
+
- Engine: **1.1.24070.3**
107
+
- Support phase: **Security and Critical Updates**
108
+
109
+
### What's new
110
+
111
+
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
112
+
- Optimized Network Protection calls to the backend that occur as a result of suspicious connection checks.
113
+
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in Defender CSP so changing this value in the console takes effect on the endpoint.
114
+
- Resolved an issue where File Evidence Location was not always captured in scenarios where the Remote Location is inaccessible.
115
+
- New event log added (5016) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
116
+
- Fixed a prioritization issue with full scans initiated from the portal that resulted in longer than expected full scan duration.
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-endpoint-mac.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: macos
17
17
search.appverid: met150
18
-
ms.date: 05/08/2024
18
+
ms.date: 08/06/2024
19
19
---
20
20
21
21
# Microsoft Defender for Endpoint on Mac
@@ -70,14 +70,17 @@ There are several methods and deployment tools that you can use to install and c
70
70
### System requirements
71
71
72
72
The three most recent major releases of macOS are supported.
73
+
73
74
- 14 (Sonoma), 13 (Ventura), 12 (Monterey)
75
+
74
76
> [!IMPORTANT]
75
77
> On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).
76
78
77
-
- Supported processors: x64 and ARM64.
79
+
- Supported processors: x64 and ARM64
80
+
78
81
- Disk space: 1GB
79
82
80
-
Beta versions of macOS aren't supported.
83
+
-Beta versions of macOS aren't supported.
81
84
82
85
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
83
86
@@ -119,6 +122,8 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
119
122
>
120
123
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
121
124
125
+
#### Test network connectivity
126
+
122
127
To test that a connection isn't blocked, open <https://x.cp.wd.microsoft.com/api/report> and <https://cdn.x.cp.wd.microsoft.com/ping> in a browser.
123
128
124
129
If you prefer the command line, you can also check the connection by running the following command in Terminal:
- Support phase: **Technical upgrade support (only)**
39
+
40
+
#### What's new
41
+
42
+
- Added an opt-out feature for Experimental Configuration Services (ECS) and One collector in the Core Service.
43
+
- Fixed an issue where occasionally exclusions deployed via Intune were not being honored when tamper protection was enabled.
44
+
- After a new engine version is released, support for older versions (N-2) will now reduce to technical support only. Engine versions older than N-2 are no longer supported.
45
+
- Improved health monitoring and telemetry for [attack surface rules](overview-attack-surface-reduction.md) exclusions.
46
+
- Updated inaccurate information in [Configure exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) regarding wildcard usage with contextual exclusions.
Copy file name to clipboardExpand all lines: defender-endpoint/onboard-windows-multi-session-device.md
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,7 +128,15 @@ Also, if you're using FSlogix user profiles, we recommend you follow the guidanc
128
128
129
129
#### Licensing requirements
130
130
131
-
Note on licensing: When using Windows Enterprise multi-session, depending on your requirements, you can choose to either have all users licensed through Microsoft Defender for Endpoint (per user), Windows Enterprise E5, Microsoft 365 E5 Security, or Microsoft 365 E5, or have the VM licensed through Microsoft Defender for Cloud.
131
+
When using Windows Enterprise multi-session, per our security best practices the virtual machine can be licensed through Microsoft Defender for Servers or you can choose to have all Azure Virtual Desktop virtual machine users licensed through one of the following licenses:
132
+
133
+
- Microsoft Defender for Endpoint Plan 1 or Plan 2 (per user)
134
+
- Windows Enterprise E3
135
+
- Windows Enterprise E5
136
+
- Microsoft 365 E3
137
+
- Microsoft 365 E5 Security
138
+
- Microsoft 365 E5
139
+
132
140
Licensing requirements for Microsoft Defender for Endpoint can be found at: [Licensing requirements](minimum-requirements.md#licensing-requirements).
Copy file name to clipboardExpand all lines: defender-office-365/quarantine-admin-manage-messages-files.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.custom:
18
18
- seo-marvel-apr2020
19
19
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -88,6 +88,8 @@ Watch this short video to learn how to manage quarantined messages as an admin.
88
88
89
89
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration**\>**Review**\>**Quarantine**\>**Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
90
90
91
+
By default, only the first 100 entries are shown until you scroll down to the bottom of the list, which loads more results.
92
+
91
93
On the **Email** tab, you can decrease the vertical spacing in the list by clicking :::image type="icon" source="media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal** and then selecting :::image type="icon" source="media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
92
94
93
95
You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
@@ -206,7 +208,7 @@ In the details flyout that opens, the following information is available:
206
208
-**Policy type**
207
209
-**Policy name**
208
210
-**Recipient count**
209
-
-**Recipients**: If the message contains multiple recipients, you might need to use [Preview message](#preview-email-from-quarantine) or [View message header](#view-email-message-headers) to see the complete list of recipients.
211
+
-**Recipients**: If the message contains many recipients, you can use [Preview message](#preview-email-from-quarantine) or [View message header](#view-email-message-headers) to see the complete list of recipients.
210
212
211
213
Recipient email addresses always resolve to the primary email address, even if the message was sent to a [proxy address](/exchange/recipients-in-exchange-online/manage-user-mailboxes/add-or-remove-email-addresses).
212
214
@@ -489,14 +491,16 @@ In organizations with Microsoft Defender for Office 365 (add-on licenses or incl
489
491
490
492
#### Take action on multiple quarantined email messages
491
493
492
-
When you select multiple quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
494
+
When you select up to 100 quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
The only available options to select for bulk actions are **Send a copy of this message to other recipients in your organization** and **Send the message to Microsoft to improve detection (false positive)**.
497
499
498
500
-[Approve or deny release requests from users for quarantined email](#approve-or-deny-release-requests-from-users-for-quarantined-email)
501
+
499
502
-[Delete email from quarantine](#delete-email-from-quarantine)
503
+
500
504
-[Report email to Microsoft for review from quarantine](#report-email-to-microsoft-for-review-from-quarantine)
501
505
502
506
The only available options to select for bulk actions are **Allow emails with similar attributes** and the related **Remove allow entry after** and **Allow entry note** options.
@@ -520,7 +524,7 @@ Admins can search the audit log to find events for messages that were deleted fr
520
524
521
525
-**Date and time range (UTC)**
522
526
-**Activities - friendly names**: Click in the box, start typing "quarantine" in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box that appears, and then select **Deleted Quarantine message** from the results.
523
-
-**Users**: If know who deleted the message from quarantine, you can further filter the results by user.
527
+
-**Users**: If you know who deleted the message from quarantine, you can further filter the results by user.
524
528
525
529
3. When you're finished entering the search criteria, select **Search** to generate the search.
0 commit comments