Skip to content

Commit a91ee50

Browse files
committed
Merge branch 'poliveria-threat-analytics-07242024' of https://github.com/MicrosoftDocs/defender-docs-pr into poliveria-threat-analytics-07242024
2 parents 057d80a + e61b17d commit a91ee50

16 files changed

+166
-27
lines changed

defender-endpoint/edr-detection.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/01/2024
18+
ms.date: 08/06/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -33,7 +33,7 @@ ms.date: 08/01/2024
3333
- macOS
3434
- Microsoft Defender for Endpoint
3535
- Microsoft Defender for Endpoint on Linux
36-
- Microsoft Defender for Endpoint on macOS
36+
<!---- Microsoft Defender for Endpoint on macOS--->
3737

3838
Endpoint detection and response for Endpoint provide advanced attack detections that are near real-time and actionable. Security analysts can prioritize alerts effectively, gain visibility into the full scope of a breach, and take response actions to remediate threats.
3939

@@ -43,14 +43,13 @@ Run an EDR detection test to verify that the device is properly onboarded and re
4343

4444
1. Open a Command Prompt window
4545

46-
2. At the prompt, copy and run the command below. The Command Prompt window will close automatically.
46+
2. At the prompt, copy and run the following command. The Command Prompt window closes automatically.
4747

48+
```powershell
49+
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
50+
```
4851

49-
```powershell
50-
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
51-
```
52-
53-
3. If successful, the detection test will be marked as completed and a new alert will appear in few minutes.
52+
3. If successful, the detection test is marked as completed and a new alert appears within a few minutes.
5453

5554
### Linux
5655

@@ -64,7 +63,7 @@ curl -o ~/Downloads/MDE Linux DIY.zip https://aka.ms/MDE-Linux-EDR-DIY
6463
1. Extract the zip
6564

6665
```bash
67-
unzip ~/Downloads/MDE Linux DIY.zip
66+
unzip ~/Downloads/MDE-Linux-EDR-DIY.zip
6867
```
6968

7069
1. And run the following command:
@@ -77,6 +76,7 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
7776

7877
3. Look at the alert details, machine timeline, and perform your typical investigation steps.
7978

79+
<!---
8080
### macOS
8181
8282
1. In your browser, Microsoft Edge for Mac or Safari, download *MDATP MacOS DIY.zip* from [https://aka.ms/mdatpmacosdiy](https://aka.ms/mdatpmacosdiy) and extract.
@@ -129,12 +129,16 @@ After a few minutes, a detection should be raised in Microsoft Defender XDR.
129129
130130
Look at the alert details and the device timeline, and perform the regular investigation steps.
131131
132-
Next steps that you can consider performing are to add AV exclusions as needed for application compatibility or performance:
132+
--->
133+
134+
## Next steps
135+
136+
If you're experiencing issues with application compatibility or performance, you might consider adding exclusions. See the following articles for more information:
133137

134138
- [Configure and validate exclusions for Microsoft Defender for Endpoint on macOS](mac-exclusions.md)
135139
- [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md)
136140
- [Manage suppression rules](manage-suppression-rules.md)
137141
- [Create indicators of compromise (IoC)](manage-indicators.md)
138142
- [Create and manage custom detections rules](/defender-xdr/custom-detection-rules)
139143

140-
Read through [Microsoft Defender for Endpoint Security Operations Guide](mde-sec-ops-guide.md).
144+
Also, see the [Microsoft Defender for Endpoint Security Operations Guide](mde-sec-ops-guide.md).

defender-endpoint/microsoft-defender-antivirus-updates.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Microsoft Defender Antivirus security intelligence and product updates
33
description: Manage how Microsoft Defender Antivirus receives protection and product updates.
44
ms.service: defender-endpoint
55
ms.localizationpriority: high
6-
ms.date: 07/25/2024
6+
ms.date: 08/07/2024
77
audience: ITPro
88
ms.topic: reference
99
author: siosulli
@@ -98,6 +98,23 @@ All our updates contain:
9898
- Serviceability improvements
9999
- Integration improvements (Cloud, [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender))
100100

101+
### July-2024 (Platform: 4.18.24070.5 | Engine: 1.1.24070.3)
102+
103+
- Security intelligence update version: **1.417.14.0**
104+
- Release date: **August 7, 2024** (Engine and Platform)
105+
- Platform: **4.18.24070.5**
106+
- Engine: **1.1.24070.3**
107+
- Support phase: **Security and Critical Updates**
108+
109+
### What's new
110+
111+
- False positive detections are no longer reported as `ThreatNotFound` in the Microsoft Defender portal.
112+
- Optimized Network Protection calls to the backend that occur as a result of suspicious connection checks.
113+
- Fixed the [PerformanceModeStatus](/windows/client-management/mdm/defender-csp#configurationperformancemodestatus) configuration key in Defender CSP so changing this value in the console takes effect on the endpoint.
114+
- Resolved an issue where File Evidence Location was not always captured in scenarios where the Remote Location is inaccessible.
115+
- New event log added (5016) to report Microsoft Defender Antivirus self-healed when a deadlock is detected during shutdown.
116+
- Fixed a prioritization issue with full scans initiated from the portal that resulted in longer than expected full scan duration.
117+
101118
### June-2024 (Platform: 4.18.24060.7 | Engine: 1.1.24060.5)
102119

103120
- Security intelligence update version: **1.415.1.0**

defender-endpoint/microsoft-defender-endpoint-mac.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: macos
1717
search.appverid: met150
18-
ms.date: 05/08/2024
18+
ms.date: 08/06/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Mac
@@ -70,14 +70,17 @@ There are several methods and deployment tools that you can use to install and c
7070
### System requirements
7171

7272
The three most recent major releases of macOS are supported.
73+
7374
- 14 (Sonoma), 13 (Ventura), 12 (Monterey)
75+
7476
> [!IMPORTANT]
7577
> On macOS 11 (Big Sur) and above, Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Big Sur and newer versions of macOS](mac-sysext-policies.md).
7678
77-
- Supported processors: x64 and ARM64.
79+
- Supported processors: x64 and ARM64
80+
7881
- Disk space: 1GB
7982

80-
Beta versions of macOS aren't supported.
83+
- Beta versions of macOS aren't supported.
8184

8285
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
8386

@@ -119,6 +122,8 @@ If a proxy or firewall is blocking anonymous traffic, make sure that anonymous t
119122
>
120123
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint on macOS to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
121124
125+
#### Test network connectivity
126+
122127
To test that a connection isn't blocked, open <https://x.cp.wd.microsoft.com/api/report> and <https://cdn.x.cp.wd.microsoft.com/ping> in a browser.
123128

124129
If you prefer the command line, you can also check the connection by running the following command in Terminal:

defender-endpoint/msda-updates-previous-versions-technical-upgrade-support.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: siosulli
66
author: siosulli
77
ms.localizationpriority: medium
88
ms.reviewer: pahuijbr
9-
ms.date: 07/25/2024
9+
ms.date: 08/07/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,6 +29,22 @@ Microsoft regularly releases [security intelligence updates and product updates
2929

3030
## Engine and platform updates
3131

32+
### April-2024 (Engine: 1.1.24040.1 | Platform: 4.18.24040.4)
33+
34+
- Security intelligence update version: **1.411.7.0**
35+
- Release date: **May 07, 2024** (Engine) / **May 16, 2024** (Platform)
36+
- Engine: **1.1.24040.1**
37+
- Platform: **4.18.24040.4**
38+
- Support phase: **Technical upgrade support (only)**
39+
40+
#### What's new
41+
42+
- Added an opt-out feature for Experimental Configuration Services (ECS) and One collector in the Core Service.
43+
- Fixed an issue where occasionally exclusions deployed via Intune were not being honored when tamper protection was enabled.
44+
- After a new engine version is released, support for older versions (N-2) will now reduce to technical support only. Engine versions older than N-2 are no longer supported.
45+
- Improved health monitoring and telemetry for [attack surface rules](overview-attack-surface-reduction.md) exclusions.
46+
- Updated inaccurate information in [Configure exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) regarding wildcard usage with contextual exclusions.
47+
3248
### March-2024 (Engine: 1.1.24030.4 | Platform: 4.18.24030.9)
3349

3450
- Security intelligence update version: **1.409.1.0**

defender-endpoint/onboard-windows-multi-session-device.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -128,7 +128,15 @@ Also, if you're using FSlogix user profiles, we recommend you follow the guidanc
128128

129129
#### Licensing requirements
130130

131-
Note on licensing: When using Windows Enterprise multi-session, depending on your requirements, you can choose to either have all users licensed through Microsoft Defender for Endpoint (per user), Windows Enterprise E5, Microsoft 365 E5 Security, or Microsoft 365 E5, or have the VM licensed through Microsoft Defender for Cloud.
131+
When using Windows Enterprise multi-session, per our security best practices the virtual machine can be licensed through Microsoft Defender for Servers or you can choose to have all Azure Virtual Desktop virtual machine users licensed through one of the following licenses:
132+
133+
- Microsoft Defender for Endpoint Plan 1 or Plan 2 (per user)
134+
- Windows Enterprise E3
135+
- Windows Enterprise E5
136+
- Microsoft 365 E3
137+
- Microsoft 365 E5 Security
138+
- Microsoft 365 E5
139+
132140
Licensing requirements for Microsoft Defender for Endpoint can be found at: [Licensing requirements](minimum-requirements.md#licensing-requirements).
133141

134142
#### Related Links

defender-office-365/quarantine-admin-manage-messages-files.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.custom:
1818
- seo-marvel-apr2020
1919
description: Admins can learn how to view and manage quarantined messages for all users in Exchange Online Protection (EOP). Admins in organizations with Microsoft Defender for Office 365 can also manage quarantined files in SharePoint Online, OneDrive for Business, and Microsoft Teams.
2020
ms.service: defender-office-365
21-
ms.date: 05/21/2024
21+
ms.date: 08/07/2024
2222
appliesto:
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2424
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -88,6 +88,8 @@ Watch this short video to learn how to manage quarantined messages as an admin.
8888

8989
In the Microsoft Defender portal at <https://security.microsoft.com>, go to **Email & collaboration** \> **Review** \> **Quarantine** \> **Email** tab. Or, to go directly to the **Email** tab on the **Quarantine** page, use <https://security.microsoft.com/quarantine?viewid=Email>.
9090

91+
By default, only the first 100 entries are shown until you scroll down to the bottom of the list, which loads more results.
92+
9193
On the **Email** tab, you can decrease the vertical spacing in the list by clicking :::image type="icon" source="media/m365-cc-sc-standard-icon.png" border="false"::: **Change list spacing to compact or normal** and then selecting :::image type="icon" source="media/m365-cc-sc-compact-icon.png" border="false"::: **Compact list**.
9294

9395
You can sort the entries by clicking on an available column header. Select :::image type="icon" source="media/m365-cc-sc-customize-icon.png" border="false"::: **Customize columns** to change the columns that are shown. The default values are marked with an asterisk (<sup>\*</sup>):
@@ -206,7 +208,7 @@ In the details flyout that opens, the following information is available:
206208
- **Policy type**
207209
- **Policy name**
208210
- **Recipient count**
209-
- **Recipients**: If the message contains multiple recipients, you might need to use [Preview message](#preview-email-from-quarantine) or [View message header](#view-email-message-headers) to see the complete list of recipients.
211+
- **Recipients**: If the message contains many recipients, you can use [Preview message](#preview-email-from-quarantine) or [View message header](#view-email-message-headers) to see the complete list of recipients.
210212

211213
Recipient email addresses always resolve to the primary email address, even if the message was sent to a [proxy address](/exchange/recipients-in-exchange-online/manage-user-mailboxes/add-or-remove-email-addresses).
212214

@@ -489,14 +491,16 @@ In organizations with Microsoft Defender for Office 365 (add-on licenses or incl
489491

490492
#### Take action on multiple quarantined email messages
491493

492-
When you select multiple quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
494+
When you select up to 100 quarantined messages on the **Email** tab by selecting the check boxes next to the first column, the following bulk actions are available on the **Email** tab (depending on the **Release status** values of the messages that you selected):
493495

494496
- [Release quarantined email](#release-quarantined-email)
495497

496498
The only available options to select for bulk actions are **Send a copy of this message to other recipients in your organization** and **Send the message to Microsoft to improve detection (false positive)**.
497499

498500
- [Approve or deny release requests from users for quarantined email](#approve-or-deny-release-requests-from-users-for-quarantined-email)
501+
499502
- [Delete email from quarantine](#delete-email-from-quarantine)
503+
500504
- [Report email to Microsoft for review from quarantine](#report-email-to-microsoft-for-review-from-quarantine)
501505

502506
The only available options to select for bulk actions are **Allow emails with similar attributes** and the related **Remove allow entry after** and **Allow entry note** options.
@@ -520,7 +524,7 @@ Admins can search the audit log to find events for messages that were deleted fr
520524

521525
- **Date and time range (UTC)**
522526
- **Activities - friendly names**: Click in the box, start typing "quarantine" in the :::image type="icon" source="media/m365-cc-sc-search-icon.png" border="false"::: **Search** box that appears, and then select **Deleted Quarantine message** from the results.
523-
- **Users**: If know who deleted the message from quarantine, you can further filter the results by user.
527+
- **Users**: If you know who deleted the message from quarantine, you can further filter the results by user.
524528

525529
3. When you're finished entering the search criteria, select **Search** to generate the search.
526530

0 commit comments

Comments
 (0)