Skip to content

Commit ab0809f

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-an-1730133935
2 parents e7c4349 + dca2329 commit ab0809f

12 files changed

+141
-316
lines changed

.openpublishing.redirection.defender.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,11 @@
124124
"source_path": "defender-endpoint/techniques-device-timeline.md",
125125
"redirect_url": "/defender-endpoint/device-timeline-event-flag#techniques-in-the-device-timeline",
126126
"redirect_document_id": true
127+
},
128+
{
129+
"source_path": "defender-endpoint/linux-support-rhel.md",
130+
"redirect_url": "/defender-endpoint/comprehensive-guidance-on-linux-deployment",
131+
"redirect_document_id": true
127132
}
128133
]
129134
}

defender-endpoint/TOC.yml

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -459,8 +459,6 @@
459459
href: health-status.md
460460
- name: Troubleshoot cloud connectivity issues
461461
href: linux-support-connectivity.md
462-
- name: Troubleshoot RHEL 6 installation issues
463-
href: linux-support-rhel.md
464462
- name: Troubleshoot performance issues
465463
href: linux-support-perf.md
466464
- name: Troubleshoot missing events issues
@@ -1563,4 +1561,4 @@
15631561
- name: Defender for Business
15641562
href: /defender-business
15651563
- name: Defender Vulnerability Management
1566-
href: /defender-vulnerability-management
1564+
href: /defender-vulnerability-management

defender-endpoint/comprehensive-guidance-on-linux-deployment.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: linux
1616
search.appverid: met150
17-
ms.date: 09/10/2024
17+
ms.date: 10/28/2024
1818
---
1919

2020
# Advanced deployment guidance for Microsoft Defender for Endpoint on Linux
@@ -167,8 +167,6 @@ For a detailed list of supported Linux distros, see [System requirements](micros
167167
|OS version|Kernel filter driver|Comments|
168168
|---|---|---|
169169
|RHEL 7.x, RHEL 8.x, and RHEL 9.x |No kernel filter driver, the fanotify kernel option must be enabled|akin to Filter Manager (fltmgr, accessible via `fltmc.exe`) in Windows|
170-
|RHEL 6.x|TALPA kernel driver|
171-
172170
## 7. Add your existing solution to the exclusion list for Microsoft Defender Antivirus
173171

174172
This step of the setup process involves adding Defender for Endpoint to the exclusion list for your existing endpoint protection solution and any other security products your organization is using. You can choose from several methods to add your exclusions to Microsoft Defender Antivirus.

defender-endpoint/defender-endpoint-demonstration-smartscreen-url-reputation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: asr
17-
ms.date: 01/15/2024
17+
ms.date: 10/28/2024
1818
---
1919

2020
# URL reputation demonstrations
@@ -71,7 +71,7 @@ Blocked from downloading because of its URL reputation
7171

7272
- [Download blocked due to URL reputation](https://demo.smartscreen.msft.net/download/malwaredemo/freevideo.exe)
7373

74-
Launching this link should render a message similar to the Malware page message.
74+
Launching this link should render a warning that the download was blocked as being unsafe by Microsoft Edge.
7575

7676
### Exploit page
7777

defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
33
description: Get an overview of how to configure Microsoft Defender Antivirus in a remote desktop or non-persistent virtual desktop environment.
44
ms.localizationpriority: medium
5-
ms.date: 09/27/2024
5+
ms.date: 10/28/2024
66
ms.topic: conceptual
77
author: denisebmsft
88
ms.author: deniseb
@@ -31,8 +31,7 @@ search.appverid: met150
3131

3232
- Windows
3333

34-
> [!TIP]
35-
> This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside additional device protection capabilities), skip this article and proceed to [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
34+
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), also go through [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
3635

3736
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Following the guidance in this article, you can configure updates to download directly to your RDS or VDI environments when a user signs in.
3837

@@ -43,7 +42,7 @@ This guide describes how to configure Microsoft Defender Antivirus on your VMs f
4342
- [Use quick scans](#use-quick-scans)
4443
- [Prevent notifications](#prevent-notifications)
4544
- [Disable scans from occurring after every update](#disable-scans-after-an-update)
46-
- [Scan out-of-date machines or machines that have been offline for a while](#scan-vms-that-have-been-offline)
45+
- [Scan out-of-date machines or machines that were offline for a while](#scan-vms-that-have-been-offline)
4746
- [Apply exclusions](#exclusions)
4847

4948
> [!IMPORTANT]
@@ -67,7 +66,7 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
6766

6867
5. Enter `\\<Windows File Server shared location\>\wdav-update` (for help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates)).
6968

70-
6. Select **OK**, and then deploy the GPO to the VMs you want to test.
69+
6. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
7170

7271
### PowerShell
7372

@@ -96,10 +95,9 @@ Start-Process -FilePath $vdmpackage -WorkingDirectory $vdmpath -ArgumentList "/x
9695

9796
You can set a scheduled task to run once a day so that whenever the package is downloaded and unpacked then the VMs receive the new update. We suggest starting with once a day, but you should experiment with increasing or decreasing the frequency to understand the impact.
9897

99-
Security intelligence packages are typically published once every three to four hours. Setting a frequency shorter than four hours isn't advisable because it will increase the network overhead on your management machine for no benefit.
98+
Security intelligence packages are typically published once every three to four hours. Setting a frequency shorter than four hours isn't advisable because it increases the network overhead on your management machine for no benefit.
10099

101-
You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption.
102-
This configuration is possible when the devices have the share and read access (NTFS permissions) to the share so they can grab the updates. To set up this configuration, follow these steps:
100+
You can also set up your single server or machine to fetch the updates on behalf of the VMs at an interval and place them in the file share for consumption. This configuration is possible when the devices have share and read access (NTFS permissions) to the share so they can grab the updates. To set up this configuration, follow these steps:
103101

104102
1. Create an SMB/CIFS file share.
105103

@@ -122,7 +120,7 @@ This configuration is possible when the devices have the share and read access (
122120

123121
### Set a scheduled task to run the PowerShell script
124122

125-
1. On the management machine, open the Start menu and type `Task Scheduler`. From the results, Task Scheduler and then select **Create task...** on the side panel.
123+
1. On the management machine, open the Start menu and type `Task Scheduler`. From the results, select Task Scheduler and then select **Create task...** in the side panel.
126124

127125
2. Specify the name as `Security intelligence unpacker`.
128126

@@ -151,7 +149,7 @@ If you would prefer to do everything manually, here's what to do to replicate th
151149
Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
152150

153151
> [!NOTE]
154-
> In the script we set it so the last 12 digits of the GUID are the year, month, day, and time when the file was downloaded so that a new folder is created each time. You can change this so that the file is downloaded to the same folder each time.
152+
> We set the script so that the last 12 digits of the GUID are the year, month, day, and time when the file was downloaded so that a new folder is created each time. You can change this so that the file is downloaded to the same folder each time.
155153
156154
3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
157155

@@ -164,7 +162,7 @@ If you would prefer to do everything manually, here's what to do to replicate th
164162

165163
Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-microsoft-defender-antivirus.md).
166164

167-
The start time of the scan itself is still based on the scheduled scan policy (**ScheduleDay**, **ScheduleTime**, and **ScheduleQuickScanTime**). Randomization will cause Microsoft Defender Antivirus to start a scan on each machine within a four-hour window from the time set for the scheduled scan.
165+
The start time of the scan itself is still based on the scheduled scan policy (**ScheduleDay**, **ScheduleTime**, and **ScheduleQuickScanTime**). Randomization causes Microsoft Defender Antivirus to start a scan on each machine within a four-hour window from the time set for the scheduled scan.
168166

169167
See [Schedule scans](schedule-antivirus-scans.md) for other configuration options available for scheduled scans.
170168

@@ -194,14 +192,14 @@ Sometimes, Microsoft Defender Antivirus notifications are sent to or persist acr
194192

195193
4. Deploy your Group Policy object as you usually do.
196194

197-
Suppressing notifications prevents notifications from Microsoft Defender Antivirus from showing up when scans are done or remediation actions are taken. However, your security operations team will see the results of a scan if an attack is detected and stopped. Alerts, such as an initial access alert, are generated and will appear in the [Microsoft Defender portal](https://security.microsoft.com).
195+
Suppressing notifications prevents notifications from Microsoft Defender Antivirus from showing up when scans are done or remediation actions are taken. However, your security operations team sees the results of a scan if an attack is detected and stopped. Alerts, such as an initial access alert, are generated, and appear in the [Microsoft Defender portal](https://security.microsoft.com).
198196

199197
## Disable scans after an update
200198

201-
Disabling a scan after an update will prevent a scan from occurring after receiving an update. You can apply this setting when creating the base image if you have also run a quick scan. This way, you can prevent the newly updated VM from performing a scan again (as you've already scanned it when you created the base image).
199+
Disabling a scan after an update prevents a scan from occurring after receiving an update. You can apply this setting when creating the base image if you have also run a quick scan. This way, you can prevent the newly updated VM from performing a scan again (as you've already scanned it when you created the base image).
202200

203201
> [!IMPORTANT]
204-
> Running scans after an update will help ensure your VMs are protected with the latest security intelligence updates. Disabling this option will reduce the protection level of your VMs and should only be used when first creating or deploying the base image.
202+
> Running scans after an update helps ensure your VMs are protected with the latest security intelligence updates. Disabling this option reduces the protection level of your VMs and should only be used when first creating or deploying the base image.
205203
206204
1. In your Group Policy Editor, go to **Windows components** \> **Microsoft Defender Antivirus** \> **Security Intelligence Updates**.
207205

@@ -239,7 +237,7 @@ For more information, see [Start the scheduled scan only when computer is on but
239237

240238
5. Deploy your Group Policy Object as you usually do.
241239

242-
This policy forces a scan if the VM has missed two or more consecutive scheduled scans.
240+
This policy forces a scan if the VM missed two or more consecutive scheduled scans.
243241

244242
## Enable headless UI mode
245243

defender-endpoint/indicator-manage.md

Lines changed: 17 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -15,20 +15,18 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: asr
1717
search.appverid: met150
18-
ms.date: 12/18/2020
18+
ms.date: 10/28/2024
1919
---
2020

2121
# Manage indicators
2222

2323
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
2424

25-
2625
**Applies to:**
2726
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2827
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2928
- [Microsoft Defender XDR](/defender-xdr)
3029

31-
3230
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
3331
3432
1. In the navigation pane, select **Settings** \> **Endpoints** \> **Indicators** (under **Rules**).
@@ -55,29 +53,29 @@ Download the sample CSV to know the supported column attributes.
5553

5654
> [!NOTE]
5755
> Only 500 indicators can be uploaded for each batch.
58-
>
5956
> Attempting to import indicators with specific categories requires the string to be written in Pascal case convention and only accepts the category list available at the portal.
6057
6158
The following table shows the supported parameters.
6259

6360
| Parameter|Type|Description |
6461
| ---| ---| --- |
65-
| indicatorType|Enum|Type of the indicator. Possible values are: *FileSha1*, *FileSha256*, *IpAddress*, *DomainName*, and *Url*. **Required** |
66-
| indicatorValue|String|Identity of the [Indicator](api/ti-indicator.md) entity. **Required** |
67-
| action|Enum|The action that is taken if the indicator is discovered in the organization. Possible values are: *Allowed*, *Audit*, *BlockAndRemediate*, *Warn*, and *Block*. **Required** |
68-
| title|String|Indicator alert title. **Required** |
69-
| description|String| Description of the indicator. **Required** |
70-
| expirationTime|DateTimeOffset|The expiration time of the indicator in the following format YYYY-MM-DDTHH:MM:SS.0Z. The indicator gets deleted if the expiration time passes and whatever happens at the expiration time occurs at the seconds (SS) value. **Optional** |
71-
| severity|Enum|The severity of the indicator. Possible values are: *Informational*, *Low*, *Medium*, and *High*. **Optional** |
72-
| recommendedActions|String|TI indicator alert recommended actions. **Optional** |
73-
| rbacGroups|String|Comma-separated list of RBAC groups the indicator would be applied to. **Optional** |
74-
| category|String|Category of the alert. Examples include: Execution and credential access. **Optional** |
75-
| mitretechniques|String|MITRE techniques code/id (comma separated). For more information, see [Enterprise tactics](https://attack.mitre.org/tactics/enterprise/). **Optional** It's recommended to add a value in category when a MITRE technique. |
76-
| GenerateAlert|String|Whether the alert should be generated. Possible Values are: True or False. **Optional** |
62+
| indicatorType|Enum|Type of the indicator. Possible values are: `FileSha1`, `FileSha256`, `IpAddress`, `DomainName`, and `Url`. <br/> **Required** |
63+
| indicatorValue|String|Identity of the [Indicator](api/ti-indicator.md) entity. <br/> **Required** |
64+
| action|Enum|The action that is taken if the indicator is discovered in the organization. Possible values are: `Allowed`, `Audit`, `BlockAndRemediate`, `Warn`, and `Block`. <br/> **Required** |
65+
| title|String|Indicator alert title.<br/> **Required** |
66+
| description|String| Description of the indicator.<br/> **Required** |
67+
| expirationTime|DateTimeOffset|The expiration time of the indicator in the following format `YYYY-MM-DDTHH:MM:SS.0Z`. The indicator gets deleted if the expiration time passes and whatever happens at the expiration time occurs at the seconds (SS) value. <br/>**Optional** |
68+
| severity|Enum|The severity of the indicator. Possible values are: `Informational`, `Low`, `Medium`, and `High`. <br/>**Optional** |
69+
| recommendedActions|String|TI indicator alert recommended actions. <br/>**Optional** |
70+
| rbacGroups|String|Comma-separated list of RBAC groups the indicator would be applied to. <br/>**Optional** |
71+
| category|String|Category of the alert. Examples include: Execution and credential access. <br/>**Optional** |
72+
| mitretechniques|String|MITRE techniques code/id (comma separated). For more information, see [Enterprise tactics](https://attack.mitre.org/tactics/enterprise/). <br/> **Optional** <br/>It's recommended to add a value in category when a MITRE technique. |
73+
| GenerateAlert|String|Whether the alert should be generated. Possible Values are: `True` or `False`. <br/>**Optional** |
7774

7875
> [!NOTE]
79-
> Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported.
80-
For more information, see [Microsoft Defender for Endpoint alert categories are now aligned with MITRE ATT&CK!](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-atp-alert-categories-are-now-aligned-with/ba-p/732748).
76+
> Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported. For more information, see [Microsoft Defender for Endpoint alert categories are now aligned with MITRE ATT&CK!](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/microsoft-defender-atp-alert-categories-are-now-aligned-with/ba-p/732748).
77+
>
78+
> Network indicators do not support the action type, `BlockAndRemediate`. If a network indicator is set to `BlockAndRemediate`, it won't import.
8179
8280
Watch this video to learn how Microsoft Defender for Endpoint provides multiple ways to add and manage Indicators of compromise (IoCs).
8381
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4qLVw]
@@ -89,4 +87,5 @@ Watch this video to learn how Microsoft Defender for Endpoint provides multiple
8987
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
9088
- [Create indicators based on certificates](indicator-certificates.md)
9189
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
90+
9291
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/linux-install-manually.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 10/15/2024
18+
ms.date: 10/28/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -501,7 +501,6 @@ Download the onboarding package from Microsoft Defender portal.
501501
The following external package dependencies exist for the mdatp package:
502502
503503
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage` `selinux-policy-targeted`, `mde-netfilter`
504-
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, `mde-netfilter`
505504
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
506505
- For Mariner the mdatp package requires `attr`, `audit`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
507506

defender-endpoint/linux-support-install.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,14 +68,16 @@ Verify that the package you're installing matches the host distribution and vers
6868

6969
For [manual deployment](linux-install-manually.md), make sure the correct distro and version are selected.
7070

71+
> [!NOTE]
72+
> MDE Linux no longer ships a solution for RHEL 6.
73+
7174
## Installation failed due to dependency error
7275

7376
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
7477

7578
The following external package dependencies exist for the mdatp package:
7679

7780
- The mdatp RPM package requires `glibc >= 2.17`, `audit`, `policycoreutils`, `semanage`, `selinux-policy-targeted`, `mde-netfilter`
78-
- For RHEL6 the mdatp RPM package requires `audit`, `policycoreutils`, `libselinux`, `mde-netfilter`
7981
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `auditd`, `mde-netfilter`
8082

8183
The mde-netfilter package also has the following package dependencies:

0 commit comments

Comments
 (0)