Skip to content

Commit ac33af5

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/defender-docs-pr (branch live)
2 parents 2294044 + b9a54b2 commit ac33af5

7 files changed

+67
-25
lines changed

defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ Because Microsoft Defender Antivirus is built into Windows, it doesn't require e
260260

261261
### Windows Update files or Automatic Update files
262262

263-
- `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb`
263+
- `%windir%\SoftwareDistribution\Datastore\Datastore.edb`
264264
- `%windir%\SoftwareDistribution\Datastore\*\edb.chk`
265265
- `%windir%\SoftwareDistribution\Datastore\*\edb\*.log`
266266
- `%windir%\SoftwareDistribution\Datastore\*\Edb\*.jrs`

defender-endpoint/mac-preferences.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -739,7 +739,7 @@ The following configuration profile (or, if there's JAMF, a property list that c
739739
<key>PayloadOrganization</key>
740740
<string>Microsoft</string>
741741
<key>PayloadIdentifier</key>
742-
<string>
742+
<string/>
743743
<key>PayloadDisplayName</key>
744744
<string>Microsoft Defender for Endpoint configuration settings</string>
745745
<key>PayloadDescription</key>

defender-endpoint/manage-tamper-protection-microsoft-365-defender.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,8 +76,8 @@ search.appverid: met150
7676

7777
- If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device.
7878

79-
- You can use [Intune](manage-tamper-protection-intune.md) or [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection.
80-
79+
- You can use [Intune](manage-tamper-protection-intune.md), Microsoft Defender Endpoint or [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection.
80+
8181
- If you're managing tamper protection through Intune and certain other conditions are met, you can [manage tamper-protected antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
8282

8383
## See also

defender-endpoint/mobile-resources-defender-endpoint.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -50,12 +50,12 @@ Microsoft Defender for Endpoint provides multiple capabilities on mobile devices
5050
|-----------|-----------|---------|---------|
5151
|Anti-phishing (Defender warning)|Informational| URL of malicious connection, connection information, Protocol type; [More information](android-privacy.md#web-page--network-information) | Domain name, IP address of malicious website; [More information](ios-privacy.md#web-page-or-network-information) |
5252
|Anti-phishing (Defender warning overlooked)|Low | | |
53-
|Anti-malware| Medium | Information about malicious APKs including install source, storage location, time of install, etc.; [More information](android-privacy.md#app-information)
54-
| |
55-
|Jailbreak| High | NA |NA |
56-
|Rogue Wifi | Low | | |
57-
|Open Network detection | Informational | | |
58-
Suspicious certificates |Informational| | |
53+
|Anti-malware|Medium | Information about malicious APKs including install source, storage location, time of install, etc.; [More information](android-privacy.md#app-information)||
54+
| ||||
55+
|Jailbreak|High | NA |NA |
56+
|Rogue Wifi |Low | | |
57+
|Open Network Detection (Migrated from alert to event in the device timeline)|NA | | |
58+
|Suspicious Certificates Downloaded/Installed (Migrated from alert to event in the device timeline)|NA| | |
5959

6060
[Complete privacy information for Android](android-privacy.md)
6161

defender-endpoint/navigate-defender-endpoint-antivirus-exclusions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ For more information, see [Automatic server role exclusions](configure-server-ex
161161

162162
Examples include:
163163

164-
- `%windir%\SoftwareDistribution\Datastore\*\Datastore.edb`
164+
- `%windir%\SoftwareDistribution\Datastore\Datastore.edb`
165165
- `%allusersprofile%\NTUser.pol`
166166
- Windows Update files
167167
- Windows Security files

defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -55,14 +55,14 @@ When tamper protection is turned on, these tamper-protected settings can't be ch
5555
- Automatic actions are taken on detected threats.
5656
- Notifications are visible in the Windows Security app on Windows devices.
5757
- Archived files are scanned.
58-
- [Exclusions can't be modified or added ](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions) (Applies to devices managed by Intune only or by Configuration Manager only. Co-Managed devices aren't supported)
58+
- [Exclusions can't be modified or added ](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions)
5959

6060
*As of signature release `1.383.1159.0`, due to confusion around the default value for "Allow Scanning Network Files", tamper protection no longer locks this setting to its default value. In managed environments, the default value is `enabled`.*
6161

6262
> [!IMPORTANT]
63-
> When tamper protection is turned on, tamper-protected settings can't be changed. To avoid breaking management experiences, including [Intune](manage-tamper-protection-intune.md) and [Configuration Manager](manage-tamper-protection-configuration-manager.md), keep in mind that changes made to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
64-
> - If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device.
65-
> - You can use Intune or Configuration Manager to exclude devices from tamper protection.
63+
> When tamper protection is turned on, tamper-protected settings can't be changed. To avoid breaking management experiences, including [Intune](manage-tamper-protection-intune.md), [Microsoft Defender for Endpoint](/defender-endpoint/manage-tamper-protection-microsoft-365-defender) and [Configuration Manager](manage-tamper-protection-configuration-manager.md), keep in mind that changes made to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
64+
- If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device.
65+
> - You can use Intune, Microsoft Defender for Endpoint or Configuration Manager to exclude devices from tamper protection.
6666
6767
Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how non-Microsoft antivirus apps register with the Windows Security app. If your organization is using Defender for Endpoint, individual users can't change the tamper protection setting; in those cases, your security team manages tamper protection. For more information, see [How do I configure or manage tamper protection](#how-do-i-configure-or-manage-tamper-protection)?
6868

@@ -104,7 +104,7 @@ You can use Microsoft Intune and other methods to configure or manage tamper pro
104104

105105
| Method | What you can do |
106106
|:---|:---|
107-
| Use the [Microsoft Defender portal](https://security.microsoft.com). | Turn tamper protection on (or off), tenant wide. See [Manage tamper protection for your organization using Microsoft Defender XDR](manage-tamper-protection-microsoft-365-defender.md). <br/><br/>*This method doesn't override settings that are managed in Microsoft Intune or Configuration Manager.* |
107+
| Use the [Microsoft Defender portal](https://security.microsoft.com). |Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using Microsoft Defender XDR](manage-tamper-protection-microsoft-365-defender.md). <br/><br/>|
108108
| Use the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) or [Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure). | Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using Intune](manage-tamper-protection-intune.md).<br/><br/>Protect Microsoft Defender Antivirus exclusions from tampering if you're using Intune only or Configuration Manager only. See [Tamper protection for antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions). |
109109
| Use [Configuration Manager with tenant attach](manage-tamper-protection-configuration-manager.md). | Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md). |
110110
| Use the [Windows Security app](manage-tamper-protection-individual-device.md). | Turn tamper protection on (or off) on an individual device that isn't managed by a security team (such as devices for home use). See [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md).<br/><br/>*This method doesn't override tamper protection settings that are set in the Microsoft Defender portal, Intune, or Configuration Manager, and it isn't intended to be used by organizations.* |

defender-endpoint/run-analyzer-linux.md

Lines changed: 51 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,25 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
3636
3737
## Running the binary version of the client analyzer
3838

39+
### Run ClientAnalyzer binary shipped MDE:
40+
> [!NOTE]
41+
> Starting with the Defender for Endpoint version `101.25062.0000`, the Client Analyzer is shipped with agent. It can be found at the location `/opt/microsoft/mdatp/conf/client_analyzer/binary`
42+
43+
To run this client analyzer follow the steps:
44+
1. Go to directory `/opt/microsoft/mdatp/conf/client_analyzer/binary`:
45+
46+
```bash
47+
cd /opt/microsoft/mdatp/conf/client_analyzer/binary
48+
```
49+
2. Run the tool as _root_ to generate diagnostic package:
50+
51+
```bash
52+
sudo ./MDESupportTool -d
53+
```
54+
### Download and run ClientAnalyzer binary
55+
56+
Follow the below steps if you are using Defender for Endpoint older than `101.25062.0000`
57+
3958
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine that you're to investigating. If you're using a terminal, download the tool by entering the following command:
4059

4160
```bash
@@ -86,6 +105,29 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
86105
> [!WARNING]
87106
> Running the Python-based client analyzer requires the installation of PIP packages which could cause some issues in your environment. To avoid issues from occurring, we recommend that you install the packages into a user PIP environment.
88107
108+
### Run ClientAnalyzer python version shipped MDE
109+
> [!NOTE]
110+
> Starting with the Defender for Endpoint version `101.25062.0000`, the Client Analyzer is shipped with agent. It can be found at the location `/opt/microsoft/mdatp/conf/client_analyzer/python`
111+
112+
To run this client analyzer follow the steps:
113+
1. Go to directory `/opt/microsoft/mdatp/conf/client_analyzer/python`:
114+
115+
```bash
116+
cd /opt/microsoft/mdatp/conf/client_analyzer/python
117+
```
118+
2. Run as a root user to install required dependencies.
119+
120+
```bash
121+
sudo ./mde_support_tool.sh
122+
```
123+
3. To collect the diagnostic package and generate the result archive file, run again as root.
124+
125+
```bash
126+
sudo ./mde_support_tool.sh -d
127+
```
128+
129+
### Download and run ClientAnalyzer python version
130+
89131
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool on the Linux machine you need to investigate. If you're using a terminal, download the tool by entering the following command:
90132
91133
```bash
@@ -485,24 +527,24 @@ The following script performs the first six steps of the [Running the Binary ver
485527
486528
```bash
487529
#! /usr/bin/bash
488-
530+
489531
echo "Starting Client Analyzer Script. Running As:"
490532
whoami
491-
533+
492534
echo "Getting XMDEClientAnalyzerBinary"
493535
wget --quiet -O /tmp/XMDEClientAnalyzerBinary.zip https://aka.ms/XMDEClientAnalyzerBinary
494-
echo '4E96E75B16244BB25BDBF34CBB3EB596BC2E9CE368BC4E532E8AE12DF2A1E19D /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
495-
536+
echo 'C65A4E4C6851D130942BFACD147A9D18B8A92B4F50FACF519477FD1C41A1C323 /tmp/XMDEClientAnalyzerBinary.zip' | sha256sum -c
537+
496538
echo "Unzipping XMDEClientAnalyzerBinary.zip"
497539
unzip -q /tmp/XMDEClientAnalyzerBinary.zip -d /tmp/XMDEClientAnalyzerBinary
498-
540+
499541
echo "Unzipping SupportToolLinuxBinary.zip"
500-
unzip -q /tmp/XMDEClientAnalyzerBinary/SupportToolLinuxBinary.zip -d /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer
501-
542+
unzip -q /tmp/XMDEClientAnalyzerBinary/XMDEClientAnalyzer/SupportToolLinuxBinary.zip -d /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer
543+
502544
echo "MDESupportTool installed at /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer"
503-
545+
504546
```
505-
547+
506548
#### Python client analyzer install script
507549
508550
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](run-analyzer-linux.md#running-the-python-based-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.

0 commit comments

Comments
 (0)