You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/manage-tamper-protection-microsoft-365-defender.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,8 +76,8 @@ search.appverid: met150
76
76
77
77
- If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device.
78
78
79
-
- You can use [Intune](manage-tamper-protection-intune.md) or [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection.
80
-
79
+
- You can use [Intune](manage-tamper-protection-intune.md), Microsoft Defender Endpoint or [Configuration Manager](manage-tamper-protection-configuration-manager.md) to exclude devices from tamper protection.
80
+
81
81
- If you're managing tamper protection through Intune and certain other conditions are met, you can [manage tamper-protected antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions).
|Anti-malware|Medium | Information about malicious APKs including install source, storage location, time of install, etc.; [More information](android-privacy.md#app-information)
54
-
||
55
-
|Jailbreak|High | NA |NA |
56
-
|Rogue Wifi |Low |||
57
-
|Open Network detection | Informational|||
58
-
Suspicious certificates |Informational| | |
53
+
|Anti-malware|Medium | Information about malicious APKs including install source, storage location, time of install, etc.; [More information](android-privacy.md#app-information)||
54
+
|||||
55
+
|Jailbreak|High | NA |NA |
56
+
|Rogue Wifi |Low |||
57
+
|Open Network Detection (Migrated from alert to event in the device timeline)|NA|||
58
+
|Suspicious Certificates Downloaded/Installed (Migrated from alert to event in the device timeline)|NA|||
59
59
60
60
[Complete privacy information for Android](android-privacy.md)
Copy file name to clipboardExpand all lines: defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,14 +55,14 @@ When tamper protection is turned on, these tamper-protected settings can't be ch
55
55
- Automatic actions are taken on detected threats.
56
56
- Notifications are visible in the Windows Security app on Windows devices.
57
57
- Archived files are scanned.
58
-
-[Exclusions can't be modified or added ](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions)(Applies to devices managed by Intune only or by Configuration Manager only. Co-Managed devices aren't supported)
58
+
-[Exclusions can't be modified or added ](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions)
59
59
60
60
*As of signature release `1.383.1159.0`, due to confusion around the default value for "Allow Scanning Network Files", tamper protection no longer locks this setting to its default value. In managed environments, the default value is `enabled`.*
61
61
62
62
> [!IMPORTANT]
63
-
> When tamper protection is turned on, tamper-protected settings can't be changed. To avoid breaking management experiences, including [Intune](manage-tamper-protection-intune.md) and [Configuration Manager](manage-tamper-protection-configuration-manager.md), keep in mind that changes made to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
64
-
> - If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device.
65
-
> - You can use Intune or Configuration Manager to exclude devices from tamper protection.
63
+
> When tamper protection is turned on, tamper-protected settings can't be changed. To avoid breaking management experiences, including [Intune](manage-tamper-protection-intune.md), [Microsoft Defender for Endpoint](/defender-endpoint/manage-tamper-protection-microsoft-365-defender) and [Configuration Manager](manage-tamper-protection-configuration-manager.md), keep in mind that changes made to tamper-protected settings might appear to succeed but are actually blocked by tamper protection. Depending on your particular scenario, you have several options available:
64
+
- If you must make changes to a device and those changes are blocked by tamper protection, you can use [troubleshooting mode](enable-troubleshooting-mode.md) to temporarily disable tamper protection on the device.
65
+
> - You can use Intune, Microsoft Defender for Endpoint or Configuration Manager to exclude devices from tamper protection.
66
66
67
67
Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how non-Microsoft antivirus apps register with the Windows Security app. If your organization is using Defender for Endpoint, individual users can't change the tamper protection setting; in those cases, your security team manages tamper protection. For more information, see [How do I configure or manage tamper protection](#how-do-i-configure-or-manage-tamper-protection)?
68
68
@@ -104,7 +104,7 @@ You can use Microsoft Intune and other methods to configure or manage tamper pro
104
104
105
105
| Method | What you can do |
106
106
|:---|:---|
107
-
| Use the [Microsoft Defender portal](https://security.microsoft.com). |Turn tamper protection on (or off), tenant wide. See [Manage tamper protection for your organization using Microsoft Defender XDR](manage-tamper-protection-microsoft-365-defender.md). <br/><br/>*This method doesn't override settings that are managed in Microsoft Intune or Configuration Manager.*|
107
+
| Use the [Microsoft Defender portal](https://security.microsoft.com). |Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using Microsoft Defender XDR](manage-tamper-protection-microsoft-365-defender.md). <br/><br/>|
108
108
| Use the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) or [Configuration Manager](/mem/configmgr/protect/deploy-use/endpoint-protection-configure). | Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using Intune](manage-tamper-protection-intune.md).<br/><br/>Protect Microsoft Defender Antivirus exclusions from tampering if you're using Intune only or Configuration Manager only. See [Tamper protection for antivirus exclusions](manage-tamper-protection-intune.md#tamper-protection-for-antivirus-exclusions). |
109
109
| Use [Configuration Manager with tenant attach](manage-tamper-protection-configuration-manager.md). | Turn tamper protection on (or off), tenant wide, or apply tamper protection to some users/devices. You can exclude certain devices from tamper protection. See [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](manage-tamper-protection-configuration-manager.md). |
110
110
| Use the [Windows Security app](manage-tamper-protection-individual-device.md). | Turn tamper protection on (or off) on an individual device that isn't managed by a security team (such as devices for home use). See [Manage tamper protection on an individual device](manage-tamper-protection-individual-device.md).<br/><br/>*This method doesn't override tamper protection settings that are set in the Microsoft Defender portal, Intune, or Configuration Manager, and it isn't intended to be used by organizations.*|
Copy file name to clipboardExpand all lines: defender-endpoint/run-analyzer-linux.md
+51-9Lines changed: 51 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,25 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
36
36
37
37
## Running the binary version of the client analyzer
38
38
39
+
### Run ClientAnalyzer binary shipped MDE:
40
+
> [!NOTE]
41
+
> Starting with the Defender for Endpoint version `101.25062.0000`, the Client Analyzer is shipped with agent. It can be found at the location `/opt/microsoft/mdatp/conf/client_analyzer/binary`
42
+
43
+
To run this client analyzer follow the steps:
44
+
1. Go to directory `/opt/microsoft/mdatp/conf/client_analyzer/binary`:
45
+
46
+
```bash
47
+
cd /opt/microsoft/mdatp/conf/client_analyzer/binary
48
+
```
49
+
2. Run the tool as _root_ to generate diagnostic package:
50
+
51
+
```bash
52
+
sudo ./MDESupportTool -d
53
+
```
54
+
### Download and run ClientAnalyzer binary
55
+
56
+
Follow the below steps if you are using Defender for Endpoint older than `101.25062.0000`
57
+
39
58
1. Download the [XMDE Client Analyzer Binary](https://aka.ms/XMDEClientAnalyzerBinary) tool to the Linux machine that you're to investigating. If you're using a terminal, download the tool by entering the following command:
40
59
41
60
```bash
@@ -86,6 +105,29 @@ If you have issues with Microsoft Defender for Endpoint on Linux and need suppor
86
105
> [!WARNING]
87
106
> Running the Python-based client analyzer requires the installation of PIP packages which could cause some issues in your environment. To avoid issues from occurring, we recommend that you install the packages into a user PIP environment.
88
107
108
+
### Run ClientAnalyzer python version shipped MDE
109
+
> [!NOTE]
110
+
> Starting with the Defender for Endpoint version `101.25062.0000`, the Client Analyzer is shipped with agent. It can be found at the location `/opt/microsoft/mdatp/conf/client_analyzer/python`
111
+
112
+
To run this client analyzer follow the steps:
113
+
1. Go to directory `/opt/microsoft/mdatp/conf/client_analyzer/python`:
114
+
115
+
```bash
116
+
cd /opt/microsoft/mdatp/conf/client_analyzer/python
117
+
```
118
+
2. Run as a root user to install required dependencies.
119
+
120
+
```bash
121
+
sudo ./mde_support_tool.sh
122
+
```
123
+
3. To collect the diagnostic package and generate the result archive file, run again as root.
124
+
125
+
```bash
126
+
sudo ./mde_support_tool.sh -d
127
+
```
128
+
129
+
### Download and run ClientAnalyzer python version
130
+
89
131
1. Download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer) tool on the Linux machine you need to investigate. If you're using a terminal, download the tool by entering the following command:
90
132
91
133
```bash
@@ -485,24 +527,24 @@ The following script performs the first six steps of the [Running the Binary ver
echo"MDESupportTool installed at /tmp/XMDEClientAnalyzerBinary/ClientAnalyzer"
503
-
545
+
504
546
```
505
-
547
+
506
548
#### Python client analyzer install script
507
549
508
550
The following script performs the first six steps of the [Running the Python version of the Client Analyzer](run-analyzer-linux.md#running-the-python-based-client-analyzer). When complete, the XMDE Client Analyzer Python scripts are available from the `/tmp/XMDEClientAnalyzer` directory.
0 commit comments