Skip to content

Commit ada0b4e

Browse files
authored
Merge branch 'main' into docs-editor/microsoft-defender-endpoint-li-1736518061
2 parents 859d781 + bcd6b43 commit ada0b4e

18 files changed

+554
-1051
lines changed

defender-endpoint/live-response.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
ms.topic: conceptual
1515
ms.subservice: edr
1616
search.appverid: met150
17-
ms.date: 04/03/2024
17+
ms.date: 01/10/2025
1818
---
1919

2020
# Investigate entities on devices using live response
@@ -229,9 +229,9 @@ Here are some examples:
229229

230230
Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
231231

232-
Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
232+
Live response allows PowerShell and Bash scripts to run; however, you must first put the files into the library before you can run them.
233233

234-
You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
234+
You can have a collection of PowerShell and Bash scripts that can run on devices that you initiate live response sessions with.
235235

236236
#### To upload a file in the library
237237

@@ -311,7 +311,7 @@ Live response supports table and JSON format output types. For each command, the
311311
312312
## Supported output pipes
313313

314-
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
314+
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: `[command] > [filename].txt`.
315315

316316
Example:
317317

defender-endpoint/microsoft-defender-antivirus-compatibility.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 10/17/2024
7+
ms.date: 01/10/2025
88
ms.topic: conceptual
99
author: emmwalshh
1010
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132132

133133
- Endpoints must be onboarded to Defender for Endpoint.
134134

135+
- Windows Security Center Service must be enabled.
136+
137+
> [!WARNING]
138+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140+
135141
> [!IMPORTANT]
136142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).

defender-endpoint/run-analyzer-macos-linux.md

Lines changed: 18 additions & 431 deletions
Large diffs are not rendered by default.

defender-endpoint/troubleshoot-av-performance-issues-with-procmon.md

Lines changed: 42 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.reviewer: yonghree
77
manager: deniseb
88
ms.service: defender-endpoint
99
ms.topic: troubleshooting-general
10-
ms.date: 01/06/2025
10+
ms.date: 01/10/2025
1111
ms.subservice: ngp
1212
ms.localizationpriority: medium
1313
ms.collection:
@@ -21,6 +21,12 @@ ai-usage: human-only
2121

2222
# Troubleshoot Microsoft Defender Antivirus performance issues with Process Monitor
2323

24+
> [!TIP]
25+
> First, review common reasons for performance issues, such as high CPU usage. See **[Troubleshoot performance issues related to Microsoft Defender Antivirus real-time protection (rtp) or scans (scheduled or on-demand](/defender-endpoint/troubleshoot-performance-issues)**.
26+
> Then, run the **[Microsoft Defender Antivirus Performance Analyzer](/defender-endpoint/tune-performance-defender-antivirus)**This tool will help identify the cause of high CPU usage in Microsoft Defender Antivirus, whether it's the Antimalware Service Executable, the Microsoft Defender Antivirus service, or MsMpEng.exe.
27+
>If the Microsoft Defender Antivirus Performance Analyzer doesn't identify the root cause of the high CPU utilization, proceed with running **[Processor Monitor](/defender-endpoint/troubleshoot-av-performance-issues-with-procmon)**.
28+
>The final tool in your toolkit to run is [Windows Performance Recorder UI (WPRUI) or Windows Performance Recorded (WPR command-line)](/defender-endpoint/troubleshoot-av-performance-issues-with-wprui).
29+
2430
## Capture process logs using Process Monitor
2531

2632
Process Monitor (ProcMon) is an advanced monitoring tool that provides real-time data on processes. It can be used to capture performance issues, such as high CPU usage, and to monitor application compatibility scenarios as they occur.
@@ -33,9 +39,9 @@ There are two ways to capture a Process Monitor (ProcMon) trace:
3339

3440
### Using the MDE Client Analyzer
3541

36-
1. Download the [MDE Client Analyzer ](/defender-endpoint/download-client-analyzer).
42+
1. Download the [MDE Client Analyzer](/defender-endpoint/download-client-analyzer).
3743

38-
1. Run the MDE Client Analyzer using [Live Response or locally ](/defender-endpoint/run-analyzer-windows).
44+
1. Run the MDE Client Analyzer using [Live Response or locally](/defender-endpoint/run-analyzer-windows).
3945

4046
> [!TIP]
4147
> Before starting the trace, please make sure that the issue is reproducible. Additionally, close any applications that do not contribute to the reproduction of the issue.
@@ -50,84 +56,70 @@ There are two ways to capture a Process Monitor (ProcMon) trace:
5056

5157
1. Download [Process Monitor v3.89](/sysinternals/downloads/procmon) to a folder like `C:\temp`.
5258

53-
1. To remove the file's mark of the web:
59+
2. To remove the file's mark of the web:
5460

5561
1. Right-click **ProcessMonitor.zip** and select **Properties**.
56-
62+
5763
1. Under the *General* tab, look for *Security*.
58-
64+
5965
1. Check the box beside **Unblock**.
60-
66+
6167
1. Select **Apply**.
62-
68+
6369
![Screenshot showing the Remove MOTW page.](media/procmon-motw.png)
6470

65-
1. Unzip the file in `C:\temp` so that the folder path is `C:\temp\ProcessMonitor`.
71+
3. Unzip the file in `C:\temp` so that the folder path is `C:\temp\ProcessMonitor`.
6672

67-
1. Copy **ProcMon.exe** to the Windows client or Windows server you're troubleshooting.
73+
4. Copy **ProcMon.exe** to the Windows client or Windows server you're troubleshooting.
6874

69-
> [!TIP]
75+
> [!TIP]
7076
> Before running ProcMon, make sure all other applications not related to the high CPU usage issue are closed. Taking this step helps to minimize the number of processes to check.
7177
72-
1. You can launch ProcMon in two ways.
78+
5. You can launch ProcMon in two ways.
7379

7480
1. Right-click **ProcMon.exe** and select **Run as administrator**.
75-
76-
Since logging starts automatically, stop the capture by selecting the magnifying glass icon or pressing **Ctrl+E**.
77-
81+
82+
- Since logging starts automatically, stop the capture by selecting the magnifying glass icon or pressing **Ctrl+E**.
83+
7884
![Screenshot showing the magnifying glass icon.](media/procmon-magglass.png)
79-
80-
To confirm the capture has stopped, look for a red X on the magnifying glass icon.
81-
85+
86+
2. To confirm the capture has stopped, look for a red X on the magnifying glass icon.
87+
8288
![Screenshot showing a red slash.](media/procmon-magglass-stop.png)
83-
84-
Next, to clear the earlier capture, select the eraser icon.
85-
86-
![Screenshot showing the clear icon](media/procmon-eraser-clear.png)
87-
88-
Or use the keyboard shortcut **Ctrl+X**.
89-
90-
1. Run the **command line** as admin, then from the Process Monitor path, run:
91-
89+
![Screenshot showing the clear icon.](media/procmon-eraser-clear.png)
90+
91+
3. Run the **command line** as admin, then from the Process Monitor path, run:
92+
9293
![Screenshot showing the cmd procmon.](media/cmd-procmon.png)
93-
94-
ConsoleEdit development language
95-
96-
97-
```
98-
Procmon.exe /AcceptEula /Noconnect /Profiling
99-
```
100-
94+
10195
> [!TIP]
10296
> Make the ProcMon window as small as possible when capturing data so you can easily start and stop the trace.
103-
104-
![Screenshot showing the page with Procmon minimized.](media/procmon-minimize.png)
105-
106-
1. After completing step 6, set filters by selecting **OK**. You can filter the results after the capture is complete.
97+
> ![Screenshot showing the page with Procmon minimized.](media/procmon-minimize.png)
98+
99+
6. After completing step 6, set filters by selecting **OK**. You can filter the results after the capture is complete.
107100

108101
![Screenshot showing the page where System Exclude is chosen as the Filter out Process Name.](media/procmon-filter-options.png)
109102

110-
1. To start the capture, select the magnifying glass icon again.
103+
7. To start the capture, select the magnifying glass icon again.
111104

112-
1. Reproduce the problem.
105+
8. Reproduce the problem.
113106

114-
> [!TIP]
107+
> [!TIP]
115108
> Wait for the problem to be reproduced, then note the timestamp when the trace begins.
116109
117-
1. After capturing two to four minutes of process activity during high CPU usage, stop the capture by clicking the magnifying glass icon.
110+
9. After capturing two to four minutes of process activity during high CPU usage, stop the capture by clicking the magnifying glass icon.
118111

119-
1. To save the capture with a unique name in the `.pml` format, go to **File** then click **Save...**. Ensure you select the radio buttons **All events** and **Native Process Monitor Format (PML)**.
112+
10. To save the capture with a unique name in the `.pml` format, go to **File** then click **Save...**. Ensure you select the radio buttons **All events** and **Native Process Monitor Format (PML)**.
120113

121-
![Screenshot showing the save settings page](media/procmon-savesettings1.png)
114+
![Screenshot showing the save settings page.](media/procmon-savesettings1.png)
122115

123-
1. For better tracking, change the default path from `C:\temp\ProcessMonitor\LogFile.PML` to `C:\temp\ProcessMonitor\%ComputerName%_LogFile_MMDDYEAR_Repro_of_issue.PML` where:
116+
11. For better tracking, change the default path from `C:\temp\ProcessMonitor\LogFile.PML` to `C:\temp\ProcessMonitor\%ComputerName%_LogFile_MMDDYEAR_Repro_of_issue.PML` where:
124117

125118
- `%ComputerName%` is the device name
126119
- `MMDDYEAR` is the month, day, and year
127120
- `Repro_of_issue` is the name of the issue you're trying to reproduce
128-
129-
> [!TIP]
130-
> If you have a working system, you might want to get a sample log to compare.
131121

132-
1. Zip the `.pml` file and submit it to Microsoft Support.
122+
> [!TIP]
123+
> If you have a working system, you might want to get a sample log to compare.
133124
125+
12. Zip the `.pml` file and submit it to Microsoft Support.

defender-office-365/defender-for-office-365-whats-new.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
88
author: chrisda
99
manager: deniseb
1010
ms.localizationpriority: medium
11-
ms.date: 12/17/2024
11+
ms.date: 01/10/2025
1212
audience: ITPro
1313
ms.collection:
1414
- m365-security
@@ -39,6 +39,10 @@ For more information on what's new with other Microsoft Defender security produc
3939
- [What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
4040
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4141

42+
## January 2025
43+
44+
- [Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for iOS and Android version 4.2446 or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
45+
4246
## December 2024
4347

4448
- [Considerations for integrating non-Microsoft security services with Microsoft 365](mdo-integrate-security-service.md): Considerations and recommendations for deploying a defense-in-depth email security strategy using third-party security services.

defender-office-365/how-policies-and-protections-are-combined.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.custom:
1717
description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.
1818
ms.service: defender-office-365
1919
search.appverid: met150
20-
ms.date: 09/16/2024
20+
ms.date: 01/10/2025
2121
appliesto:
2222
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2323
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -186,8 +186,8 @@ Tenant allows and blocks are able to override some filtering stack verdicts as d
186186
|Not spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
187187

188188
- [Allow entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#allow-entries-in-the-tenant-allowblock-list): There are two types of allow entries:
189-
- Message level allow entries act on the entire message, regardless of the entities in the message. Allow entries for email address and domains are message level allow entries.
190-
- Entity level allow entries act on the filtering verdict of entities. Allow entries for URLs, spoofed senders, and files are entity level allow entries. To override malware and high confidence phishing verdicts, you need to use entity level allow entries, which you can create by submission only due to [Secure by default in Microsoft 365](secure-by-default.md).
189+
- **Message level** allow entries act on the entire message, regardless of the entities in the message. Allow entries for email address and domains are message level allow entries. These allow entries override bulk and spam verdicts, and high confidence phishing verdicts from machine learning models.
190+
- **Entity level** allow entries act on the filtering verdict of entities. Allow entries for URLs, spoofed senders, and files are entity level allow entries. To override malware and high confidence phishing verdicts, you need to use entity level allow entries, which you can create by submission only due to [Secure by default in Microsoft 365](secure-by-default.md).
191191

192192
|Filtering stack verdict|Email address/domain|
193193
|---|---|

defender-office-365/submissions-outlook-report-messages.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
description: Learn how to report phishing and suspicious emails in supported versions of Outlook using the built-in Report button or the Report Message and Report Phishing add-ins.
1515
ms.service: defender-office-365
1616
search.appverid: met150
17-
ms.date: 11/08/2024
17+
ms.date: 01/10/2025
1818
appliesto:
1919
- ✅ <a href="https://learn.microsoft.com/defender-office-365/eop-about" target="_blank">Exchange Online Protection</a>
2020
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -43,6 +43,7 @@ Admins configure user reported messages to go to a specified reporting mailbox,
4343
- The built-in **Report** button is available in the following versions of Outlook:
4444
- Outlook for Microsoft 365 version 16.0.17827.15010 or later and Outlook 2021 Version 2407 (Build 17830.20138) or later.
4545
- Outlook for Mac version 16.89 (24090815) or later.
46+
- Outlook for iOS and Android version 4.2446 or later.
4647
- The new Outlook for Windows.
4748
- Outlook on the web.
4849

0 commit comments

Comments
 (0)