You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/attack-surface-reduction-rules-reference.md
+20-3Lines changed: 20 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- m365-security
16
16
- tier2
17
17
- mde-asr
18
-
ms.date: 05/02/2024
18
+
ms.date: 09/07/2024
19
19
search.appverid: met150
20
20
---
21
21
@@ -109,7 +109,6 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
109
109
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
110
110
111
111
> [!NOTE]
112
-
>
113
112
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114
113
>
115
114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
@@ -257,7 +256,6 @@ This rule prevents an application from writing a vulnerable signed driver to dis
257
256
The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
258
257
259
258
> [!NOTE]
260
-
>
261
259
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
262
260
>
263
261
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
@@ -322,6 +320,9 @@ Dependencies: Microsoft Defender Antivirus
322
320
323
321
### Block credential stealing from the Windows local security authority subsystem
324
322
323
+
> [!NOTE]
324
+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
325
+
325
326
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326
327
327
328
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.
@@ -573,6 +574,14 @@ Configuration Manager name: Not yet available
573
574
574
575
GUID: `33ddedf1-c6e0-47cb-833e-de6133960387`
575
576
577
+
Advanced hunting action type:
578
+
579
+
-`AsrSafeModeRebootedAudited`
580
+
581
+
-`AsrSafeModeRebootBlocked`
582
+
583
+
-`AsrSafeModeRebootWarnBypassed`
584
+
576
585
Dependencies: Microsoft Defender Antivirus
577
586
578
587
### Block untrusted and unsigned processes that run from USB
@@ -610,6 +619,14 @@ Configuration Manager name: Not yet available
Copy file name to clipboardExpand all lines: defender-endpoint/edr-block-mode-faqs.yml
+3-5Lines changed: 3 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ metadata:
15
15
- partner-contribution
16
16
ms.topic: faq
17
17
ms.collection: m365-security
18
-
ms.date: 04/26/2024
18
+
ms.date: 09/07/2024
19
19
20
20
title: Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)
21
21
summary: |
@@ -38,14 +38,12 @@ sections:
38
38
- question: |
39
39
Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
40
40
answer: |
41
-
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) or by [automated investigation & remediation capabilities](automated-investigations.md) in block mode.
42
-
43
-
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product.
41
+
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. However, there are scenarios where EDR in block mode might be beneficial, such as if Microsoft Defender Antivirus is misconfigured, or if [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) is not enabled. In such cases, EDR in block mode can automatically remediate detections like PUA.
44
42
45
43
- question: |
46
44
Will EDR in block mode affect a user's antivirus protection?
47
45
answer: |
48
-
EDR in block mode does not affect third-party antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
46
+
EDR in block mode does not affect non-Microsoft antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
49
47
50
48
- question: |
51
49
Why do I need to keep Microsoft Defender Antivirus up to date?
Copy file name to clipboardExpand all lines: defender-endpoint/linux-support-ebpf.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice: linux
17
17
search.appverid: met150
18
-
ms.date: 08/22/2024
18
+
ms.date: 09/07/2024
19
19
---
20
20
21
21
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -62,6 +62,10 @@ The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the
62
62
| Oracle Linux RHCK | 7.9 | 3.10.0-1160 |
63
63
| Oracle Linux UEK | 7.9 | 5.4 |
64
64
| Amazon Linux 2 | 2 | 5.4.261-174.360|
65
+
| Rocky Linux 8 | 8.7 | 4.18.0-425 |
66
+
| Rocky Linux 9 | 9.2 | 5.14.0-284 |
67
+
| Alma Linux 8 | 8.4 | 4.18.0-305 |
68
+
| Alma Linux 9 | 9.2 | 5.14.0-284 |
65
69
66
70
> [!NOTE]
67
71
> Oracle Linux 8.8 with kernel version 5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64 will result in kernel hang when eBPF is enabled as supplementary subsystem provider. This kernel version should not be used for eBPF mode. Refer to Troubleshooting and Diagnostics section for mitigation steps.
@@ -153,7 +157,7 @@ The following two sets of data help analyze potential issues and determine the m
153
157
154
158
#### Troubleshooting performance issues
155
159
156
-
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirusexclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
160
+
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirus exclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
0 commit comments