You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/client-behavioral-blocking.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ Antivirus protection works best when paired with cloud protection.
46
46
47
47
[Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) can detect suspicious behavior, malicious code, fileless and in-memory attacks, and more on a device. When suspicious behaviors are detected, Microsoft Defender Antivirus monitors and sends those suspicious behaviors and their process trees to the cloud protection service. Machine learning differentiates between malicious applications and good behaviors within milliseconds, and classifies each artifact. In almost real time, as soon as an artifact is found to be malicious, it's blocked on the device.
48
48
49
-
Whenever a suspicious behavior is detected, an [alert](alerts-queue.md) is generated and is visible while the attack was detected and stopped; alerts, such as an "initial access alert," are triggered and appear in the [Microsoft Defender portal](/defender-xdr/microsoft-365-defender) (formerly Microsoft Defender XDR).
49
+
Whenever a suspicious behavior is detected, an [alert](alerts-queue.md) is generated and is visible while the attack was detected and stopped; alerts, such as an "initial access alert," are triggered and appear in the [Microsoft Defender portal](/defender-xdr/microsoft-365-defender).
50
50
51
51
Client behavioral blocking is effective because it not only helps prevent an attack from starting, it can help stop an attack that has begun executing. And, with [feedback-loop blocking](feedback-loop-blocking.md) (another capability of behavioral blocking and containment), attacks are prevented on other devices in your organization.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md
+38-42Lines changed: 38 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
5
5
author: denisebmsft
6
6
ms.author: deniseb
7
7
ms.localizationpriority: medium
8
-
ms.date: 02/18/2024
8
+
ms.date: 10/25/2024
9
9
manager: deniseb
10
10
audience: ITPro
11
11
ms.collection:
@@ -19,31 +19,23 @@ search.appverid: met150
19
19
20
20
# Contextual file and folder exclusions
21
21
22
-
**Applies to:**
23
-
24
-
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25
-
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26
-
27
-
- Microsoft Defender for Business
28
-
29
-
- Microsoft Defender Antivirus
30
-
31
-
- Microsoft Defender for individuals
32
-
33
22
This article/section describes the contextual file and folder exclusions capability for Microsoft Defender Antivirus on Windows. This capability allows you to be more specific when you define under which context Microsoft Defender Antivirus shouldn't scan a file or folder, by applying restrictions.
34
23
35
24
## Overview
36
25
37
-
Exclusions are primarily intended to mitigate affects on performance. They come at the penalty of reduced protection value. These restrictions allow you to limit this protection reduction by specifying circumstances under which the exclusion should apply. Contextual exclusions aren't suitable for addressing false positives in a reliable way. If you encounter a false positive, you can submit files for analysis through the [Microsoft Defender XDR](https://security.microsoft.com/) portal (subscription required) or through the [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/filesubmission) website. For a temporary suppression method, consider creating a custom _allow_ indicator in [Microsoft Defender for Endpoint](indicator-file.md).
26
+
Exclusions are primarily intended to mitigate affects on performance. They come at the penalty of reduced protection value. These restrictions allow you to limit this protection reduction by specifying circumstances under which the exclusion should apply. Contextual exclusions aren't suitable for addressing false positives in a reliable way. If you encounter a false positive, you can submit files for analysis through the [Microsoft Defender portal](https://security.microsoft.com/) (subscription required) or through the [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/filesubmission) website. For a temporary suppression method, consider creating a custom _allow_ indicator in [Microsoft Defender for Endpoint](indicator-file.md).
38
27
39
28
There are four restrictions you can apply to limit the applicability of an exclusion:
40
29
41
-
-**File/folder path type restriction**. You can restrict exclusions to only apply if the target is a file, or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, it will not apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion will apply.
30
+
-**File/folder path type restriction**. You can restrict exclusions to only apply if the target is a file, or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, the exclusion doesn't apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion applies.
31
+
42
32
-**Scan type restriction**. Enables you to define the required scan type for an exclusion to apply. For example, you only want to exclude a certain folder from Full scans but not from a "resource" scan (targeted scan).
43
-
-**Scan trigger type restriction**. You can use this restriction to specify that the exclusion should only apply when the scan was initiated by a specific event:
44
-
- on demand
45
-
- on access
46
-
- or originating from behavioral monitoring
33
+
34
+
-**Scan trigger type restriction**. You can use this restriction to specify that the exclusion should only apply when the scan is initiated by a specific event, such as:
35
+
- on demand;
36
+
- on access; or
37
+
- originating from behavioral monitoring.
38
+
47
39
-**Process restriction**. Enables you to define that an exclusion should only apply when a file or folder is being accessed by a specific process.
48
40
49
41
## Configuring restrictions
@@ -52,21 +44,23 @@ Restrictions are typically applied by adding the restriction type to the file or
This capability requires Microsoft Defender Antivirus:
54
+
This capability requires Microsoft Defender Antivirus.
55
+
56
+
- Platform version: **4.18.2205.7** or later
57
+
- Engine version: **1.1.19300.2** or later
63
58
64
-
- Platform: **4.18.2205.7** or later
65
-
- Engine: **1.1.19300.2** or later
59
+
See [Microsoft Defender Antivirus security intelligence and product updates](microsoft-defender-antivirus-updates.md).
66
60
67
61
### Syntax
68
62
69
-
As a starting point, you may already have exclusions in place that you wish to make more specific. To form the exclusion string, first define the path to the file or folder to be excluded, then add the type name and associated value, as shown in the following example.
63
+
As a starting point, you might already have exclusions in place that you wish to make more specific. To form the exclusion string, first define the path to the file or folder to be excluded, then add the type name and associated value, as shown in the following example.
70
64
71
65
`<PATH>\:{TypeName:value,TypeName:value}`
72
66
@@ -75,28 +69,27 @@ Keep in mind that _all_ **types** and **values** are case sensitive.
75
69
> [!NOTE]
76
70
> Conditions inside `{}` MUST be true for the restriction to match. For example, if you specify two scan triggers this cannot be true, and the exclusion will not apply. To specify two restrictions of the same type, create two separate exclusions.
77
71
78
-
79
72
### Examples
80
73
81
-
The following string excludes "c:\documents\design.doc" only if it's a file and only in on-access scans:
74
+
The following string excludes `c:\documents\design.doc` only if it's a file and only in on-access scans:
The following string excludes "c:\documents\design.doc" only if it's scanned (on-access) due to it being accessed by a process having the image name "winword.exe":
78
+
The following string excludes `c:\documents\design.doc` only if it's scanned (on-access), due to it being accessed by a process having the image name `winword.exe`:
You can restrict exclusions to only apply if the target is a file or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, the exclusion won't apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion will apply.
92
+
You can restrict exclusions to only apply if the target is a file or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, the exclusion doesn't apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion applies.
100
93
101
94
#### File/folder exclusions default behavior
102
95
@@ -113,9 +106,7 @@ To ensure an exclusion only applies if the target is a folder, not a file you ca
113
106
114
107
#### Files
115
108
116
-
To make sure an exclusion only applies if the target is a file, not a folder you can use the PathType: file restriction.
117
-
118
-
Example:
109
+
To make sure an exclusion only applies if the target is a file, not a folder you can use the PathType: file restriction. For example:
119
110
120
111
`C:\documents\*.mdb\:{PathType:file}`
121
112
@@ -124,7 +115,7 @@ Example:
124
115
By default, exclusions apply to all scan types:
125
116
126
117
-**resource**: a single file or folder is scanned in a targeted way (for example, right-click, Scan)
127
-
-**quick**: common startup locations utilized by malware, memory and certain registry keys
118
+
-**quick**: common startup locations utilized by malware, memory, and certain registry keys
128
119
-**full**: includes quick scan locations and complete file system (all files and folders)
129
120
130
121
To mitigate performance issues, you can exclude a folder or a set of files from being scanned by a specific scan type. You can also define the required scan type for an exclusion to apply.
@@ -133,19 +124,19 @@ To exclude a folder from being scanned only during a full scan, specify a restri
133
124
134
125
`C:\documents\:{ScanType:full}`
135
126
136
-
To exclude a folder from being scanned only during a quick scan, specify a restriction type together with the file or folder exclusion:
127
+
To exclude a folder from being scanned only during a quick scan, specify a restriction type together with the file or folder exclusion, as in the following example:
137
128
138
129
`C:\program.exe\:{ScanType:quick}`
139
130
140
-
If you want to make sure this exclusion only applies to a specific file and not a folder (c:\foo.exe could be a folder), also apply the PathType restriction:
131
+
If you want to make sure this exclusion only applies to a specific file and not a folder (c:\foo.exe could be a folder), also apply the `PathType` restriction, as in the following example:
141
132
142
133
`C:\program.exe\:{ScanType:quick,PathType:file}`
143
134
144
135
### Scan trigger restriction
145
136
146
-
By default, basic exclusions apply to all scan triggers. ScanTrigger restriction enables you to specify that the exclusion should only apply when the scan was initiated by a specific event; on demand (including quick, full and targeted scans), on access or originating from behavioral monitoring (including memory scans).
137
+
By default, basic exclusions apply to all scan triggers. ScanTrigger restriction enables you to specify that the exclusion should only apply when the scan was initiated by a specific event; on demand (including quick, full, and targeted scans), on access or originating from behavioral monitoring (including memory scans).
147
138
148
-
-**OnDemand**: a scan was triggered by a command or admin action. Remember that scheduled quick and full scans also fall under this category.
139
+
-**OnDemand**: a scan that's triggered by a command or admin action. Remember that scheduled quick and full scans also fall under this category.
149
140
-**OnAccess**: a file or folder is opened/written/read/modified (typically considered real-time protection)
150
141
-**BM**: a behavioral trigger causes the behavioral monitoring to scan a specific file
151
142
@@ -158,7 +149,6 @@ To exclude a file or folder and its contents from being scanned only when the fi
158
149
This restriction allows you to define that an exclusion should only apply when a file or folder is being accessed by a specific process. A common scenario is when you want to avoid excluding the process as that avoidance would cause Defender Antivirus to ignore other operations by that process. Wildcards are supported in the process name/path.
159
150
160
151
> [!NOTE]
161
-
>
162
152
> Using a large amount of process exclusion restrictions on a machine can adversely affect performance. In addition, if an exclusion is restricted to a certain process or processes, other active processes (such as indexing, backup, updates) can still trigger file scans.
163
153
164
154
To exclude a file or folder only when accessed by a specific process, create a normal file or folder exclusion and add the process to restrict the exclusion to. For example:
@@ -169,5 +159,11 @@ To exclude a file or folder only when accessed by a specific process, create a n
169
159
170
160
After constructing your desired contextual exclusions, you can use your existing management tool to configure file and folder exclusions using the string you created.
171
161
172
-
See: [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md)
162
+
See [Configure and validate exclusions for Microsoft Defender Antivirus scans](configure-exclusions-microsoft-defender-antivirus.md).
0 commit comments