Skip to content

Commit ba6869d

Browse files
authored
Update date, formatting, and prerequisites in documentation
1 parent b89adbe commit ba6869d

File tree

1 file changed

+9
-23
lines changed

1 file changed

+9
-23
lines changed

defender-endpoint/indicator-file.md

Lines changed: 9 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 02/06/2025
9+
ms.date: 03/04/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -29,9 +29,6 @@ search.appverid: met150
2929
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
3030
- [Microsoft Defender for Business](/defender-business/mdb-overview)
3131

32-
> [!TIP]
33-
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-automationexclusionlist-abovefoldlink)
34-
3532
> [!IMPORTANT]
3633
> In Defender for Endpoint Plan 1 and Defender for Business, you can create an indicator to block or allow a file. In Defender for Business, your indicator is applied across your environment and cannot be scoped to specific devices.
3734
@@ -52,42 +49,33 @@ There are three ways you can create indicators for files:
5249
Understand the following prerequisites before you create indicators for files:
5350

5451
- [Behavior Monitoring is enabled](behavior-monitor.md)
55-
5652
- [Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57-
5853
- [Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
59-
6054
- To start blocking files, [turn on the "block or allow" feature](advanced-features.md) in Settings (in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features** > **Allow or block file**).
6155

6256
### Windows prerequisites
6357

6458
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
65-
66-
- The Antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
67-
59+
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
6860
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, or Windows Server 2022.
69-
7061
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
7162

7263
> [!NOTE]
7364
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
7465
7566
### macOS prerequisites
7667

77-
- Real-Time Protection (RTP) needs to be active.
78-
79-
- [File hash computation is enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line) by running `mdatp config enable-file-hash-computation --value enabled`
68+
- Real-time protection (RTP) needs to be active.
69+
- [File hash computation must be enabled](/defender-endpoint/mac-resources#configuring-from-the-command-line). Run the following command: `mdatp config enable-file-hash-computation --value enabled`
8070

8171
> [!NOTE]
82-
> File indicators for macOS, supports Mach-O files (akin to .exe's and dll's in Windows), scripts such as sh/bash, and AppleScript File (.scpt) files only.
72+
> On Mac, file indicators support Mach-O files (akin to `.exe` and `.dll` in Windows) scripts, such as sh/bash and AppleScript File (`.scpt`) files only.
8373
8474
### Linux prerequisites
8575

86-
- Available in Defender for Endpoint version 101.85.27 or later.
87-
88-
- [File hash computation is enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
89-
90-
- Behavior monitoring is preferred, but this will work with any other scan (RTP or Custom).
76+
- Available in Defender for Endpoint version `101.85.27` or later.
77+
- [File hash computation must be enabled](/defender-endpoint/linux-preferences#configure-file-hash-computation-feature) in the Microsoft Defender portal or in the managed JSON
78+
- Behavior monitoring enabled is preferred, but this feature works with any other scan (RTP or Custom).
9179

9280
## Create an indicator for files from the settings page
9381

@@ -100,9 +88,7 @@ Understand the following prerequisites before you create indicators for files:
10088
4. Specify the following details:
10189

10290
- Indicator: Specify the entity details and define the expiration of the indicator.
103-
10491
- Action: Specify the action to be taken and provide a description.
105-
10692
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
10793

10894
> [!NOTE]
@@ -161,7 +147,7 @@ Timestamp > ago(30d)
161147

162148
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
163149

164-
Below are other thread names that can be used in the sample query from above:
150+
Here are other thread names that can be used in the sample query:
165151

166152
Files:
167153

0 commit comments

Comments
 (0)