You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-mdav-using-gp.md
+42-23Lines changed: 42 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.topic: conceptual
7
7
author: emmwalshh
8
8
ms.author: ewalsh
9
9
ms.custom: nextgen
10
-
ms.date: 05/10/2024
10
+
ms.date: 02/12/2025
11
11
ms.reviewer: yongrhee
12
12
manager: deniseb
13
13
ms.subservice: ngp
@@ -34,22 +34,21 @@ search.appverid: met150
34
34
35
35
In Windows 10 or newer and Windows Server 2016 or newer, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
36
36
37
-
This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
37
+
This article explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
38
38
39
39
This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer.
40
40
41
41
## Use Microsoft Defender Antivirus using Group Policy to enable the features
42
42
43
43
This guide provides the Microsoft Defender Antivirus Group Policy that configures the features you should use to evaluate our protection.
44
44
45
-
1. Grab the latest 'Windows Group Policy Administrative Templates'.
45
+
1. Grab the latest 'Windows Group Policy Administrative Templates.'
46
46
47
47
For more information, see [Create and manage Central Store - Windows Client](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#links-to-download-the-administrative-templates-files-based-on-the-operating-system-version).
48
48
49
49
> [!TIP]
50
50
> 1. The Windows one works with the Windows Servers.
51
-
>
52
-
> 1. Even if you are running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
51
+
> 1. Even if you're running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
53
52
54
53
2. Create a 'Central Store' to host the latest .admx and .adml templates.
55
54
@@ -59,21 +58,21 @@ This guide provides the Microsoft Defender Antivirus Group Policy that configure
59
58
60
59
1. Create a new OU block policy inheritance.
61
60
62
-
1. Open Group policy Management Console (GPMC.msc).
61
+
2. Open Group policy Management Console (GPMC.msc).
63
62
64
-
1. Go to **Group Policy Objects** and create a new Group Policy.
63
+
3. Go to **Group Policy Objects** and create a new Group Policy.
65
64
66
-
1. Right-click the new policy created and select **Edit**.
65
+
4. Right-click the new policy created and select **Edit**.
## MDAV and Potentially Unwanted Applications (PUA)
79
78
@@ -179,14 +178,14 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
179
178
| Description | Setting |
180
179
| --- | --- |
181
180
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
182
-
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
181
+
| This settings controls whether Network Protection can be configured into block or audit mode on Windows Server | Enabled |
183
182
184
-
To enable Network Protection for Windows Servers, for now, please use Powershell:
183
+
To enable Network Protection for Windows Servers, for now, please use PowerShell:
185
184
186
-
| OS |Powershell cmdlet |
185
+
| OS |PowerShell cmdlet |
187
186
| --- | --- |
188
187
| Windows Server 2012 R2Windows Server 2022 and later | set-MpPreference -AllowNetworkProtectionOnWinServer $true |
189
-
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
188
+
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
190
189
191
190
## Attack Surface Reduction Rules
192
191
@@ -204,7 +203,7 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
204
203
| 01443614-cd74-433a-b99e-2ecdc07bfc25<br><br>**Note:** (Block executable files from running unless they meet a prevalence, age, or trusted list criterion) | 1 (Block) |
205
204
| 26190899-1602-49e8-8b27-eb1d0a1ce869<br><br>**Note:** (Block Office communication application from creating child processes) | 1 (Block) |
206
205
| d4f940ab-401b-4efc-aadc-ad5f3c50688a<br><br>**Note:** (Block all Office applications from creating child processes) | 1 (Block) |
207
-
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** (\[PREVIEW\] Block use of copied or impersonated system tools) | 1 (Block) |
206
+
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ([PREVIEW] Block use of copied or impersonated system tools) | 1 (Block) |
208
207
| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) |
209
208
| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) |
210
209
| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Web shell creation for Servers) | 1 (Block) |
@@ -214,10 +213,10 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
| d1e49aac-8f56-4280-b9ba-993a6d77406c<br><br>**Note:** (Block process creations originating from PSExec and WMI commands) | 1 (Block)<br><br>**Note:** If you have Configuration Manager (formerly SCCM), or other management tools that use WMI, you might need to set this to 2 ('audit') instead of 1('block'). |
> Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
219
+
> Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
Assign the policies to the OU where the test machines are located.
231
230
231
+
#### Enable Tamper Protection
232
+
233
+
In the Microsoft XDR portal (security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
234
+
235
+
For more information, see [How do I configure or manage tamper protection?](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
236
+
237
+
#### Check the Cloud Protection network connectivity
238
+
239
+
It's important to check that the Cloud Protection network connectivity is working during your pen testing.
240
+
241
+
CMD (Run as admin)
242
+
243
+
244
+
```
245
+
cd "C:\Program Files\Windows Defender"
246
+
MpCmdRun.exe -ValidateMapsConnection
247
+
```
248
+
249
+
For more information, see [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
250
+
232
251
## Check the Platform Update version
233
252
234
253
The latest 'Platform Update' version Production channel (GA) is available here:
To check which 'Platform Update' version you have installed, use the following PowerShell command (Run as admin):
257
+
To check which 'Platform Update' version is installed, use the following PowerShell command (Run as admin):
239
258
240
259
```powershell
241
260
get-mpComputerStatus | ft AMProductVersion
@@ -245,9 +264,9 @@ get-mpComputerStatus | ft AMProductVersion
245
264
246
265
The latest 'Security Intelligence Update' version is available here:
247
266
248
-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
267
+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
249
268
250
-
To check which 'Security Intelligence Update' version you have installed, use the following PowerShell command (Run as admin):
269
+
To check which 'Security Intelligence Update' version is installed, use the following PowerShell command (Run as admin):
251
270
252
271
```PowerShell
253
272
get-mpComputerStatus | ft AntivirusSignatureVersion
@@ -257,9 +276,9 @@ get-mpComputerStatus | ft AntivirusSignatureVersion
257
276
258
277
The latest scan 'engine update' version is available here:
259
278
260
-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
279
+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
261
280
262
-
To check which 'Engine Update' version you have installed, use the following PowerShell command(Run as admin):
281
+
To check which 'Engine Update' version is installed, use the following PowerShell command(Run as admin):
Copy file name to clipboardExpand all lines: defender-xdr/advanced-hunting-identityinfo-table.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,10 +65,13 @@ For information on other tables in the advanced hunting schema, [see the advance
65
65
|`ChangeSource`[*](#mdi-only)|`string`|Identifies which identity provider or process triggered the addition of the new row. For example, the `System-UserPersistence` value is used for any rows added by an automated process.|
66
66
|`Tags`[*](#mdi-only)|`dynamic`| Tags assigned to the account user by Defender for Identity |
67
67
|`AssignedRoles`[*](#mdi-only)|`dynamic`| For identities from Microsoft Entra-only, the roles assigned to the account user|
68
+
|`PrivilegedEntraPimRoles` (Preview) [**](#mdi)|`dynamic`| A snapshot of privileged role assignment schedules and eligibility schedules for the account as maintained by Microsoft Entra Privileged Identity Management (excluding activated assignments) |
68
69
|`TenantId`|`string`| Unique identifier representing your organization's instance of Microsoft Entra ID |
69
70
|`SourceSystem`[*](#mdi-only)|`string`| The source system for the record|
70
71
71
-
<aname="mdi-only"></a>* Available only for tenants with Microsoft Defender for Identity, Microsoft Defender for Cloud Apps or Microsoft Defender for Endpoint P2 licensing.
72
+
<aname="mdi-only"></a>* Available only for tenants with Microsoft Defender for Identity, Microsoft Defender for Cloud Apps or Microsoft Defender for Endpoint P2 licensing.<br>
73
+
<aname="mdi"></a>** Available only for tenants with Microsoft Defender for Identity.
Copy file name to clipboardExpand all lines: defender-xdr/whats-new.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,9 @@ For more information on what's new with other Microsoft Defender security produc
32
32
33
33
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
34
34
35
+
## February 2025
36
+
- (Preview) The `PrivilegedEntraPimRoles` column is available for preview in the advanced hunting [IdentityInfo](advanced-hunting-identityinfo-table.md) table.
37
+
35
38
## January 2025
36
39
37
40
- (Preview) Device activity events from Microsoft Sentinel's device [entity pages](/azure/sentinel/entity-pages) are now visible in the *Timeline* tab on the [Device entity page](./entity-page-device.md#timeline-tab) in the Defender portal, in addition to remaining visible on the [*Sentinel events* tab](./entity-page-device.md#sentinel-events-tab).
0 commit comments