Skip to content

Commit baa0298

Browse files
Merge branch 'main' into v-smandalika-9792656-B4
2 parents 43983cf + 88d77f5 commit baa0298

File tree

3 files changed

+49
-24
lines changed

3 files changed

+49
-24
lines changed

defender-endpoint/evaluate-mdav-using-gp.md

Lines changed: 42 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: conceptual
77
author: emmwalshh
88
ms.author: ewalsh
99
ms.custom: nextgen
10-
ms.date: 05/10/2024
10+
ms.date: 02/12/2025
1111
ms.reviewer: yongrhee
1212
manager: deniseb
1313
ms.subservice: ngp
@@ -34,22 +34,21 @@ search.appverid: met150
3434

3535
In Windows 10 or newer and Windows Server 2016 or newer, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
3636

37-
This topic explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
37+
This article explains how to enable and test the key protection features in Microsoft Defender AV and Microsoft Defender EG and provides you with guidance and links to more information.
3838

3939
This article describes configuration options in Windows 10 or newer and Windows Server 2016 or newer.
4040

4141
## Use Microsoft Defender Antivirus using Group Policy to enable the features
4242

4343
This guide provides the Microsoft Defender Antivirus Group Policy that configures the features you should use to evaluate our protection.
4444

45-
1. Grab the latest 'Windows Group Policy Administrative Templates'.
45+
1. Grab the latest 'Windows Group Policy Administrative Templates.'
4646

4747
For more information, see [Create and manage Central Store - Windows Client](/troubleshoot/windows-client/group-policy/create-and-manage-central-store#links-to-download-the-administrative-templates-files-based-on-the-operating-system-version).
4848

4949
> [!TIP]
5050
> 1. The Windows one works with the Windows Servers.
51-
>
52-
> 1. Even if you are running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
51+
> 1. Even if you're running a Windows 10 or Windows Server 2016, get the latest administrative templates for Windows 11 or newer.
5352
5453
2. Create a 'Central Store' to host the latest .admx and .adml templates.
5554

@@ -59,21 +58,21 @@ This guide provides the Microsoft Defender Antivirus Group Policy that configure
5958

6059
1. Create a new OU block policy inheritance.
6160

62-
1. Open Group policy Management Console (GPMC.msc).
61+
2. Open Group policy Management Console (GPMC.msc).
6362

64-
1. Go to **Group Policy Objects** and create a new Group Policy.
63+
3. Go to **Group Policy Objects** and create a new Group Policy.
6564

66-
1. Right-click the new policy created and select **Edit**.
65+
4. Right-click the new policy created and select **Edit**.
6766

68-
1. Navigate to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
67+
5. Navigate to **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
6968

7069
or
7170

7271
If joined to a workgroup
7372

74-
1. Open Group Policy Editor MMC (GPEdit.msc).
73+
6. Open Group Policy Editor MMC (GPEdit.msc).
7574

76-
2. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
75+
7. Navigate to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
7776

7877
## MDAV and Potentially Unwanted Applications (PUA)
7978

@@ -179,14 +178,14 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
179178
| Description | Setting |
180179
| --- | --- |
181180
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
182-
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
181+
| This settings controls whether Network Protection can be configured into block or audit mode on Windows Server | Enabled |
183182

184-
To enable Network Protection for Windows Servers, for now, please use Powershell:
183+
To enable Network Protection for Windows Servers, for now, please use PowerShell:
185184

186-
| OS | Powershell cmdlet |
185+
| OS | PowerShell cmdlet |
187186
| --- | --- |
188187
| Windows Server 2012 R2Windows Server 2022 and later | set-MpPreference -AllowNetworkProtectionOnWinServer $true |
189-
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
188+
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $ true
190189

191190
## Attack Surface Reduction Rules
192191

@@ -204,7 +203,7 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
204203
| 01443614-cd74-433a-b99e-2ecdc07bfc25<br><br>**Note:** (Block executable files from running unless they meet a prevalence, age, or trusted list criterion) | 1 (Block) |
205204
| 26190899-1602-49e8-8b27-eb1d0a1ce869<br><br>**Note:** (Block Office communication application from creating child processes) | 1 (Block) |
206205
| d4f940ab-401b-4efc-aadc-ad5f3c50688a<br><br>**Note:** (Block all Office applications from creating child processes) | 1 (Block) |
207-
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ( \[PREVIEW\] Block use of copied or impersonated system tools) | 1 (Block) |
206+
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ([PREVIEW] Block use of copied or impersonated system tools) | 1 (Block) |
208207
| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) |
209208
| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) |
210209
| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Web shell creation for Servers) | 1 (Block) |
@@ -214,10 +213,10 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
214213
| e6db77e5-3df2-4cf1-b95a-636979351e5b<br><br>**Note:** (Block persistence through WMI event subscription) | 1 (Block) |
215214
| c1db55ab-c21a-4637-bb3f-a12568109d35<br><br>**Note:** (Use advanced protection against ransomware) | 1 (Block) |
216215
| d1e49aac-8f56-4280-b9ba-993a6d77406c<br><br>**Note:** (Block process creations originating from PSExec and WMI commands) | 1 (Block)<br><br>**Note:** If you have Configuration Manager (formerly SCCM), or other management tools that use WMI, you might need to set this to 2 ('audit') instead of 1('block'). |
217-
| 33ddedf1-c6e0-47cb-833e-de6133960387<br><br>**Note:** ( \[PREVIEW\] Block rebooting machine in Safe Mode) | 1 (Block) |
216+
| 33ddedf1-c6e0-47cb-833e-de6133960387<br><br>**Note:** ([PREVIEW] Block rebooting machine in Safe Mode) | 1 (Block) |
218217

219218
> [!TIP]
220-
> Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
219+
> Some rules might block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
221220
222221
## Controlled Folder Access
223222

@@ -229,13 +228,33 @@ Navigate to **Computer Configuration** > **Administrative Templates** > **Window
229228

230229
Assign the policies to the OU where the test machines are located.
231230

231+
#### Enable Tamper Protection
232+
233+
In the Microsoft XDR portal (security.microsoft.com), go to **Settings** > **Endpoints** > **Advanced features** > **Tamper Protection** > **On**.
234+
235+
For more information, see [How do I configure or manage tamper protection?](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection).
236+
237+
#### Check the Cloud Protection network connectivity
238+
239+
It's important to check that the Cloud Protection network connectivity is working during your pen testing.
240+
241+
CMD (Run as admin)
242+
243+
244+
```
245+
cd "C:\Program Files\Windows Defender"
246+
MpCmdRun.exe -ValidateMapsConnection
247+
```
248+
249+
For more information, see [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
250+
232251
## Check the Platform Update version
233252

234253
The latest 'Platform Update' version Production channel (GA) is available here:
235254

236255
[Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update)
237256

238-
To check which 'Platform Update' version you have installed, use the following PowerShell command (Run as admin):
257+
To check which 'Platform Update' version is installed, use the following PowerShell command (Run as admin):
239258

240259
```powershell
241260
get-mpComputerStatus | ft AMProductVersion
@@ -245,9 +264,9 @@ get-mpComputerStatus | ft AMProductVersion
245264

246265
The latest 'Security Intelligence Update' version is available here:
247266

248-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
267+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
249268

250-
To check which 'Security Intelligence Update' version you have installed, use the following PowerShell command (Run as admin):
269+
To check which 'Security Intelligence Update' version is installed, use the following PowerShell command (Run as admin):
251270

252271
```PowerShell
253272
get-mpComputerStatus | ft AntivirusSignatureVersion
@@ -257,9 +276,9 @@ get-mpComputerStatus | ft AntivirusSignatureVersion
257276

258277
The latest scan 'engine update' version is available here:
259278

260-
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
279+
[Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/en-us/wdsi/defenderupdates)
261280

262-
To check which 'Engine Update' version you have installed, use the following PowerShell command(Run as admin):
281+
To check which 'Engine Update' version is installed, use the following PowerShell command(Run as admin):
263282

264283
```PowerShell
265284
get-mpComputerStatus | ft AMEngineVersion

defender-xdr/advanced-hunting-identityinfo-table.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,10 +65,13 @@ For information on other tables in the advanced hunting schema, [see the advance
6565
| `ChangeSource` [*](#mdi-only) | `string` |Identifies which identity provider or process triggered the addition of the new row. For example, the `System-UserPersistence` value is used for any rows added by an automated process.|
6666
| `Tags` [*](#mdi-only) | `dynamic` | Tags assigned to the account user by Defender for Identity |
6767
| `AssignedRoles` [*](#mdi-only) | `dynamic` | For identities from Microsoft Entra-only, the roles assigned to the account user|
68+
| `PrivilegedEntraPimRoles` (Preview) [**](#mdi) | `dynamic` | A snapshot of privileged role assignment schedules and eligibility schedules for the account as maintained by Microsoft Entra Privileged Identity Management (excluding activated assignments) |
6869
| `TenantId` | `string` | Unique identifier representing your organization's instance of Microsoft Entra ID |
6970
| `SourceSystem` [*](#mdi-only) | `string` | The source system for the record|
7071

71-
<a name="mdi-only"></a>* Available only for tenants with Microsoft Defender for Identity, Microsoft Defender for Cloud Apps or Microsoft Defender for Endpoint P2 licensing.
72+
<a name="mdi-only"></a>* Available only for tenants with Microsoft Defender for Identity, Microsoft Defender for Cloud Apps or Microsoft Defender for Endpoint P2 licensing.<br>
73+
<a name="mdi"></a>** Available only for tenants with Microsoft Defender for Identity.
74+
7275

7376
## Related topics
7477

defender-xdr/whats-new.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,9 @@ For more information on what's new with other Microsoft Defender security produc
3232

3333
You can also get product updates and important notifications through the [message center](https://admin.microsoft.com/Adminportal/Home#/MessageCenter).
3434

35+
## February 2025
36+
- (Preview) The `PrivilegedEntraPimRoles` column is available for preview in the advanced hunting [IdentityInfo](advanced-hunting-identityinfo-table.md) table.
37+
3538
## January 2025
3639

3740
- (Preview) Device activity events from Microsoft Sentinel's device [entity pages](/azure/sentinel/entity-pages) are now visible in the *Timeline* tab on the [Device entity page](./entity-page-device.md#timeline-tab) in the Defender portal, in addition to remaining visible on the [*Sentinel events* tab](./entity-page-device.md#sentinel-events-tab).

0 commit comments

Comments
 (0)