Skip to content

Commit bca0df7

Browse files
authored
Merge pull request #3896 from MicrosoftDocs/main
[AutoPublish] main to live - 05/26 10:31 PDT | 05/26 23:01 IST
2 parents 11f4ae0 + 84b0bd5 commit bca0df7

8 files changed

+77
-76
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ The following table lists the supported operating systems for rules that are cur
131131
| [Block rebooting machine in Safe Mode](#block-rebooting-machine-in-safe-mode)| Y | Y | Y |
132132
| [Block untrusted and unsigned processes that run from USB](#block-untrusted-and-unsigned-processes-that-run-from-usb) | Y | Y | Y |
133133
| [Block use of copied or impersonated system tools](#block-use-of-copied-or-impersonated-system-tools)| Y | Y | Y |
134-
| [Block Webshell creation for Servers](#block-webshell-creation-for-servers) | N | Y <br>Exchange role only | Y <br>Exchange role only |
134+
| [Block Webshell creation for Servers](#block-webshell-creation-for-servers)| N | Y <br>Exchange role only|Y on Windows Server 2016 <br> Exchange role only <br>N on Windows Server 2012 R2 |
135135
| [Block Win32 API calls from Office macros](#block-win32-api-calls-from-office-macros) | Y | N | N |
136136
| [Use advanced protection against ransomware](#use-advanced-protection-against-ransomware) | Y <br> version 1803 or later | Y | Y |
137137

defender-endpoint/enable-attack-surface-reduction.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -136,13 +136,13 @@ The following procedures for enabling attack surface reduction rules include ins
136136
### Intune
137137

138138
> [!IMPORTANT]
139-
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, these policies fail to apply:
140-
> - [Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141-
> - [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142-
> - [Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
139+
> If you're using Intune on Windows Server 2012 R2 and Windows Server 2016 with the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), you need to set the following attack surface reduction rules to `Not Configured` because they're not supported on these OS versions. Otherwise, policies containing any of these rules targeted at Windows Server 2012 R2 or Windows Server 2016 will fail to apply:
140+
- [Block persistence through Windows Management Instrumentation (WMI) event subscription](/defender-endpoint/attack-surface-reduction-rules-reference#block-persistence-through-wmi-event-subscription)
141+
- [Block JavaScript or VBScript from launching downloaded executable content](/defender-endpoint/attack-surface-reduction-rules-reference#block-javascript-or-vbscript-from-launching-downloaded-executable-content)
142+
- [Block Win32 API calls from Office macro](/defender-endpoint/attack-surface-reduction-rules-reference#block-win32-api-calls-from-office-macros)
143+
- [Block Webshell creation for Servers](/defender-endpoint/attack-surface-reduction-rules-reference), this isn't supported on Windows Server 2012 R2, but it is supported on Windows Server 2016. It only applies to the Exchange server role.
143144

144145
#### Endpoint security policy (Preferred)
145-
146146
1. Select **Endpoint Security** > **Attack surface reduction**. Choose an existing attack surface reduction rule or create a new one. To create a new one, select **Create Policy** and enter information for this profile. For **Profile type**, select **Attack surface reduction rules**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
147147

148148
1. In the **Configuration settings** pane, select **Attack Surface Reduction** and then select the desired setting for each attack surface reduction rule.
@@ -159,7 +159,7 @@ The following procedures for enabling attack surface reduction rules include ins
159159

160160
1. Select **Device configuration** > **Profiles**. Choose an existing endpoint protection profile or create a new one. To create a new one, select **Create profile** and enter information for this profile. For **Profile type**, select **Endpoint protection**. If you've chosen an existing profile, select **Properties** and then select **Settings**.
161161

162-
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
162+
2. In the **Endpoint protection** pane, select **Windows Defender Exploit Guard**, and then select **Attack Surface Reduction**. Select the desired setting for each attack surface reduction rule.
163163

164164
3. Under **Attack Surface Reduction exceptions**, enter individual files and folders. You can also select **Import** to import a CSV file that contains files and folders to exclude from attack surface reduction rules. Each line in the CSV file should be formatted as follows:
165165

@@ -177,8 +177,8 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
177177

178178
2. In **Create a profile**, in the following two drop-down lists, select the following:
179179

180-
- In **Platform**, select **Windows 10 and later**
181-
- In **Profile type**, select **Templates**
180+
- In **Platform**, select **Windows 10 and later**.
181+
- In **Profile type**, select **Templates**.
182182
- If attack surface reduction rules are already set through Endpoint security, in **Profile type**, select **Settings Catalog**.
183183

184184
3. Select **Custom**, and then select **Create**.
@@ -235,7 +235,7 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
235235

236236
3. In **Value**, enter the applicable value or value range.
237237

238-
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal" lightbox="media/mem07-5-applicability-rules.png":::
238+
:::image type="content" source="media/mem07-5-applicability-rules.png" alt-text="The applicability rules in the Microsoft Intune admin center portal." lightbox="media/mem07-5-applicability-rules.png":::
239239

240240
11. Select **Next**. In step **6 Review + create**, review the settings and information you've selected and entered, and then select **Create**.
241241

@@ -245,7 +245,7 @@ You can use Microsoft Intune OMA-URI to configure custom attack surface reductio
245245

246246
> [!NOTE]
247247
> Regarding conflict handling, if you assign a device two different attack surface reduction policies, potential policy conflicts can occur, depending on whether rules are assigned different states, whether conflict management is in place, and whether the result is an error.
248-
> Nonconflicting rules do not result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
248+
> Nonconflicting rules don't result in an error, and such rules are applied correctly. The first rule is applied, and subsequent nonconflicting rules are merged into the policy.
249249
250250
### MDM
251251

@@ -290,7 +290,7 @@ Example:
290290
6. After the policy is created, select **Close**.
291291

292292
> [!WARNING]
293-
> There is a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there is no defined release date for when this will be fixed.
293+
> There's a known issue with the applicability of attack surface reduction on Server OS versions which is marked as compliant without any actual enforcement. Currently, there's no defined release date for when this will be fixed.
294294
295295
> [!IMPORTANT]
296296
> If you're using "Disable admin merge" set to `true` on devices, and you're using any of the following tools/methods, adding ASR rules per-rule exclusions or local ASR rule exclusions don't apply.
@@ -316,15 +316,15 @@ Example:
316316
- 0: Disable (Disable the attack surface reduction rule)
317317
- 1: Block (Enable the attack surface reduction rule)
318318
- 2: Audit (Evaluate how the attack surface reduction rule would impact your organization if enabled)
319-
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
319+
- 6: Warn (Enable the attack surface reduction rule but allow the end-user to bypass the block)
320320

321321
:::image type="content" source="media/asr-rules-gp.png" alt-text="attack surface reduction rules in Group Policy" lightbox="media/asr-rules-gp.png":::
322322

323323
5. To exclude files and folders from attack surface reduction rules, select the **Exclude files and paths from Attack surface reduction rules** setting and set the option to **Enabled**. Select **Show** and enter each file or folder in the **Value name** column. Enter **0** in the **Value** column for each item.
324324

325325
> [!WARNING]
326-
> Do not use quotes as they are not supported for either the **Value name** column or the **Value** column.
327-
> The rule ID should not have any leading or trailing spaces.
326+
> Don't use quotes as they aren't supported for either the **Value name** column or the **Value** column.
327+
> The rule ID shouldn't have any leading or trailing spaces.
328328
329329
### PowerShell
330330

@@ -333,7 +333,7 @@ Example:
333333
334334
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
335335

336-
2. Type one of the following cmdlets. (For more information, such as rule ID, refer to [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).)
336+
2. Type one of the following cmdlets. For more information, such as rule ID, refer to [Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md).
337337

338338
| Task | PowerShell cmdlet|
339339
|---|---|

defender-endpoint/enable-network-protection.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -66,26 +66,27 @@ To enable network protection, you can use any of the methods described in this a
6666
| -------- | -------- |
6767
| Enable Network Protection|Options:<br>- Enabled (block mode) Block mode is needed to block IP address/URL indicators and Web Content Filtering.<br>- Enabled (audit mode) <br>- Disabled (Default) <br>- Not Configured|
6868

69-
- Network Protection on Windows Server 2012 R2 and Windows Server 2016
70-
69+
- Network Protection on Windows Server 2012 R2 and Windows Server 2016, use the additional policy listed in the following table:
70+
7171
| Description|Setting|
7272
| -------- | -------- |
7373
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
7474

7575
- Optional Network Protection settings for Windows and Windows Server:
7676

7777
> [!WARNING]
78-
> For Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others, set the `Allow Datagram Processing On WinServer` to `disabled`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
78+
> Disable the `Allow Datagram Processing On WinServer` setting. This is important for any roles that generate high volumes of UDP traffic such as Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others. Enabling datagram processing in these cases can reduce network performance and reliability. Disabling it helps keep the network stable and ensures better use of system resources in high-demand environments.
7979
80-
|Description| Setting|
81-
| -------- | -------- |
82-
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default, recommended). <br>- Not configured|
83-
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
84-
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
85-
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
86-
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
87-
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
8880
81+
|Description| Setting|
82+
| -------- | -------- |
83+
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default, recommended). <br>- Not configured|
84+
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
85+
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
86+
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
87+
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
88+
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
89+
8990
7. When you're done configuring settings, select **Next**.
9091

9192
8. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
@@ -206,23 +207,23 @@ Use the following procedure to enable network protection on domain-joined comput
206207

207208
1. On your Windows device, click **Start**, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
208209

209-
2. Run the following cmdlet:
210+
1. Run the following cmdlet:
210211

211212
```PowerShell
212213
Set-MpPreference -EnableNetworkProtection Enabled
213214
```
214215

215216
1. For Windows Server, use the additional commands listed in the following table:
216217

217-
| Windows Server version | Commands |
218-
|---|---|
219-
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
220-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
218+
| Windows Server version | Commands |
219+
|---|---|
220+
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
221+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
221222

222223
> [!IMPORTANT]
223-
> For Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
224+
> Disable the "AllowDatagramProcessingOnWinServer" setting. This is important for any roles that generate high volumes of UDP traffic such as Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others. Enabling datagram processing in these cases can reduce network performance and reliability. Disabling it helps keep the network stable and ensures better use of system resources in high-demand environments.
224225
225-
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
226+
1. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
226227

227228
```PowerShell
228229
Set-MpPreference -EnableNetworkProtection AuditMode

defender-endpoint/linux-install-manually.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -485,22 +485,22 @@ Download the onboarding package from the [Microsoft Defender portal](https://sec
485485

486486
The following external package dependencies exist for the `mdatp` package:
487487

488-
- The mdatp RPM package requires `glibc >= 2.17`, `policycoreutils`, `selinux-policy-targeted`, `mde-netfilter`
489-
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`, `mde-netfilter`
490-
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`, `mde-netfilter`
488+
- The mdatp RPM package requires `glibc >= 2.17`
489+
- For DEBIAN the mdatp package requires `libc6 >= 2.23`, `uuid-runtime`
490+
- For Mariner the mdatp package requires `attr`, `diffutils`, `libacl`, `libattr`, `libselinux-utils`, `selinux-policy`, `policycoreutils`
491491

492492
> [!NOTE]
493493
> Beginning with version `101.24082.0004`, Defender for Endpoint on Linux no longer supports the `Auditd` event provider. We're transitioning completely to the more efficient eBPF technology.
494494
> If eBPF isn't supported on your machines, or if there are specific requirements to remain on Auditd, and your machines are using Defender for Endpoint on Linux version `101.24072.0001` or lower, the following other dependencies on the auditd package exist for mdatp:
495495
> - The mdatp RPM package requires `audit`, `semanage`.
496496
> - For DEBIAN, the mdatp package requires `auditd`.
497497
> - For Mariner, the mdatp package requires `audit`.
498-
499-
The `mde-netfilter` package also has the following package dependencies:
500-
501-
- For DEBIAN, the `mde-netfilter` package requires `libnetfilter-queue1`, `libglib2.0-0`
502-
- For RPM, the `mde-netfilter` package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, `glib2`
503-
- For Mariner, the `mde-netfilter` package requires `libnfnetlink`, `libnetfilter_queue`
498+
> For version older than `101.25032.0000`:
499+
> - RPM package needs: `mde-netfilter`, `pcre`
500+
> - DEBIAN package needs: `mde-netfilter`, `libpcre3`
501+
> - The `mde-netfilter` package also has the following package dependencies:
502+
- For DEBIAN, the mde-netfilter package requires `libnetfilter-queue1` and `libglib2.0-0`
503+
- For RPM, the mde-netfilter package requires `libmnl`, `libnfnetlink`, `libnetfilter_queue`, and `glib2`
504504

505505
If the Microsoft Defender for Endpoint installation fails due to missing dependencies errors, you can manually download the prerequisite dependencies.
506506

0 commit comments

Comments
 (0)