You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/behavior-monitor-macos.md
+40-34Lines changed: 40 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
6
6
manager: deniseb
7
7
ms.service: defender-endpoint
8
8
ms.topic: overview
9
-
ms.date: 01/02/2025
9
+
ms.date: 05/15/2025
10
10
ms.subservice: ngp
11
11
audience: ITPro
12
12
ms.collection:
@@ -116,18 +116,7 @@ The following sections describe each of these methods in detail.
116
116
<dict>
117
117
<key>behaviorMonitoring</key>
118
118
<string>enabled</string>
119
-
<key>behaviorMonitoringConfigurations</key>
120
-
<dict>
121
-
<key>blockExecution</key>
122
-
<string>enabled</string>
123
-
<key>notifyForks</key>
124
-
<string>enabled</string>
125
-
<key>forwardRtpToBm</key>
126
-
<string>enabled</string>
127
-
<key>avoidOpenCache</key>
128
-
<string>enabled</string>
129
-
</dict>
130
-
</dict>
119
+
</dict>
131
120
</dict>
132
121
</array>
133
122
</dict>
@@ -162,22 +151,11 @@ The following sections describe each of these methods in detail.
162
151
<key>behaviorMonitoring</key>
163
152
<string>enabled</string>
164
153
</dict>
165
-
<key>features</key>
166
-
<dict>
167
-
<key>behaviorMonitoring</key>
168
-
<string>enabled</string>
169
-
<key>behaviorMonitoringConfigurations</key>
170
-
<dict>
171
-
<key>blockExecution</key>
172
-
<string>enabled</string>
173
-
<key>notifyForks</key>
174
-
<string>enabled</string>
175
-
<key>forwardRtpToBm</key>
176
-
<string>enabled</string>
177
-
<key>avoidOpenCache</key>
178
-
<string>enabled</string>
179
-
</dict>
180
-
</dict>
154
+
<key>features</key>
155
+
<dict>
156
+
<key>behaviorMonitoring</key>
157
+
<string>enabled</string>
158
+
</dict>
181
159
</dict>
182
160
</plist>
183
161
```
@@ -219,14 +197,42 @@ sudo mdatp threat list
219
197
220
198
```
221
199
222
-
### Frequently Asked Questions (FAQ)
200
+
### Frequently asked questions (FAQ)
201
+
202
+
#### What if I see an increase in CPU utilization or memory utilization?
203
+
204
+
Disable behavior monitoring and see if the issue goes away. If the issue doesn't go away, it isn't related to behavior monitoring.
205
+
206
+
If the issue goes away, re-enable behavior monitoring and use behavior monitoring statistics to identify and exclude processes generating excessive events:
This command lists processes running on the machine which are reporting behavior monitoring events to the engine process. The more events, the more CPU/memory impact that process has.
223
219
224
-
#### What if I see an increase in cpu utilization or memory utilization?
220
+
Exclude identified processes using:
225
221
226
-
Disable behavior monitoring and see if the issue goes away.
222
+
```bash
223
+
sudo mdatp exclusion process add --path <path to process with lots of events>
224
+
```
225
+
226
+
> [!IMPORTANT]
227
+
> Please verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
228
+
229
+
Once done, disable behavior monitoring statistics:
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 03/04/2025
9
+
ms.date: 05/16/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -58,7 +58,7 @@ Understand the following prerequisites before you create indicators for files:
58
58
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
59
59
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
60
60
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, Windows Server 2022, and Windows Server 2025.
61
-
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
61
+
- File hash computation is enabled by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\Enable File Hash Computation` to **Enabled**. Or, you can run the following PowerShell command: `Set-MpPreference -EnableFileHashComputation $true`
62
62
63
63
> [!NOTE]
64
64
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
@@ -91,9 +91,6 @@ Understand the following prerequisites before you create indicators for files:
91
91
- Action: Specify the action to be taken and provide a description.
92
92
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
93
93
94
-
> [!NOTE]
95
-
> Device Group creation is supported in both Defender for Endpoint Plan 1 and Plan 2
96
-
97
94
5. Review the details in the Summary tab, then select **Save**.
98
95
99
96
## Create a contextual indicator from the file details page
@@ -124,7 +121,7 @@ The current supported actions for file IOC are allow, audit and block, and remed
124
121
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
125
122
126
123
> [!IMPORTANT]
127
-
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
124
+
> - Typically, file blocks are enforced and removed within 15 minutes, average 30 minutes but can take upwards of 2 hours.
128
125
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash
129
126
IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
130
127
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
@@ -147,7 +144,7 @@ Timestamp > ago(30d)
147
144
148
145
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
149
146
150
-
Here are other thread names that can be used in the sample query:
147
+
Here are other threat names that can be used in the sample query:
0 commit comments