Skip to content

Commit c1abed0

Browse files
authored
Merge pull request #3623 from MicrosoftDocs/main
[AutoPublish] main to live - 04/30 04:28 PDT | 04/30 16:58 IST
2 parents 285cdc6 + 976c8b4 commit c1abed0

File tree

4 files changed

+22
-9
lines changed

4 files changed

+22
-9
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 04/04/2025
18+
ms.date: 04/30/2025
1919
search.appverid: met150
2020
---
2121

@@ -253,8 +253,8 @@ For rules with the "Rule State" specified:
253253

254254
> [!NOTE]
255255
> To protect your environment from vulnerable drivers, you should first implement these:
256-
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
257-
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and are not known to be vulnerable.
256+
> For Windows 10 or later, Windows Server 2016 or later using [Microsoft App Control for Business](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
257+
> For Windows 8.1 or older, Windows Server 2012 R2 or older, using [Microsoft AppLocker](/windows/security/application-security/application-control/app-control-for-business/applocker/understanding-applocker-allow-and-deny-actions-on-rules), you should block all drivers by default and only allow drivers that you deem necessary and aren't known to be vulnerable.
258258
> For Windows 11 or later, and Windows Server core 1809 or later, or Windows Server 2019 or later, you should also enable [Microsoft Windows vulnerable driver blocklist](/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules),
259259
> Then as another layer of defense, you should enable this attack surface reduction rule.
260260
@@ -544,7 +544,9 @@ This rule prevents malware from abusing WMI to attain persistence on a device.
544544
Fileless threats employ various tactics to stay hidden, to avoid being seen in the file system, and to gain periodic execution control. Some threats can abuse the WMI repository and event model to stay hidden.
545545

546546
> [!NOTE]
547-
> If `CcmExec.exe` (SCCM Agent) is detected on the device, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
547+
> If you're utilizing Configuration Manager (CM, previously known as MEMCM or SCCM) with CcmExec.exe` (SCCM Agent), we recommend running it in audit mode for at least 60 days.
548+
> Once you're prepared to switch to block mode, ensure you deploy the appropriate ASR rules, considering any necessary rule exclusions.
549+
548550

549551
Intune name: `Persistence through WMI event subscription`
550552

defender-endpoint/linux-install-manually.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -205,13 +205,13 @@ In order to preview new features and provide early feedback, it's recommended th
205205

206206
6. Install the Microsoft GPG public key:
207207

208-
- For Debian 11 and earlier, run the following command.
208+
- For Debian 11/Ubuntu 22.04 and earlier, run the following command.
209209

210210
```bash
211211
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg > /dev/null
212212
```
213213

214-
- For Debian 12 and later, run the following command.
214+
- For Debian 12/Ubuntu 24.04 and later, run the following command.
215215

216216
```bash
217217
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /usr/share/keyrings/microsoft-prod.gpg > /dev/null

defender-endpoint/schedule-antivirus-scans-powershell.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
author: emmwalshh
77
ms.author: ewalsh
88
ms.custom: nextgen
9-
ms.date: 04/29/2025
9+
ms.date: 04/30/2025
1010
ms.reviewer: pauhijbr, ksarens
1111
manager: deniseb
1212
ms.subservice: ngp
@@ -44,11 +44,15 @@ Set-MpPreference -ScanScheduleQuickScanTime
4444
> [!NOTE]
4545
> The time value is represented as the number of minutes past midnights (00:00 or 12:00 a.m.), For example, 120 is equivalent to 2:00 AM. The schedule is based on local time on the device where the scan is executing.
4646
47-
For example, to set a daily quick scan run on the Windows clients at 12:00 PM. (720). In this example, we use lunch time, since many devices nowadays are turned off after-hours (For example, laptops and/or tablets).
47+
To set a daily quick scan run on the Windows clients at 12:00 PM. (720). In this example, we use lunch time, since many devices nowadays are turned off after-hours (For example, laptops and/or tablets).
4848

4949
```powershell
5050
Set-MpPreference -ScanScheduleQuickScanTime 720
5151
```
52+
To disable the daily quick scan, set this value to 0
53+
```powershell
54+
Set-MpPreference -ScanScheduleQuickScanTime 0
55+
```
5256

5357
## Use PowerShell cmdlets to scheduling weekly quick or full scans
5458

@@ -121,6 +125,7 @@ Set-MpPreference -ScanScheduleOffset 720
121125
|Disable CPU throttle on idle scans|Enabled/Not Configured (Default)|Set-MpPreference -DisableCpuThrottleOnIdleScans `Boolean` <br>For example: Set-MpPreference -DisableCpuThrottleOnIdleScans $True Idle here means 90% of CPU utilization or below|
122126
|Enable Low CPU Priority|Disabled/Not Configured (Default)|Set-MpPreference -EnableLowCpuPriority `Boolean` <br>For example: Set-MpPreference -EnableLowCpuPriority $False|
123127
|Disable Catchup Full Scan|Disabled/Not Configured (Default)|Set-MpPreference -DisableCatchupFullScan `Boolean` <br>For example: Set-MpPreference -DisableCatchupFullScan $True|
128+
|Disable Catchup Quick Scan|Disabled/Not Configured (Default)|Set-MpPreference -DisableCatchupQuickScan `Boolean` <br>For example: Set-MpPreference -DisableCatchupQuickScan $True|
124129
|Enable full scan on battery power|Disabled/Not Configured (Default)|Set-MpPreference -EnableFullScanOnBatteryPower `Boolean` <br>For example: Set-MpPreference -EnableFullScanOnBatteryPower $False|
125130

126131
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](/editor/MicrosoftDocs/defender-docs-pr/defender-endpoint%2Fschedule-antivirus-scans-powershell.md/main/bcb7536e-34b9-8af7-5381-96c46d108a91/use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/).

defender-endpoint/schedule-antivirus-scans.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
author: emmwalshh
77
ms.author: ewalsh
88
ms.custom: nextgen
9-
ms.date: 02/05/2025
9+
ms.date: 04/30/2025
1010
ms.reviewer: pauhijbr, ksarens, yongrhee, bsabetghadam
1111
manager: deniseb
1212
ms.subservice: ngp
@@ -57,6 +57,12 @@ Use the following table to choose a scan type. Also see [Microsoft Defender Anti
5757

5858
## Important points to keep in mind
5959

60+
- You can configure two types of scheduled scans:
61+
62+
1. **Daily Scan**: Runs once per day and can only be a **quick scan**.
63+
64+
2. **Weekly Scan**: Runs once per week and can be either a **quick scan** or a **full scan**.
65+
6066
- By default, Microsoft Defender Antivirus checks for an update 15 minutes before the time of any scheduled scans. You can [manage the schedule for when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) to override this default.
6167

6268
- If a device is unplugged and running on battery during a scheduled full scan, the scheduled scan stops with event 1002, which states that the scan stopped before completion. Microsoft Defender Antivirus runs a full scan at the next scheduled time.

0 commit comments

Comments
 (0)