Skip to content

Commit c417a7e

Browse files
Merge branch 'main' into portals-admin-centers
2 parents 2869ff7 + 0128a3f commit c417a7e

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+418
-181
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -170,6 +170,31 @@
170170
"redirect_url": "/defender-xdr/",
171171
"redirect_document_id": false
172172
},
173+
{
174+
"source_path": "defender-xdr/microsoft-threat-actor-naming.md",
175+
"redirect_url": "/unified-secops-platform/microsoft-threat-actor-naming",
176+
"redirect_document_id": false
177+
},
178+
{
179+
"source_path": "defender-xdr/malware-naming.md",
180+
"redirect_url": "/unified-secops-platform/malware-naming",
181+
"redirect_document_id": false
182+
},
183+
{
184+
"source_path": "defender-xdr/criteria.md",
185+
"redirect_url": "/unified-secops-platform/criteria",
186+
"redirect_document_id": false
187+
},
188+
{
189+
"source_path": "defender-xdr/submission-guide.md",
190+
"redirect_url": "/unified-secops-platform/submission-guide",
191+
"redirect_document_id": false
192+
},
193+
{
194+
"source_path": "defender-xdr/virus-initiative-criteria.md",
195+
"redirect_url": "/unified-secops-platform/virus-initiative-criteria",
196+
"redirect_document_id": false
197+
},
173198
{
174199
"source_path": "defender-xdr/tickets.md",
175200
"redirect_url": "/defender-xdr/troubleshoot",

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -234,6 +234,8 @@
234234
href: mac-troubleshoot-mode.md
235235
- name: Troubleshoot macOS installation issues
236236
href: mac-support-install.md
237+
- name: Troubleshoot macOS configuration
238+
href: mac-support-configuration.md
237239
- name: Troubleshoot macOS performance issues overview
238240
href: mac-support-perf-overview.md
239241
displayName: Troubleshoot performance issues for Microsoft Defender for Endpoint on macOS

defender-endpoint/evaluate-mda-using-mde-security-settings-management.md

Lines changed: 58 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ title: Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint S
33
ms.reviewer: yonghree
44
description: Learn how to evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies).
55
ms.service: defender-endpoint
6-
ms.author: vpattnaik
7-
author: vpattnai
6+
ms.author: ewalsh
7+
author: emmwalshh
88
ms.localizationpriority: medium
99
manager: dolmont
1010
audience: ITPro
@@ -17,14 +17,14 @@ ms.custom:
1717
- cx-ean
1818
ms.subservice: edr
1919
search.appverid: met150
20-
ms.date: 10/30/2024
20+
ms.date: 02/12/2025
2121
---
2222

2323
# Evaluate Microsoft Defender Antivirus using Microsoft Defender Endpoint Security Settings Management (Endpoint security policies)
2424

2525
In Windows 10 or later, and in Windows Server 2016 or later, you can use next-generation protection features offered by Microsoft Defender Antivirus (MDAV) and Microsoft Defender Exploit Guard (Microsoft Defender EG).
2626

27-
This article describes configuration options in Windows 10 or later, and in Windows Server 2016 or later, that guide you to activate and test the key protection features in MDAV and Microsoft Defender EG; and provides you with guidance and with links to more information.
27+
This article outlines the configuration options available in Windows 10 and later versions, as well as in Windows Server 2016 and later versions. It provides step-by-step guidance on how to activate and test the key protection features in Microsoft Defender Antivirus (MDAV) and Microsoft Defender for Endpoint (EG).
2828

2929
If you have any questions about a detection that MDAV makes, or you discover a missed detection, you can submit a file to us at our [sample submission help site](/defender-xdr/submission-guide).
3030

@@ -49,24 +49,24 @@ To configure the options that you must use to test the protection features, perf
4949
1. From these groups of settings, select those settings that you want to manage with this profile.
5050
1. Set the policies for the chosen groups of settings by configuring the settings as described in the following tables:
5151

52-
**Real-time Protection (Always-on protection, real-time scanning)**:
52+
**Real-time Protection (Always-on protection, real-time scanning)**:
5353

54-
|Description|Settings|
55-
|---|---|
56-
|Allow Realtime Monitoring|Allowed|
57-
|Real Time Scan Direction|Monitor all files (bi-directional)|
58-
|Allow Behavior Monitoring|Allowed|
59-
|Allow On Access Protection|Allowed|
60-
|PUA Protection|PUA Protection on|
54+
|Description|Settings|
55+
|---|---|
56+
|Allow Real-time Monitoring|Allowed|
57+
|Real Time Scan Direction|Monitor all files (bi-directional)|
58+
|Allow Behavior Monitoring|Allowed|
59+
|Allow On Access Protection|Allowed|
60+
|PUA Protection|PUA Protection on|
6161

62-
**Cloud protection features**:
62+
**Cloud protection features**:
6363

64-
|Description|Setting|
65-
|---|---|
66-
|Allow Cloud Protection|Allowed|
67-
|Cloud Block Level|High|
68-
|Cloud Extended Timeout|Configured, 50|
69-
|Submit Samples Consent|Send all samples automatically|
64+
|Description|Setting|
65+
|---|---|
66+
|Allow Cloud Protection|Allowed|
67+
|Cloud Block Level|High|
68+
|Cloud Extended Time-out|Configured, 50|
69+
|Submit Samples Consent|Send all samples automatically|
7070

7171
Standard security intelligence updates can take hours to prepare and deliver; our cloud-delivered protection service can deliver this protection in seconds. For more information, see [Use next-gen technologies in Microsoft Defender Antivirus through cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md).
7272

@@ -86,7 +86,7 @@ Standard security intelligence updates can take hours to prepare and deliver; ou
8686
|Description|Setting|
8787
|---|---|
8888
|Enable Network Protection|Enabled (block mode)|
89-
|Allow Network Protection Down Level|Network protection will be enabled downlevel.|
89+
|Allow Network Protection Down Level|Network protection is enabled downlevel.|
9090
|Allow Datagram Processing On Win Server|Datagram processing on Windows Server is enabled.|
9191
|Disable DNS over TCP parsing|DNS over TCP parsing is enabled.|
9292
|Disable HTTP parsing|HTTP parsing is enabled.|
@@ -158,23 +158,54 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
158158
|[PREVIEW] Block use of copied or impersonated system tools|Block|
159159
|Block JavaScript or VBScript from launching downloaded executable content|Block|
160160
|Block credential stealing from the Windows local security authority subsystem|Block|
161-
|Block Webshell creation for Servers|Block|
161+
|Block Web shell creation for Servers|Block|
162162
|Block Office applications from creating executable content|Block|
163163
|Block untrusted and unsigned processes that run from USB|Block|
164164
|Block Office applications from injecting code into other processes|Block|
165165
|Block persistence through WMI event subscription|Block|
166166
|Use advanced protection against ransomware|Block|
167-
|Block process creations originating from PSExec and WMI commands|Block <br/> **NOTE**: If you have Configuration Manager (formerly SCCM), or other management tools, that use WMI, you might need to set this to **Audit** instead of **Block**.|
167+
|Block process creations originating from PSExec and WMI commands|Block (If you have Configuration Manager (formerly SCCM), or other management tools that use WMI you might need to set this to **Audit** instead of **Block**)|
168168
|[PREVIEW] Block rebooting machine in Safe Mode|Block|
169169
|Enable Controlled Folder Access|Enabled|
170170

171171
> [!TIP]
172-
> Any of the rules may block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions". And, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
172+
> Any of the rules might block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named "Attack Surface Reduction Only Exclusions." Additionally, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
173173
174174
1. Select **Next**.
175-
1. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
175+
2. On the **Assignments** tab, select **Device Group** or **User Group** or **All devices** or **All Users**.
176+
3. Select **Next**.
177+
4. On the **Review + create** tab, review your policy settings, and then select **Save**.
178+
179+
#### Enable Tamper Protection
180+
181+
1. Sign in to [Microsoft Defender XDR](https://sip.security.microsoft.com/).
182+
1. Go to **Endpoints > Configuration management > Endpoint security policies > Windows policies > Create new policy**.
183+
1. Select **Windows 10, Windows 11, and Windows Server** from the **Select Platform** drop-down list.
184+
1. Select **Security Experience** from the **Select Template** drop-down list.
185+
1. Select **Create policy**. The **Create a new policy** page appears.
186+
1. On the **Basics** page, enter a name and description for the profile in the **Name** and **Description** fields, respectively.
176187
1. Select **Next**.
177-
1. On the **Review + create** tab, review your policy settings, and then select **Save**.
188+
1. On the **Configuration settings** page, expand the groups of settings.
189+
1. From these groups, select the settings that you want to manage with this profile.
190+
1. Set the policies for the chosen groups of settings by configuring them as described in the following table:
191+
192+
|Description| Setting|
193+
| -------- | -------- |
194+
| TamperProtection (Device) | On|
195+
196+
#### Check the Cloud Protection network connectivity
197+
198+
It's important to check that the Cloud Protection network connectivity is working during your penetration testing.
199+
200+
CMD (Run as admin)
201+
202+
203+
```powershell
204+
cd "C:\Program Files\Windows Defender"
205+
MpCmdRun.exe -ValidateMapsConnection
206+
```
207+
208+
For more information [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
178209

179210
#### Check the platform update version
180211

@@ -188,7 +219,7 @@ Get-MPComputerStatus | Format-Table AMProductVersion
188219

189220
#### Check the Security Intelligence Update version
190221

191-
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
222+
The latest "Security Intelligence Update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
192223

193224
To check which "Security Intelligence Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
194225

@@ -198,7 +229,7 @@ Get-MPComputerStatus | Format-Table AntivirusSignatureVersion
198229

199230
#### Check the Engine Update version
200231

201-
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
232+
The latest scan "engine update" version is available in [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft anti-malware - Microsoft Security Intelligence](https://www.microsoft.com/wdsi/defenderupdates).
202233

203234
To check which "Engine Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
204235

defender-endpoint/linux-installer-script.md

Lines changed: 34 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
5050

5151
4. Select **Download onboarding package**. Save the file as `WindowsDefenderATPOnboardingPackage.zip`.
5252

53-
:::image type="content" source="media/linux-script-image.png" alt-text="Screenshot showing the options to select to download the onboarding package." lightbox="media/linux-script-image.png":::
53+
:::image type="content" source="media/linux-script-image.png" alt-text="Screenshot showing the options to select to download the onboarding package." lightbox="media/linux-script-image.png":::
5454

5555
5. From a command prompt, extract the contents of the archive:
5656

@@ -77,19 +77,19 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
7777
chmod +x mde_installer.sh
7878
```
7979
80-
4. Execute the installer script and provide the onboarding package as a parameter to install the agent and onboard the device to the Defender portal.
80+
1. Execute the installer script and provide the onboarding package as a parameter to install the agent and onboard the device to the Defender portal.
8181
8282
```bash
83-
84-
sudo ./mde_installer.sh --install --onboard ~/MicrosoftDefenderATPOnboardingLinuxServer.py --channel prod --min_req -y
85-
83+
84+
sudo ./mde_installer.sh --install --onboard ./MicrosoftDefenderATPOnboardingLinuxServer.py --channel prod --min_req
85+
8686
```
87+
88+
This command deploys the latest agent version to the production channel, check for min system requisites and onboard the device to Defender Portal.
8789
88-
This command deploys the latest agent version to the production channel, check for min system requisites and onboard the device to Defender Portal.
89-
90-
Additionally you can pass more parameter based on your requirements to modify the installation. Check help for all the available options:
90+
Additionally you can pass more parameter based on your requirements to modify the installation. Check help for all the available options:
9191
92-
```bash
92+
```bash
9393
9494
❯ ./mde_installer.sh --help
9595
mde_installer.sh v0.7.0
@@ -108,7 +108,7 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
108108
-m|--min_req enforce minimum requirements
109109
-x|--skip_conflict skip conflicting application verification
110110
-w|--clean remove repo from package manager for a specific channel
111-
-y|--yes assume yes for all mid-process prompts (default, depracated)
111+
-y|--yes assume yes for all mid-process prompts (default, deprecated)
112112
-n|--no remove assume yes sign
113113
-s|--verbose verbose output
114114
-v|--version print out script version
@@ -124,19 +124,19 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
124124
125125
| Scenario | Command |
126126
|---|---|
127-
| Install a specific agent version | `sudo ~/mde_installer.sh --install --channel prod --onboard ~/MicrosoftDefenderATPOnboardingLinuxServer.py --min_req -y –-mdatp 101.24082.0004 ` |
128-
| To upgrade to the latest version | `sudo ~/mde_installer.sh --upgrade -y` |
129-
| For upgrading to a specific version | `sudo ~/mde_installer.sh --upgrade -y –-mdatp 101.24082.0004` |
130-
| To downgrade to a specific version | `sudo ~/mde_installer.sh --downgrade -y –-mdatp 101.24082.0004` |
131-
| To remove `mdatp` | `sudo ~/mde_installer.sh --remove -y` |
132-
133-
134-
> [!NOTE]
135-
> Upgrading your operating system to a new major version after the product installation requires the product to be reinstalled. You need to uninstall the existing Defender for Endpoint on Linux, upgrade the operating system, and then reconfigure Defender for Endpoint on Linux.
127+
|Install a specific agent version | `sudo ./mde_installer.sh --install --channel prod --onboard ./MicrosoftDefenderATPOnboardingLinuxServer.py --min_req –-mdatp 101.24082.0004 ` |
128+
|Upgrade to the latest agent version | `sudo ./mde_installer.sh --upgrade` |
129+
|Upgrade to a specific agent version | `sudo ./mde_installer.sh --upgrade –-mdatp 101.24082.0004` |
130+
|Downgrade to a specific agent version | `sudo ./mde_installer.sh --downgrade –-mdatp 101.24082.0004` |
131+
|Uninstall agent | `sudo ./mde_installer.sh --remove` |
132+
133+
134+
> [!NOTE]
135+
> Upgrading your operating system to a new major version after the product installation requires the product to be reinstalled. You need to uninstall the existing Defender for Endpoint on Linux, upgrade the operating system, and then reconfigure Defender for Endpoint on Linux.
136136
137137
## Verify deployment status
138138
139-
1. In the [Microsoft Defender portal](https://security.microsoft.com), open the device inventory. It might take 5-20 mins for the device to show up in the portal.
139+
1. In the [Microsoft Defender portal](https://security.microsoft.com), open the device inventory. It might take 5-20 minutes for the device to show up in the portal.
140140
141141
2. Run an antivirus detection test to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
142142
@@ -170,14 +170,22 @@ Before you get started, see [Microsoft Defender for Endpoint on Linux](microsoft
170170
mdatp threat list
171171
```
172172

173-
3. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
173+
1. Run an EDR detection test and simulate a detection to verify that the device is properly onboarded and reporting to the service. Perform the following steps on the newly onboarded device:
174174

175-
1. Verify that the onboarded Linux server appears in the Microsoft Defender portal. If this is the first onboarding of the machine, it can take up to 20 minutes until it appears.
176-
177-
2. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server, and run the following command:
178-
179-
`./mde_linux_edr_diy.sh`
175+
1. Download and extract the [script file](https://aka.ms/MDE-Linux-EDR-DIY) to an onboarded Linux server.
176+
177+
1. Grant executable permissions to the script:
180178

179+
```bash
180+
chmod +x mde_linux_edr_diy.sh
181+
```
182+
183+
1. Run the following command:
184+
185+
```bash
186+
./mde_linux_edr_diy.sh
187+
```
188+
181189
3. After a few minutes, a detection should be raised in the Microsoft Defender XDR.
182190

183191
4. Check the alert details, machine timeline, and perform your typical investigation steps.

0 commit comments

Comments
 (0)