Skip to content

Commit c5d2d8a

Browse files
Merge branch 'main' into v-jodavies-eval-pilot-xdr-rework
2 parents b47823e + bc01805 commit c5d2d8a

File tree

2 files changed

+7
-8
lines changed

2 files changed

+7
-8
lines changed

defender-endpoint/malware/exploits-malware.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22
title: Exploits and exploit kits
33
ms.reviewer:
44
description: Learn about how exploits use vulnerabilities in common software to give attackers access to your computer and install other malware.
5-
keywords: security, malware, exploits, exploit kits, prevention, vulnerabilities, Microsoft, Exploit malware family, exploits, java, flash, adobe, update software, prevent exploits, exploit pack, vulnerability, 0-day, holes, weaknesses, attack, Flash, Adobe, out-of-date software, out of date software, update, update software, reinfection, Java cache, reinfected, won't remove, won't clean, still detects, full scan, MSE, Defender, WDSI, MMPC, Microsoft Malware Protection Center
65
ms.service: defender-endpoint
7-
ms.mktglfcycl: secure
86
ms.localizationpriority: medium
97
ms.author: dansimp
108
author: dansimp
@@ -15,7 +13,7 @@ ms.collection:
1513
- tier2
1614
ms.topic: conceptual
1715
search.appverid: met150
18-
ms.date: 03/18/2022
16+
ms.date: 05/30/2024
1917
---
2018

2119
# Exploits and exploit kits
@@ -36,7 +34,7 @@ The infographic below shows how an exploit kit might attempt to exploit a device
3634

3735
*Figure 1. Example of how to exploit kits work*
3836

39-
Several notable threats, including Wannacry, exploit the Server Message Block (SMB) vulnerability CVE-2017-0144 to launch malware.
37+
Notable threats use exploit kits to spread ransomware, including JSSLoader. The threat actor tracked by Microsoft as Storm-0324 (DEV-0324) uses this malware to facilitate access for the ransomware-as-a-service (RaaS) actor [Sangria Tempest](https://www.microsoft.com/en-us/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/#ELBRUS] (ELBRUS, Carbon Spider, FIN7).
4038

4139
Examples of exploit kits:
4240

@@ -61,4 +59,4 @@ You can read more on the [CVE website](https://cve.mitre.org/).
6159

6260
The best prevention for exploits is to keep your organization's [software up to date](https://portal.msrc.microsoft.com/). Software vendors provide updates for many known vulnerabilities, so make sure these updates are applied to all devices.
6361

64-
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
62+
For more general tips, see [prevent malware infection](prevent-malware-infection.md).

defender-endpoint/microsoft-defender-endpoint-linux.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/08/2024
18+
ms.date: 05/30/2024
1919
---
2020

2121
# Microsoft Defender for Endpoint on Linux
@@ -105,7 +105,9 @@ In general you need to take the following steps:
105105
> [!NOTE]
106106
> Distributions and version that are not explicitly listed are unsupported (even if they are derived from the officially supported distributions).
107107
> With RHEL 6 support for 'extended end of life' coming to an end by June 30, 2024; MDE Linux support for RHEL 6 will also be deprecated by June 30, 2024
108-
> MDE Linux version 101.23082.0011 is the last MDE Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
108+
> MDE Linux version 101.23082.0011 is the last MDE Linux release supporting RHEL 6.7 or higher versions (does not expire before June 30, 2024). Customers are advised to plan upgrades to their RHEL 6 infrastructure aligned with guidance from Red Hat.
109+
>
110+
> Microsoft Defender Vulnerablity Management is not supported on Alma currently.
109111
110112
- List of supported kernel versions
111113

@@ -255,4 +257,3 @@ High I/O workloads from certain applications can experience performance issues w
255257
- [Turn on network protection for Linux](network-protection-linux.md)
256258

257259
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
258-

0 commit comments

Comments
 (0)