Skip to content

Commit c5fd78c

Browse files
Merge branch 'main' into docs-editor/attack-surface-reduction-rules-1745954309
2 parents 126038f + 0323202 commit c5fd78c

15 files changed

+108
-83
lines changed

defender-endpoint/linux-install-manually.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -205,13 +205,13 @@ In order to preview new features and provide early feedback, it's recommended th
205205

206206
6. Install the Microsoft GPG public key:
207207

208-
- For Debian 11 and earlier, run the following command.
208+
- For Debian 11/Ubuntu 22.04 and earlier, run the following command.
209209

210210
```bash
211211
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/microsoft.gpg > /dev/null
212212
```
213213

214-
- For Debian 12 and later, run the following command.
214+
- For Debian 12/Ubuntu 24.04 and later, run the following command.
215215

216216
```bash
217217
curl -sSL https://packages.microsoft.com/keys/microsoft.asc | gpg --dearmor | sudo tee /usr/share/keyrings/microsoft-prod.gpg > /dev/null

defender-endpoint/troubleshoot-mdav-scan-issues.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
ms.topic: troubleshooting
1414
ms.subservice: ngp
1515
search.appverid: met150
16-
ms.date: 03/11/2025
16+
ms.date: 04/29/2025
1717
---
1818

1919
# Troubleshoot Microsoft Defender Antivirus scan issues
@@ -34,6 +34,20 @@ Understanding why a scan is launched can help identify what settings are applied
3434
| Catch up scan | Launched when a scheduled scan was missed twice |
3535
| Manually launched | A scan is launched manually by using any of the following methods: <br/>- Command Prompt: `MpCmdRun -scan -scantype` <br/>- [Taking a response action on a device](/defender-endpoint/respond-machine-alerts#run-microsoft-defender-antivirus-scan-on-devices) in the Microsoft Defender portal <br/>- Using the Windows Security app or Microsoft Defender app on the device |
3636

37+
## CPU performance and scan throttling in Microsoft Defender Antivirus
38+
39+
Microsoft Defender Antivirus includes several configurable settings to manage CPU usage during scans. These settings help balance system performance and security by controlling how aggressively Defender uses system resources. If you use Group Policy, these settings are found under `Computer Configuration > Administrative Templates > Windows Components > Microsoft Defender Antivirus > Scan`. To check current value of these settings on a machine use the `Get-MpPreference` PowerShell command.
40+
41+
The key settings to be aware of are listed in the following table:
42+
43+
| Setting | Details |
44+
|--|--|
45+
| `ScanOnlyIfIdle` | **Description**: When enabled, Microsoft Defender Antivirus only performs scans when the system is idle.<br/><br/>**Purpose**: This minimizes performance impact during active use by deferring scans until the system is not in use.<br/><br/>**Typical Use Case**: Ideal for environments where user experience is a priority and scans can be delayed without compromising security.<br/><br/>**Policy Name**:<br/>**Group Policy**: Not available. <br/>- **Intune**: `./Device/Vendor/MSFT/Defender/Configuration/ScanOnlyIfIdleEnabled` <br/><br/>**Default**: True (Enabled) |
46+
| `DisableCpuThrottleOnIdleScans` | **Description**: When set to `true`, this disables CPU throttling during idle-time scans.<br/><br/>**Purpose**: Allows Defender to use more CPU resources when the system is idle, potentially completing scans faster.<br/><br/>**Interaction with Other Settings**: Works with `ScanOnlyIfIdle`. If both are enabled, scans run only when idle and aren't throttled.<br/><br/>**Policy Name**:<br/>- **Group Policy**: Not available.<br/>- **Intune**: `./Device/Vendor/MSFT/Defender/Configuration/DisableCpuThrottleOnIdleScans`<br/><br/>**Default**: True (Enabled) |
47+
| `AvgCPULoadFactor` | **Description**: Specifies the average CPU load (as a percentage) that Microsoft Defender Antivirus shouldn't exceed during scans. This setting doesn't apply to real time protection scans.<br/><br/>**Purpose**: Helps maintain overall system responsiveness by limiting Defender's CPU usage.<br/><br/>**Example**: A value of `50` means Microsoft Defender Antivirus attempts to keep its CPU usage below 50% during scans.<br/><br/>**Interaction with Other Settings**: This setting is influenced by `DisableCpuThrottleOnIdleScans` and `ThrottleForScheduledScanOnly`, which can override or limit when throttling is applied.<br/><br/>**Policy Name**: <br/>- **Group Policy**: `Specify the maximum percentage of CPU utilization during a scan`<br/>- **Intune**: `./Device/Vendor/MSFT/Policy/Config/Defender/AvgCPULoadFactor` |
48+
| `ThrottleForScheduledScanOnly` | **Description**: When enabled, CPU throttling is applied only to scheduled scans, not to manual scans.<br/><br/>**Purpose**: Ensures that scheduled scans are less intrusive, while allowing manual scans to run at full speed if needed.<br/><br/>**Interaction with Other Settings**: When used with `AvgCPULoadFactor`, throttling limits only apply to scheduled scans. Manual scans ignore the CPU load factor and might use more resources.<br/><br/>**Policy Name**:<br/>- **Group Policy**: `Cpu throttling type` <br/>- **Intune**: `./Device/Vendor/MSFT/Policy/Config/Defender/ThrottleForScheduledScanOnly`<br/><br/>**Default**: True (Enabled) |
49+
| `EnableLowCpuPriority` | **Description**: This policy setting allows you to enable or disable low CPU priority for scheduled scans.<br/><br/>**Purpose**: Helps reduce the impact of scans on system performance by allowing other processes to take precedence over Microsoft Defender Antivirus's scanning tasks.<br/><br/>**Interaction with Other Settings**: Complements `AvgCPULoadFactor` and `ThrottleForScheduledScanOnly` by further deprioritizing Microsoft Defender Antivirus's CPU usage. It's especially useful in environments where maintaining responsiveness during scans is critical.<br/><br/>**Policy Name**: <br/>- **Group Policy**: `Configure low CPU priority for scheduled scans`<br/>- **Intune**: `./Device/Vendor/MSFT/Policy/Config/Defender/EnableLowCPUPriority`<br/><br/>**Default**: False (Disabled) |
50+
3751
## Policies that impact scanning
3852

3953
Understanding the policies applied to the scan enables you to understand the behavior of the scan and what can be tuned to remediate scan challenges.
@@ -73,7 +87,7 @@ In an Intune policy and in [Defender for Endpoint Security Settings Management](
7387

7488
Settings: `Scan Parameter`; `Schedule Scan Day`; and `Schedule Scan Time`
7589

76-
If you are using Group Policy to manage your devices, see [Configure Microsoft Defender Antivirus with Group Policy](/defender-endpoint/use-group-policy-microsoft-defender-antivirus#group-policy-settings-and-resources)
90+
If you're using Group Policy to manage your devices, see [Configure Microsoft Defender Antivirus with Group Policy](/defender-endpoint/use-group-policy-microsoft-defender-antivirus#group-policy-settings-and-resources)
7791

7892
For information about troubleshooting antivirus settings, see [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
7993

File renamed without changes.
920 Bytes
Loading
File renamed without changes.
File renamed without changes.
85.5 KB
Loading
295 KB
Loading

defender-vulnerability-management/tvm-security-recommendation.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 03/04/2025
15+
ms.date: 04/28/2025
1616
#customer intent: Get information on how to view and act on security recommendations in Microsoft Defender Vulnerability Management.
1717
---
1818

@@ -73,15 +73,15 @@ The color of the **Exposed devices** graph changes as the trend changes. If the
7373
> [!NOTE]
7474
> Vulnerability management shows devices that were in use within the last 30 days. This is different from device status in Defender for Endpoint, where if a device has `Inactive` status if it doesn't communicate with the service for more than seven days.
7575
76-
:::image type="content" alt-text="Screenshot of the security recommendations landing page." source="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sec-reco-expanded.png":::
76+
:::image type="content" source="media/tvm-sec-reco-expanded-small.png" alt-text="Screenshot of security recommendations." lightbox="media/tvm-sec-reco-expanded.png":::
7777

7878
### Icons
7979

8080
Useful icons also quickly call your attention to:
8181

82-
- ![arrow hitting a target.](/defender/media/defender-vulnerability-management/tvm_alert_icon.png) possible active alerts
83-
- ![red bug.](/defender/media/defender-vulnerability-management/tvm_bug_icon.png) associated public exploits
84-
- ![light bulb.](/defender/media/defender-vulnerability-management/tvm_insight_icon.png) recommendation insights
82+
- :::image type="content" source="media/tvm-alert-icon.png" alt-text="arrow hitting a target"::: possible active alerts
83+
- :::image type="content" source="media/tvm-bug-icon.png" alt-text="red bug"::: associated public exploits
84+
- :::image type="content" source="media/tvm-insight-icon.png" alt-text="light bulb"::: recommendation insights
8585

8686
### Impact
8787

defender-vulnerability-management/tvm-software-inventory.md

Lines changed: 35 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.collection:
1212
- Tier1
1313
ms.topic: concept-article
1414
search.appverid: met150
15-
ms.date: 03/05/2025
15+
ms.date: 04/29/2025
1616
#customer intent: To learn about the software inventory page in Microsoft Defender for Endpoint's Vulnerability Management.
1717
---
1818

@@ -36,20 +36,18 @@ You can remove the **CPE Available** filter to gain further visibility and incre
3636

3737
In the field of discovery, we're using the same set of signals that is responsible for detection and vulnerability assessment in [Microsoft Defender for Endpoint detection and response capabilities](/defender-endpoint/overview-endpoint-detection-response).
3838

39-
Since it's real time, in a matter of minutes, you see vulnerability information as they get discovered. The engine automatically grabs information from multiple security feeds. In fact, you see if a particular software is connected to a live threat campaign. It also provides a link to a Threat Analytics report soon as it's available.
39+
Since it's real time, in a matter of minutes, you see vulnerability information as it's discovered. The engine automatically grabs information from multiple security feeds. In fact, you see if a particular software is connected to a live threat campaign. It also provides a link to a Threat Analytics report soon as it's available.
4040

4141
## Navigate to the Software inventory page
4242

43-
Access the software inventory page by signing in to the [Microsoft Defender portal](https://security.microsoft.com) and navigating to **Endpoints** > **Vulnerability management** > **Inventories**, which opens to the **Software** tab.
43+
In the [Microsoft Defender portal](https://security.microsoft.com), in the navigation pane, go to **Endpoints** > **Vulnerability management** > **Inventories**, and then select the **Software** tab.
4444

4545
> [!NOTE]
46-
> If you search for software using the the Microsoft Defender portal global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
46+
> If you search for software using the Microsoft Defender portal global search, make sure to put an underscore instead of a space. For example, for the best search results you'd write `windows_10` or `windows_11` instead of `Windows 10` or `Windows 11`.
4747
4848
## Software inventory overview
4949

50-
The **Software inventory** page opens with a list of software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags.
51-
52-
The data is updated every three to four hours. There's currently no way to force a sync.
50+
The **Software inventory** lists software installed in your network, including the vendor name, weaknesses found, threats associated with them, exposed devices, impact to exposure score, and tags. The data is updated every three to four hours. There's currently no way to force a sync.
5351

5452
:::image type="content" alt-text="Example of the landing page for software inventory." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-main.png":::
5553

@@ -74,7 +72,7 @@ Here's how to tell whether software isn't supported:
7472

7573
## Software inventory on devices
7674

77-
1. Sign in to the Microsoft Defender portal. Navigate to **Assets** > **Devices** to open the **Device inventory** page.
75+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Assets** > **Devices** to open the **Device inventory** page.
7876

7977
2. Select the name of a device to open its device page.
8078

@@ -86,45 +84,53 @@ Software might be visible at the device level, even if it's currently not suppor
8684

8785
### Software evidence
8886

89-
See evidence of where we detected a specific software on a device from the registry, disk, or both. You can find it on any device in the device software inventory.
87+
See evidence of where specific software was detected a device in the registry, on the disk, or both. You can find this information on any device in the device software inventory.
9088

91-
Select a software name to open the flyout, and look for the section called **Software Evidence**.
89+
Select a software name to open its flyout, and look for the section called **Software Evidence**.
9290

9391
:::image type="content" alt-text="Software evidence example of Microsoft Edge showing evidence registry path as seen on a device page" source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-evidence.png":::
9492

9593
## Software pages
9694

97-
You can view software pages a few different ways:
95+
You can view software pages in the [Microsoft Defender portal](https://security.microosft.com) a few different ways:
9896

99-
- **Endpoints** > **Vulnerability management** > **Inventories** > Select a software name > Select **Open software page** in the flyout
100-
- [Security recommendations page](tvm-security-recommendation.md) > Select a recommendation > Select **Open software page** in the flyout
101-
- [Event timeline page](threat-and-vuln-mgt-event-timeline.md) > Select an event > Select the hyperlinked software name (like Visual Studio 2017) in the **Related component** section in the flyout
97+
- Go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab. Select a software name, and then, in the flyout, select **Open software page**.
98+
- Go to **Endpoints** > **Vulnerability management** > **Recommendations**. Select a recommendation, and in the flyout, select **Open software page**. (See [Security recommendations page](tvm-security-recommendation.md).)
99+
- Go to **Endpoints** > **Vulnerability management** > **Event timeline**. Select an event, and then, in the **Related components** section, select the link for the software name. (See [Event timeline page](threat-and-vuln-mgt-event-timeline.md).)
102100

103-
A full page appears with all the details of a specific software and the following information:
101+
The software page provides details about specific software with the following information:
104102

105103
- Overview with vendor information, exploits available, and impact rating
106104
- Data visualizations showing the number of and severity of discovered weaknesses, exposed devices, software's usage in the past 30 days, and the top events in the last seven days.
107-
- Tabs showing information such as:
108-
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
109-
- Named CVEs of discovered vulnerabilities.
110-
- Devices that have the software installed (along with device name, domain, OS, and more).
111-
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
112-
- Event timeline
113-
- Browser extensions (if applicable)
105+
- Tabs showing information, such as:
106+
- Corresponding security recommendations for the weaknesses and vulnerabilities identified.
107+
- Named CVEs of discovered vulnerabilities.
108+
- Devices that have the software installed (along with device name, domain, OS, and more).
109+
- Software version list (including number of devices the version is installed on, the number of discovered vulnerabilities, and the names of the installed devices).
110+
- Event timeline
111+
- Browser extensions (if applicable)
112+
113+
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
114+
115+
## Normalized software versions
114116

115-
:::image type="content" alt-text="Software example page for Microsoft Edge with the software details, weaknesses, exposed devices, and more." source="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage-small.png" lightbox="/defender/media/defender-vulnerability-management/tvm-sw-inventory-softpage.png":::
117+
For some software, normalized versions might be displayed in the Microsoft Defender portal. For example, suppose a device has [SQL Server 2016, version 13.0.7016.1](/troubleshoot/sql/releases/download-and-install-latest-updates#sql-server-2016) installed. However, in the [Microsoft Defender portal](https://security.microsoft.com), SQL Server 2016 is listed as `13.3.7016.1`, a normalized version of SQL Server. In this case, `13.3.7016.1` is functionally equivalent to `13.0.7016.1`.
118+
119+
Defender Vulnerability Management applies version normalization rules to ensure better cross-device correlation and more accurate vulnerability assessments. Version normalization is intentional and valid, and is used consistently to streamline detection logic and align with internal data models.
116120

117121
## Report inaccuracy
118122

119123
Report an inaccuracy when you see vulnerability information and assessment results that are incorrect.
120124

121-
1. Open the software flyout on the Software inventory page.
122-
2. Select **Report inaccuracy**.
123-
3. From the flyout pane, choose an issue to report from:
125+
1. In the [Microsoft Defender portal](https://security.microsoft.com), go to **Endpoints** > **Vulnerability management** > **Inventories**, and select the **Software** tab.
126+
127+
2. Select a software name to open its flyout, and then select **Report inaccuracy**.
128+
129+
3. From the flyout pane, choose an issue. Examples include:
124130

125-
- a software detail is wrong
126-
- the software isn't installed on any device in my org
127-
- the number of installed or exposed devices is wrong
131+
- A software detail is wrong
132+
- The software isn't installed on any device in my org
133+
- The number of installed or exposed devices is wrong
128134

129135
4. Fill in the requested details about the inaccuracy.
130136

0 commit comments

Comments
 (0)