Skip to content

Commit c79ff79

Browse files
authored
Merge branch 'main' into US317434_CAPs
2 parents 281d4ad + 4eeb8ac commit c79ff79

File tree

119 files changed

+1712
-470
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

119 files changed

+1712
-470
lines changed

defender-endpoint/TOC.yml

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -896,7 +896,7 @@
896896
- name: Troubleshooting mode scenarios
897897
href: troubleshooting-mode-scenarios.md
898898

899-
- name: Diagnostics and performance for Microsoft Defender Antivirus
899+
- name: Diagnostics for Microsoft Defender Antivirus
900900
items:
901901
- name: Device health reports
902902
href: device-health-reports.md
@@ -907,18 +907,23 @@
907907
href: device-health-sensor-health-os.md
908908
- name: Microsoft Defender Core service overview
909909
href: microsoft-defender-core-service-overview.md
910-
displayName: Microsoft Defender Core service overview
911910
- name: Microsoft Defender Core service configurations and experimentation
912911
href: microsoft-defender-core-service-configurations-and-experimentation.md
913-
- name: Troubleshoot performance issues related to real-time protection
914-
href: troubleshoot-performance-issues.md
915912
- name: Collect diagnostic data of Microsoft Defender Antivirus
916913
href: collect-diagnostic-data.md
917-
- name: Improve performance of Microsoft Defender Antivirus
918-
href: tune-performance-defender-antivirus.md
919914

920915
- name: Troubleshooting Microsoft Defender Antivirus
921916
items:
917+
- name: Troubleshoot Microsoft Defender Antivirus performance issues
918+
items:
919+
- name: Performance analyzer for Microsoft Defender Antivirus
920+
href: tune-performance-defender-antivirus.md
921+
- name: Performance analyzer reference
922+
href: performance-analyzer-reference.md
923+
displayName: high cpu msmpeng.exe antimalware engine microsoft defender
924+
antivirus windows defender antivirus
925+
- name: Troubleshoot performance issues related to real-time protection
926+
href: troubleshoot-performance-issues.md
922927
- name: Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus
923928
href: troubleshoot-microsoft-defender-antivirus.yml
924929
- name: Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution

defender-endpoint/android-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 10/18/2024
18+
ms.date: 11/22/2024
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -57,7 +57,7 @@ This feature provides protection against rogue Wi-Fi related threats and rogue c
5757

5858
It includes several admin controls to offer flexibility, such as the ability to configure the feature from within the Microsoft Intune admin center and add trusted certificates. Admins can enable [privacy controls](android-configure.md#privacy-controls) to configure the data sent to Defender for Endpoint from Android devices.
5959

60-
Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to **configure Network protection in Android devices.**
60+
Network protection in Microsoft Defender for endpoint is enabled by default. Admins can use the following steps to **configure Network protection in Android devices.**
6161

6262
In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
6363

defender-endpoint/android-intune.md

Lines changed: 56 additions & 79 deletions
Large diffs are not rendered by default.

defender-endpoint/android-whatsnew.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -27,18 +27,19 @@ ms.date: 11/15/2024
2727

2828
Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-exposedapis-abovefoldlink)
2929

30-
**Ending support for Device Administrator enrolled devices**
31-
32-
Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33-
34-
**For devices with access to GMS**
35-
36-
After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways: 
37-
38-
- Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39-
- Intune and Defender for Endpoint technical support will no longer support these devices.
30+
> [!IMPORTANT]
31+
> **Ending support for Device Administrator enrolled devices**
32+
> Microsoft Intune and Defender for Endpoint are ending support for Device Administrator enrolled devices with access to [Google Mobile Services](/mem/intune/apps/manage-without-gms) (GMS), beginning December 31, 2024.
33+
>
34+
> **For devices with access to GMS**
35+
>
36+
> After Intune and Defender for Endpoint ends support for Android device administrator, devices with access to GMS will be impacted in the following ways:
37+
>
38+
> - Intune and Defender for Endpoint won’t make changes or updates to Android device administrator management, such as bug fixes, security fixes, or fixes to address changes in new Android versions.
39+
> - Intune and Defender for Endpoint technical support will no longer support these devices.
40+
>
41+
> For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
4042
41-
For more information, see [Tech Community blog: Intune ending support for Android device administrator on devices with GMS in December 2024](https://techcommunity.microsoft.com/blog/intunecustomersuccess/intune-ending-support-for-android-device-administrator-on-devices-with-gms-in-de/3915443).
4243

4344
**Aug-2024 (version: 1.0.6812.0101)**
4445

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/10/2024
18+
ms.date: 11/18/2024
1919
search.appverid: met150
2020
---
2121

@@ -330,6 +330,11 @@ By default the state of this rule is set to block. In most cases, many processes
330330

331331
Enabling this rule doesn't provide additional protection if you have LSA protection enabled since the ASR rule and LSA protection work similarly. However, when LSA protection cannot be enabled, this rule can be configured to provide equivalent protection against malware that target `lsass.exe`.
332332

333+
> [!TIP]
334+
> 1. ASR audit events don't generate toast notifications. However, since the LSASS ASR rule produces large volume of audit events, almost all of which are safe to ignore when the rule is enabled in block mode, you can choose to skip the audit mode evaluation and proceed to block mode deployment, beginning with a small set of devices and gradually expanding to cover the rest.
335+
> 2. The rule is designed to suppress block reports/toasts for friendly processes. It is also designed to drop reports for duplicate blocks. As such, the rule is well suited to be enabled in block mode, irrespective of whether toast notifications are enabled or disabled. 
336+
> 3. ASR in warn mode is designed to present users with a block toast notification that includes an "Unblock" button. Due to the "safe to ignore" nature of LSASS ASR blocks and their large volume, WARN mode is not advisable for this rule (irrespective of whether toast notifications are enabled or disabled).
337+
333338
> [!NOTE]
334339
> In this scenario, the ASR rule is classified as "not applicable" in Defender for Endpoint settings in the Microsoft Defender portal.
335340
> The *Block credential stealing from the Windows local security authority subsystem* ASR rule doesn't support WARN mode.

defender-endpoint/configure-device-connectivity.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ To test streamlined connectivity for devices not yet onboarded to Defender for E
173173

174174
- Run `mdeclientanalyzer.cmd -g <GW_US, GW_UK, GW_EU>` , where parameter is of GW_US, GW_EU, GW_UK. GW refers to the streamlined option. Run with applicable tenant geo.
175175

176-
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/BetaMDEAnalyzer
176+
As a supplementary check, you can also use the client analyzer to test whether a device meets prerequisites: https://aka.ms/MDEClientAnalyzerPreview
177177

178178

179179
> [!NOTE]

defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Exclude files from Microsoft Defender Antivirus scans based on thei
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 09/10/2024
7+
ms.date: 11/21/2024
88
author: denisebmsft
99
ms.author: deniseb
1010
ms.topic: conceptual
@@ -57,7 +57,7 @@ The following table lists some examples of exclusions based on file extension an
5757
|Exclusion|Examples|Exclusion list|
5858
|---|---|---|
5959
|Any file with a specific extension|All files with the specified extension, anywhere on the machine. <br/><br/> Valid syntax: `.test` and `test`|Extension exclusions|
60-
|Any file under a specific folder|All files under the `c:\test\sample` folder|File and folder exclusions|
60+
|Any file or folder under a specific folder|All files and folders under the `c:\test\sample` folder|File and folder exclusions|
6161
|A specific file in a specific folder|The file `c:\sample\sample.test` only|File and folder exclusions|
6262
|A specific process|The executable file `c:\test\process.exe`|File and folder exclusions|
6363

defender-endpoint/controlled-folders.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Protect important folders from ransomware from encrypting your files with
33
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 11/06/2024
6+
ms.date: 11/19/2024
77
author: denisebmsft
88
ms.author: deniseb
99
audience: ITPro
@@ -40,7 +40,7 @@ search.appverid: met150
4040
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Controlled folder access can be configured by using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices). Controlled folder access is supported on Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11,
4141

4242
> [!NOTE]
43-
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](indicator-certificates.md).
43+
> Scripting engines like PowerShell are not trusted by controlled folder access, even if you create an "allow" indicator by using [certificate and file indicators](indicator-certificates.md). The only way to allow script engines to modify protected folders is by adding them as an allowed app. See [Allow specific apps to make changes to controlled folders](/defender-endpoint/customize-controlled-folders).
4444
4545
Controlled folder access works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](investigate-alerts.md).
4646

defender-endpoint/defender-endpoint-demonstration-cloud-delivered-protection.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,15 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: ngp
17-
ms.date: 10/21/2022
17+
ms.date: 11/22/2024
1818
---
1919

2020
# Cloud-delivered protection demonstration
2121

2222
**Applies to:**
2323

24-
-
25-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2624
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25+
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
2826
- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)
2927
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
3028

@@ -39,7 +37,10 @@ Cloud-delivered protection for Microsoft Defender Antivirus, also referred to as
3937

4038
### Scenario
4139

42-
1. Download the [test file](https://aka.ms/ioavtest). Important: The test file isn't malicious, it's just a harmless file simulating a virus.
40+
1. Download and extract the [zipped folder that contains the test file](https://go.microsoft.com/fwlink/?linkid=2298135). The password is *infected*.
41+
42+
> [!IMPORTANT]
43+
> The test file isn't malicious, it's just a harmless file simulating a virus.
4344
4445
2. If you see file blocked by Microsoft Defender SmartScreen, select on "View downloads" button.
4546

defender-endpoint/download-client-analyzer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Learn how to download the Microsoft Defender for Endpoint client analyzer on sup
2929
## Download client analyzer for Windows OS
3030

3131
1. The latest stable edition is available for download from following URL: <https://aka.ms/MDEAnalyzer>
32-
2. The latest preview edition is available for download from following URL: <https://aka.ms/BetaMDEAnalyzer>
32+
2. The latest preview edition is available for download from following URL: <https://aka.ms/MDEClientAnalyzerPreview>
3333

3434
## Download client analyzer for macOS or Linux
3535

0 commit comments

Comments
 (0)