Skip to content

Commit cdfb4b3

Browse files
authored
Merge pull request #143 from miashapan/patch-1
Update device-discovery-faq.md
2 parents d461c8e + 367765d commit cdfb4b3

File tree

1 file changed

+49
-4
lines changed

1 file changed

+49
-4
lines changed

defender-endpoint/device-discovery-faq.md

Lines changed: 49 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier3
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 03/23/2021
18+
ms.date: 11/12/2024
1919
---
2020

2121
# Device discovery frequently asked questions
@@ -65,11 +65,54 @@ The discovery engine distinguishes between network events that are received in t
6565
## What protocols are you capturing and analyzing?
6666

6767
By default, all onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 are capturing and analyzing the following protocols:
68-
ARP, CDP, DHCP, DHCPv6, IP (headers), LLDP, LLMNR, mDNS, MNDP, MSSQL, NBNS, SSDP, TCP (SYN headers), UDP (headers), WSD
68+
69+
- ARP
70+
- CDP
71+
- DHCP
72+
- DHCPv6
73+
- IP (headers)
74+
- LLDP
75+
- LLMNR
76+
- mDNS
77+
- MNDP
78+
- MSSQL
79+
- NBNS
80+
- SSDP
81+
- TCP (SYN headers)
82+
- UDP (headers)
83+
- WSD
6984

7085
## Which protocols do you use for active probing in Standard discovery?
7186
When a device is configured to run Standard discovery, exposed services are being probed by using the following protocols:
72-
ARP, FTP, HTTP, HTTPS, ICMP, LLMNR, NBNS, RDP, SIP, SMTP, SNMP, SSH, Telnet, UPNP, WSD, SMB, NBSS, IPP, PJL, RPC, mDNS, DHCP, AFP, CrestonCIP, IphoneSync, WinRM, VNC, SLP, LDAP
87+
88+
- AFP
89+
- ARP
90+
- DHCP
91+
- FTP
92+
- HTTP
93+
- HTTPS
94+
- ICMP
95+
- IphoneSync
96+
- IPP
97+
- LDAP
98+
- LLMNR
99+
- mDNS
100+
- NBNS
101+
- NBSS
102+
- PJL
103+
- RDP
104+
- RPC
105+
- SIP
106+
- SLP
107+
- SMB
108+
- SMTP
109+
- SNMP
110+
- SSH
111+
- Telnet
112+
- UPNP
113+
- VNC
114+
- WinRM
115+
- WSD
73116

74117
In addition, device discovery might also scan other commonly used ports to improve classification accuracy & coverage.
75118

@@ -91,6 +134,7 @@ Devices will actively be probed when changes in device characteristics are obser
91134
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it, what should I do?
92135

93136
The active probing scripts are signed by Microsoft and are safe. You can add the following path to your exclusion list:
137+
94138
`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps1`
95139

96140
## What is the amount of traffic being generated by the Standard discovery active probe?
@@ -101,7 +145,7 @@ Active probing can generate up to 50Kb of traffic between the onboarded device a
101145

102146
You may notice differences between the number of listed devices under "can be onboarded" in the device inventory, "onboard to Microsoft Defender for Endpoint" security recommendation, and "devices to onboard" dashboard widget.
103147

104-
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
148+
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
105149

106150
## Can I onboard unmanaged devices that were found?
107151

@@ -138,4 +182,5 @@ The device discovery capabilities have been built to only discover and identify
138182
### You can exclude network lures from active probing
139183

140184
Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions ensure that those devices won't be actively probed and won't be alerted. Those devices are discovered using passive methods only (similar to Basic discovery mode).
185+
141186
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)