You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/AutoPublish.yml
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,8 @@ permissions:
7
7
8
8
on:
9
9
schedule:
10
-
- cron: "25 2,5,8,11,14,17,20,22 * * *"# Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
10
+
# - cron: "25 2,5,8,11,14,17,20,22 * * *" # Times are UTC based on Daylight Saving Time (~Mar-Nov). Scheduling at :25 to account for queuing lag.
11
+
- cron: "25 3,6,9,12,15,18,21,23 * * *"# Times are UTC based on Standard Time (~Nov-Mar). Scheduling at :25 to account for queuing lag.
Copy file name to clipboardExpand all lines: defender-endpoint/defender-endpoint-demonstration-network-protection.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Microsoft Defender for Endpoint Network protection demonstrations
3
-
description: Shows how Network protection prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
3
+
description: Shows how Network protection prevents employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet.
4
4
search.appverid: met150
5
5
ms.service: defender-endpoint
6
6
ms.author: bagol
@@ -24,7 +24,7 @@ appliesto:
24
24
---
25
25
# Network protection demonstrations
26
26
27
-
Network Protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
27
+
Network Protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet.
28
28
29
29
## Prerequisites
30
30
@@ -34,27 +34,27 @@ Network Protection helps reduce the attack surface of your devices from Internet
34
34
35
35
## Windows
36
36
37
-
PowerShell command
37
+
Run the following PowerShell command:
38
38
39
39
```powershell
40
40
Set-MpPreference -EnableNetworkProtection Enabled
41
41
```
42
42
43
-
Rule states
43
+
Following are the Rule states:
44
44
45
45
|State | Mode| Numeric value |
46
46
|:---|:---|:---|
47
47
| Disabled | = Off | 0 |
48
48
| Enabled | = Block mode | 1 |
49
49
| Audit | = Audit mode | 2 |
50
50
51
-
Verify configuration
51
+
Verify the configuration using the following PowerShell command:
52
52
53
53
```powershell
54
54
Get-MpPreference
55
55
```
56
56
57
-
Scenario
57
+
**Consider the following scenario**:
58
58
59
59
1. Turn on Network Protection using PowerShell command:
60
60
@@ -64,11 +64,11 @@ Scenario
64
64
65
65
2. Using the browser of your choice (not Microsoft Edge*), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
66
66
67
-
Expected results
67
+
Following are the expected results:
68
68
69
69
Navigation to the website should be blocked and you should see a **Connection blocked** notification.
To confirm that network protection has been started successfully, run the following command from the Terminal, and verify that it prints "started":
93
+
To confirm that network protection has started successfully, run the following command from the Terminal, and verify that it prints "started":
94
94
95
95
96
96
```bash
97
97
mdatp health --field network_protection_status
98
98
```
99
99
100
-
To test Network Protection on macOS/Linux
100
+
To test Network Protection on macOS/Linux:
101
101
102
-
1. Using the browser of your choice (not Microsoft Edge*), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
103
-
1.or from terminal
102
+
1. Using the browser of your choice (not Microsoft Edge), navigate to the [Network Protection website test](https://smartscreentestratings2.net/). Microsoft Edge has other security measures in place to protect from this vulnerability (SmartScreen).
This article describes these options for deployment, management, and reporting.
39
37
40
38
## Prerequisites
@@ -74,7 +72,7 @@ For reporting, you can choose from several options:
74
72
75
73
## PowerShell
76
74
77
-
You can use PowerShell with Group Policy or Configuration Manager to manage Microsoft Defender Antivirus on client devices. You can also use PowerShell to manage Microsoft Defender Antivirus manually on individual devices that are not managed by a security team.
75
+
You can use PowerShell with Group Policy or Configuration Manager to manage Microsoft Defender Antivirus on client devices. You can also use PowerShell to manage Microsoft Defender Antivirus manually on individual devices that aren't managed by a security team.
78
76
79
77
- Use the appropriate [Get- cmdlets available in the Defender module](/powershell/module/defender).
80
78
@@ -124,6 +122,6 @@ For reporting, Windows events comprise several security event sources, including
124
122
125
123
126
124
> [!TIP]
127
-
> **Performance tip** Due to a variety of factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues. You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
125
+
> **Performance tip**: Due to various factors, Microsoft Defender Antivirus, like other antivirus software, can cause performance issues on endpoint devices. In some cases, you might need to tune the performance of Microsoft Defender Antivirus to alleviate those performance issues. Microsoft's **Performance analyzer** is a PowerShell command-line tool that helps determine which files, file paths, processes, and file extensions might be causing performance issues. You can use the information gathered using Performance analyzer to better assess performance issues and apply remediation actions. See [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md).
128
126
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/deployment-vdi-microsoft-defender-antivirus.md
+23-25Lines changed: 23 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,8 +25,6 @@ appliesto:
25
25
---
26
26
# Configure Microsoft Defender Antivirus on a remote desktop or virtual desktop infrastructure environment
27
27
28
-
29
-
30
28
This article is designed for customers who are using Microsoft Defender Antivirus capabilities only. If you have Microsoft Defender for Endpoint (which includes Microsoft Defender Antivirus alongside other device protection capabilities), see [Onboard non-persistent virtual desktop infrastructure (VDI) devices in Microsoft Defender XDR](configure-endpoints-vdi.md).
31
29
32
30
You can use Microsoft Defender Antivirus in a remote desktop (RDS) or non-persistent virtual desktop infrastructure (VDI) environment. Using the guidance in this article, you can configure updates to download directly to your RDS or VDI environments whenever a user signs in.
@@ -55,23 +53,23 @@ In Windows 10, version 1903, Microsoft introduced the shared security intelligen
55
53
56
54
1. On your Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure, and then select **Edit**.
57
55
58
-
2. In the Group Policy Management Editor, go to **Computer configuration**.
56
+
1. In the Group Policy Management Editor, go to **Computer configuration**.
59
57
60
-
3. Select **Administrative templates**. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates**.
58
+
1. Select **Administrative templates**. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Security Intelligence Updates**.
61
59
62
-
4. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.
60
+
1. Double-click **Define security intelligence location for VDI clients**, and then set the option to **Enabled**. A field automatically appears.
63
61
64
-
5. In the field, type `\\<File Server shared location\>\wdav-update`. (For help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates).)
62
+
1. In the field, type `\\<File Server shared location\>\wdav-update`. (For help with this value, see [Download and unpackage](#download-and-unpackage-the-latest-updates).)
65
63
66
-
6. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
64
+
1. Select **OK**, and then deploy the Group Policy Object to the VMs you want to test.
67
65
68
66
### PowerShell
69
67
70
68
1. On each RDS or VDI device, use the following cmdlet to enable the feature:
71
69
72
70
`Set-MpPreference -SharedSignaturesPath \\<File Server shared location>\wdav-update`
73
71
74
-
2. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section in this article. Look for the *shared location* entry.)
72
+
1. Push the update as you normally would push PowerShell-based configuration policies onto your VMs. (See the [Download and unpackage](#download-and-unpackage-the-latest-updates) section in this article. Look for the *shared location* entry.)
75
73
76
74
## Download and unpackage the latest updates
77
75
@@ -100,7 +98,7 @@ You can also set up your single server or machine to fetch the updates on behalf
100
98
101
99
1. Create an SMB/CIFS file share.
102
100
103
-
2. Use the following example to create a file share with the following share permissions.
101
+
1. Use the following example to create a file share with the following share permissions.
104
102
105
103
```PowerShell
106
104
@@ -121,19 +119,19 @@ You can also set up your single server or machine to fetch the updates on behalf
121
119
122
120
1. On the management machine, open the **Start** menu and type `Task Scheduler`. From the results, select Task Scheduler and then select **Create task...** in the side panel.
123
121
124
-
2. Specify the name as `Security intelligence unpacker`.
122
+
1. Specify the name as `Security intelligence unpacker`.
125
123
126
-
3. On the **Trigger** tab, select **New...** > **Daily**, and select **OK**.
124
+
1. On the **Trigger** tab, select **New...** > **Daily**, and select **OK**.
127
125
128
-
4. On the **Actions** tab, select **New...**.
126
+
1. On the **Actions** tab, select **New...**.
129
127
130
-
5. Specify `PowerShell` in the **Program/Script** field.
128
+
1. Specify `PowerShell` in the **Program/Script** field.
131
129
132
-
6. In the **Add arguments** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
130
+
1. In the **Add arguments** field, type `-ExecutionPolicy Bypass c:\wdav-update\vdmdlunpack.ps1`, and then select **OK**.
133
131
134
-
7. Configure any other settings as appropriate.
132
+
1. Configure any other settings as appropriate.
135
133
136
-
8. Select **OK** to save the scheduled task.
134
+
1. Select **OK** to save the scheduled task.
137
135
138
136
To initiate the update manually, right-click on the task, and then select **Run**.
139
137
@@ -143,19 +141,19 @@ If you would prefer to do everything manually, here's what to do to replicate th
143
141
144
142
1. Create a new folder on the system root called `wdav_update` to store intelligence updates. For example, create the folder `c:\wdav_update`.
145
143
146
-
2. Create a subfolder under `wdav_update` with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
144
+
1. Create a subfolder under `wdav_update` with a GUID name, such as `{00000000-0000-0000-0000-000000000000}`
147
145
148
146
Here's an example: `c:\wdav_update\{00000000-0000-0000-0000-000000000000}`
149
147
150
148
> [!NOTE]
151
149
> We set the script so that the last 12 digits of the GUID are the year, month, day, and time when the file was downloaded so that a new folder is created each time. You can change this so that the file is downloaded to the same folder each time.
152
150
153
-
3. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
151
+
1. Download a security intelligence package from [https://www.microsoft.com/wdsi/definitions](https://www.microsoft.com/wdsi/definitions) into the GUID folder. The file should be named `mpam-fe.exe`.
154
152
155
-
4. Open a Command Prompt window and navigate to the GUID folder you created. Use the `/X` extraction command to extract the files. For example `mpam-fe.exe /X`.
153
+
1. Open a Command Prompt window and navigate to the GUID folder you created. Use the `/X` extraction command to extract the files. For example,`mpam-fe.exe /X`.
156
154
157
155
> [!NOTE]
158
-
> The VMs will pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.
156
+
> The VMs pick up the updated package whenever a new GUID folder is created with an extracted update package or whenever an existing folder is updated with a new extracted package.
159
157
160
158
## Microsoft Defender Antivirus configuration settings
161
159
@@ -204,7 +202,7 @@ It's important to take advantage of the included threat protection capabilities
204
202
- Enable file hash computation feature: `Enabled`
205
203
206
204
> [!NOTE]
207
-
> "Enable file hash computation feature" is only needed if using Indicators – File hash. It can cause higher amount of CPU utilization, since it has to parse thru each binary on disk to get the file hash.
205
+
> "Enable file hash computation feature" is only needed if using Indicators – File hash. It can cause higher amount of CPU utilization, since it has to parse through each binary on disk to get the file hash.
208
206
209
207
### Real-time protection
210
208
@@ -237,7 +235,7 @@ It's important to take advantage of the included threat protection capabilities
> If you want to harden, you could change "Turn on catch-up quick scan" to `Enabled`, which will help when VMs have been offline, and have missed two or more consecutive scheduled scans. But since it is running a scheduled scan, it will use additional CPU.
238
+
> If you want to harden, you could change "Turn on catch-up quick scan" to `Enabled`, which helps when VMs are offline, and have missed two or more consecutive scheduled scans. But since it's running a scheduled scan, it uses additional CPU.
241
239
242
240
- Turn on e-mail scanning: `Enabled`
243
241
@@ -327,12 +325,12 @@ Optimize the "Windows Defender Cache Maintenance" scheduled task for non-persist
327
325
328
326
1. Open up the **Task Scheduler** mmc (`taskschd.msc`).
329
327
330
-
2. Expand **Task Scheduler Library** > **Microsoft** > **Windows** > **Windows Defender**, and then right-click on **Windows Defender Cache Maintenance**.
328
+
1. Expand **Task Scheduler Library** > **Microsoft** > **Windows** > **Windows Defender**, and then right-click on **Windows Defender Cache Maintenance**.
331
329
332
-
3. Select **Run**, and let the scheduled task finish.
330
+
1. Select **Run**, and let the scheduled task finish.
333
331
334
332
> [!WARNING]
335
-
> If you do not do this, it can cause higher cpu utilization while the cache maintenance task is running on each of the VMs.
333
+
> If you don't do this, it can cause higher cpu utilization while the cache maintenance task is running on each of the VMs.
@@ -96,13 +95,13 @@ For more information about Microsoft Configuration Manager and Controlled Folder
96
95
97
96
1. Expand the tree to **Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Controlled folder access**.
98
97
99
-
1. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section you must specify one of the following options:
98
+
1. Double-click the **Configure Controlled folder access** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
100
99
101
100
-**Enable** - Malicious and suspicious apps aren't allowed to make changes to files in protected folders. A notification is provided in the Windows event log.
102
101
-**Disable (Default)** - The Controlled folder access feature won't work. All apps can make changes to files in protected folders.
103
102
-**Audit Mode** - Changes are allowed if a malicious or suspicious app attempts to make a change to a file in a protected folder. However, it's recorded in the Windows event log where you can assess the impact on your organization.
104
-
-**Block disk modification only** - Attempts by untrusted apps to write to disk sectors will be logged in Windows Event log. These logs can be found in **Applications and Services Logs** > Microsoft > Windows > Windows Defender > Operational > ID 1123.
105
-
-**Audit disk modification only** - Only attempts to write to protected disk sectors will be recorded in the Windows event log (under **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender** > **Operational** > **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
103
+
-**Block disk modification only** - Attempts by untrusted apps to write to disk sectors are logged in Windows Event log. These logs can be found in **Applications and Services Logs** > Microsoft > Windows > Windows Defender > Operational > ID 1123.
104
+
-**Audit disk modification only** - Only attempts to write to protected disk sectors are recorded in the Windows event log (under **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender** > **Operational** > **ID 1124**). Attempts to modify or delete files in protected folders won't be recorded.
106
105
107
106
:::image type="content" source="/defender/media/cfa-gp-enable.png" alt-text="Screenshot shows the group policy option enabled and Audit Mode selected." lightbox="/defender/media/cfa-gp-enable.png":::
0 commit comments