Skip to content

Commit d665e9d

Browse files
authored
Merge pull request #1576 from MicrosoftDocs/main
Publish main to live, Friday 10:30AM PDT, 10/11
2 parents 6216997 + 24da870 commit d665e9d

30 files changed

+230
-233
lines changed

defender-endpoint/defender-endpoint-demonstration-controlled-folder-access.md

Lines changed: 50 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: asr
17-
ms.date: 02/16/2024
17+
ms.date: 10/11/2024
1818
---
1919

2020
# Controlled folder access (CFA) demonstrations (block ransomware)
@@ -44,10 +44,10 @@ Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
4444
## Rule states
4545

4646
|State | Mode| Numeric value |
47-
|:---|:---|:---|
48-
| Disabled | = Off | 0 |
49-
| Enabled | = Block mode | 1 |
50-
| Audit | = Audit mode | 2 |
47+
|---|---|---|
48+
| Disabled | Off | 0 |
49+
| Enabled | Block mode | 1 |
50+
| Audit | Audit mode | 2 |
5151

5252
## Verify configuration
5353

@@ -63,65 +63,86 @@ Get-MpPreference
6363

6464
### Setup
6565

66-
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script set execution policy to Unrestricted using this PowerShell command:
66+
Download and run this [setup script](https://demo.wd.microsoft.com/Content/CFA_SetupScript.zip). Before running the script, set execution policy to `Unrestricted` by using this PowerShell command:
6767

6868
```powershell
6969
Set-ExecutionPolicy Unrestricted
7070
```
7171

72-
You can perform these manual steps instead:
72+
Or, you can perform these manual steps instead:
7373

74-
1. Create a folder under c: named demo, "c:\demo".
74+
1. Create a folder under `c:` named `demo`, as in `c:\demo`.
7575

76-
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into c:\demo (we need something to encrypt).
76+
2. Save this [clean file](https://demo.wd.microsoft.com/Content/testfile_safe.txt) into `c:\demo` (we need something to encrypt).
7777

78-
3. Execute PowerShell commands listed earlier in this article.
78+
3. Run the PowerShell commands listed earlier in this article.
79+
80+
Next, check that status of the *Aggressive Ransomware Prevention* ASR rule and disable it for the duration of this test if it's enabled:
7981

80-
### Scenario 1: CFA blocks ransomware test file
8182

82-
1. Turn on CFA using PowerShell command:
83-
8483
```powershell
85-
Set-MpPreference -EnableControlledFolderAccess Enabled
84+
$idx = $(Get-MpPreference).AttackSurfaceReductionRules_Ids.IndexOf("C1DB55AB-C21A-4637-BB3F-A12568109D35")
85+
if ($idx -ge 0) {Write-Host "Rule Status: " $(Get-MpPreference).AttackSurfaceReductionRules_Actions[$idx]} else {Write-Host "Rule does not exist on this machine"}
8686
```
8787

88-
2. Add the demo folder to protected folders list using PowerShell command:
88+
If the rule exists and the status is `1 (Enabled)` or `6 (Warn)`, it must be disabled to run this test:
8989

9090
```powershell
91-
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
91+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Disabled
9292
```
9393

94-
3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
95-
4. Execute the ransomware test file *this isn't ransomware, it simple tries to encrypt c:\demo
94+
### Scenario 1: CFA blocks ransomware test file
95+
96+
1. Turn on CFA using PowerShell command:
97+
98+
```powershell
99+
Set-MpPreference -EnableControlledFolderAccess Enabled
100+
```
101+
102+
2. Add the demo folder to protected folders list using PowerShell command:
103+
104+
```powershell
105+
Set-MpPreference -ControlledFolderAccessProtectedFolders C:\demo\
106+
```
107+
108+
3. Download the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).
109+
110+
4. Execute the ransomware test file. Note that it isn't ransomware; it simply tries to encrypt `c:\demo`.
96111

97112
#### Scenario 1 expected results
98113

99-
5 seconds after executing the ransomware test file you should see a notification CFA blocked the encryption attempt.
114+
About five seconds after executing the ransomware test file, you should see a notification that CFA blocked the encryption attempt.
100115

101116
### Scenario 2: What would happen without CFA
102117

103118
1. Turn off CFA using this PowerShell command:
104119

105-
```powershell
106-
Set-MpPreference -EnableControlledFolderAccess Disabled
107-
```
120+
```powershell
121+
Set-MpPreference -EnableControlledFolderAccess Disabled
122+
```
108123

109-
2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe)
124+
2. Execute the ransomware [test file](https://demo.wd.microsoft.com/Content/ransomware_testfile_unsigned.exe).
110125

111126
#### Scenario 2 expected results
112127

113-
- The files in c:\demo are encrypted and you should get a warning message
128+
- The files in `c:\demo` are encrypted and you should get a warning message
114129
- Execute the ransomware test file again to decrypt the files
115130

116131
## Clean-up
117132

118-
Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
133+
1. Download and run this [cleanup script](https://demo.wd.microsoft.com/Content/ASR_CFA_CleanupScript.zip). You can perform these manual steps instead:
119134

120-
```powershell
121-
Set-MpPreference -EnableControlledFolderAccess Disabled
122-
```
135+
```powershell
136+
Set-MpPreference -EnableControlledFolderAccess Disabled
137+
```
138+
139+
2. Clean up `c:\demo` encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
140+
141+
3. If the *Aggressive Ransomware Prevention* ASR rule was enabled and you disabled it at the beginning of this test, enable it again:
123142

124-
Clean up c:\demo encryption by using the [encrypt/decrypt file](https://demo.wd.microsoft.com/Content/ransomware_cleanup_encrypt_decrypt.exe)
143+
```powershell
144+
Add-MpPreference -AttackSurfaceReductionRules_Ids C1DB55AB-C21A-4637-BB3F-A12568109D35 -AttackSurfaceReductionRules_Actions Enabled
145+
```
125146

126147
## See also
127148

defender-endpoint/device-control-policies.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about Device control policies in Defender for Endpoint
44
author: denisebmsft
55
ms.author: deniseb
66
manager: deniseb
7-
ms.date: 09/18/2024
7+
ms.date: 10/11/2024
88
ms.topic: overview
99
ms.service: defender-endpoint
1010
ms.subservice: asr
@@ -136,7 +136,7 @@ The following code snippet shows the syntax for a device control policy rule in
136136
</IncludedIdList>
137137
<ExcludedIdList>
138138
<GroupId>{3f5253e4-0e73-4587-bb9e-bb29a2171695}</GroupId>
139-
<ExcludedIdList>
139+
</ExcludedIdList>
140140
<Entry Id="{e3837e60-5e56-43ce-8095-043ccd793eac}">
141141
...
142142
</Entry>

defender-endpoint/linux-deploy-defender-for-endpoint-with-chef.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,15 +15,15 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/01/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Defender for Endpoint on Linux with Chef
2222

2323
**Applies to:**
2424

25-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
26-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
25+
- Microsoft Defender for Servers
26+
- Microsoft Defender XDR
2727

2828
[!INCLUDE [Microsoft Defender for Endpoint third-party tool support](../includes/support.md)]
2929

defender-endpoint/linux-exclusions.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/31/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
@@ -24,9 +24,8 @@ ms.date: 07/31/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231
@@ -141,7 +140,7 @@ For more information, see [Set preferences for Defender for Endpoint on Linux](l
141140
Run the following command to see the available switches for managing exclusions:
142141

143142
> [!NOTE]
144-
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isnt mentioned, the scope value is set as `epp`.
143+
> `--scope` is an optional flag with accepted value as `epp` or `global`. It provides the same scope used while adding the exclusion to remove the same exclusion. In the command line approach, if the scope isn't mentioned, the scope value is set as `epp`.
145144
> Exclusions added through CLI before the introduction of `--scope` flag remain unaffected and their scope is considered `epp`.
146145
147146
```bash

defender-endpoint/linux-install-manually.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 08/01/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux manually
@@ -24,9 +24,8 @@ ms.date: 08/01/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231

defender-endpoint/linux-install-with-ansible.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 09/19/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Ansible
@@ -24,9 +24,8 @@ ms.date: 09/19/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231

defender-endpoint/linux-install-with-puppet.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/15/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Puppet
@@ -25,9 +25,8 @@ ms.date: 07/15/2024
2525

2626
**Applies to:**
2727

28-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
28+
- Microsoft Defender for Servers
29+
- Microsoft Defender XDR
3130

3231
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3332

defender-endpoint/linux-install-with-saltack.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 07/15/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Deploy Microsoft Defender for Endpoint on Linux with Saltstack
@@ -24,9 +24,8 @@ ms.date: 07/15/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231

defender-endpoint/linux-preferences.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 08/28/2024
9+
ms.date: 10/11/2024
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -25,9 +25,8 @@ search.appverid: met150
2525

2626
**Applies to:**
2727

28-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
30-
- [Microsoft Defender XDR](/defender-xdr)
28+
- Microsoft Defender for Servers
29+
- Microsoft Defender XDR
3130

3231
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3332

defender-endpoint/linux-privacy.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 05/01/2024
18+
ms.date: 10/11/2024
1919
---
2020

2121
# Privacy for Microsoft Defender for Endpoint on Linux
@@ -24,9 +24,8 @@ ms.date: 05/01/2024
2424

2525
**Applies to:**
2626

27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
28-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
29-
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
28+
- Microsoft Defender XDR
3029

3130
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-investigateip-abovefoldlink)
3231

0 commit comments

Comments
 (0)