Skip to content

Commit dc3b433

Browse files
authored
Merge pull request #2585 from MicrosoftDocs/main
Published main to live, Wednesday 5:00 PM IST, 01/29
2 parents 0841740 + ae4b222 commit dc3b433

35 files changed

+239
-215
lines changed

defender-endpoint/aggregated-reporting.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,9 +61,9 @@ Aggregated reporting supports the following event types:
6161
> [!div class="mx-tdBreakAll"]
6262
> |Action type|Advanced hunting table|Device timeline presentation|Properties|
6363
> |:---|:---|:-------|:-------------------------------|
64-
> |FileCreatedAggregatedReport|DeviceFileEvents|{ProcessName} created {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
65-
>|FileRenamedAggregatedReport|DeviceFileEvents|{ProcessName} renamed {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
66-
> |FileModifiedAggregatedReport|DeviceFileEvents|{ProcessName} modified {Occurrences} {FilePath} files|1. File path </br> 2. Process name </br> 3. Process name|
64+
> |FileCreatedAggregatedReport|DeviceFileEvents|{ProcessName} created {Occurrences} {FilePath} files|1. File path </br> 2. File extension </br> 3. Process name|
65+
>|FileRenamedAggregatedReport|DeviceFileEvents|{ProcessName} renamed {Occurrences} {FilePath} files|1. File path </br> 2. File extension </br> 3. Process name|
66+
> |FileModifiedAggregatedReport|DeviceFileEvents|{ProcessName} modified {Occurrences} {FilePath} files|1. File path </br> 2. File extension </br> 3. Process name|
6767
> |ProcessCreatedAggregatedReport|DeviceProcessEvents|{InitiatingProcessName} created {Occurrences} {ProcessName} processes|1. Initiating process command line </br> 2. Initiating process SHA1 </br> 3. Initiating process file path </br> 4. Process command line </br> 5. Process SHA1 </br> 6. Folder path|
6868
> |ConnectionSuccessAggregatedReport|DeviceNetworkEvents|{InitiatingProcessName} established {Occurrences} connections with {RemoteIP}:{RemotePort}|1. Initiating process name </br> 2. Source IP </br> 3. Remote IP </br> 4. Remote port|
6969
> |ConnectionFailedAggregatedReport|DeviceNetworkEvents|{InitiatingProcessName} failed to establish {Occurrences} connections with {RemoteIP:RemotePort}|1. Initiating process name </br> 2. Source IP </br> 3. Remote IP </br> 4. Remote port|
@@ -92,7 +92,7 @@ You can use the following KQL queries to gather specific information using aggre
9292

9393
The following query highlights noisy process activity, which can be correlated with malicious signals.
9494

95-
```KQL
95+
```Kusto
9696
DeviceProcessEvents
9797
| where Timestamp > ago(1h)
9898
| where ActionType == "ProcessCreatedAggregatedReport"
@@ -105,7 +105,7 @@ DeviceProcessEvents
105105

106106
The following query identifies repeated sign-in attempt failures.
107107

108-
```KQL
108+
```Kusto
109109
DeviceLogonEvents
110110
| where Timestamp > ago(30d)
111111
| where ActionType == "LogonFailedAggregatedReport"
@@ -119,7 +119,7 @@ DeviceLogonEvents
119119

120120
The following query identifies suspicious RDP connections, which might indicate malicious activity.
121121

122-
```KQL
122+
```Kusto
123123
DeviceNetworkEvents
124124
| where Timestamp > ago(1d)
125125
| where ActionType endswith "AggregatedReport"

defender-endpoint/mac-device-control-faq.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: macOS Device control policies frequently asked questions (FAQ)
33
description: Get answers to common questions about device control policies using JAMF or Intune.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro
@@ -39,7 +40,7 @@ Answer: Run _mdatp device-control policy preferences list_ to see all the iOS po
3940

4041
:::image type="content" source="media/macos-device-control-faq-enabled-default-enforcement.png" alt-text="Shows how to run mdatp device-control policy preferences list to see if a device is Device Control enabled. " lightbox="media/macos-device-control-faq-enabled-default-enforcement.png":::
4142

42-
### How do I know whether the policy has been delivered to the client machine?
43+
### How do I know if the policy is delivered to the client machine?
4344

4445
Answer: Run _mdatp device-control policy rules list_ to see all the iOS policies on this machine:
4546

defender-endpoint/mac-device-control-intune.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Deploy and manage Device Control using Intune
33
description: Learn how to deploy and manage device control policies using Intune.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro
@@ -44,7 +45,7 @@ Before you get started with Removable Storage Access Control, you must confirm y
4445
Now, you have `groups`, `rules`, and `settings`, replace the mobileconfig file with those values and put it under the Device Control node. Here's the demo file: [mdatp-devicecontrol/demo.mobileconfig at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/mobileconfig/demo.mobileconfig). Make sure validate your policy with the JSON schema and make sure your policy format is correct: [mdatp-devicecontrol/device_control_policy_schema.json at main - microsoft/mdatp-devicecontrol (github.com)](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
4546

4647
> [!NOTE]
47-
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48+
> See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
4849
4950
### Deploy the mobileconfig file using Intune
5051

defender-endpoint/mac-device-control-jamf.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Deploy and manage device control using JAMF
33
description: Learn how to use device control policies using JAMF.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro
@@ -42,27 +43,27 @@ Before you get started with Removable Storage Access Control, you must confirm y
4243

4344
### Step 1: Create policy JSON
4445

45-
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here is the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
46+
Now, you have 'groups' and 'rules' and 'settings', combine 'settings' and 'groups' and rules into one JSON, here's the demo file: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/samples/deny_removable_media_except_kingston.json). Make sure to validate your policy with the JSON schema so your policy format is correct: [https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json](https://github.com/microsoft/mdatp-devicecontrol/blob/main/macOS/policy/device_control_policy_schema.json).
4647

47-
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules and groups.
48+
See [Device Control for macOS](mac-device-control-overview.md) for information about settings, rules, and groups.
4849

4950
### Step 2: Update MDE Preferences Schema
5051

51-
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json) has been updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
52+
The [MDE Preferences schema](https://github.com/microsoft/mdatp-xplat/blob/master/macos/schema/schema.json) is updated to include the new `deviceControl/policy` key. The existing MDE Preferences configuration profile should be updated to use the new schema file's content.
5253

5354
:::image type="content" source="media/macos-device-control-jamf-mde-preferences-schema.png" alt-text="Shows where to edit the Microsoft Defender for Endpoint Preferences Schema to update." lightbox="media/macos-device-control-jamf-mde-preferences-schema.png":::
5455

5556
### Step 3: Add Device Control Policy to MDE Preferences
5657

57-
A new 'Device Control' property will now be available to add to the UX.
58+
A new 'Device Control' property is now available to add to the UX.
5859

5960
1. Select the topmost **Add/Remove properties** button, then select **Device Control** and press **Apply**.
6061

6162
:::image type="content" source="media/macos-device-control-jamf-device-control-property.png" alt-text="Shows how to add Device Control in Microsoft Defender for Endpoint" lightbox="media/macos-device-control-jamf-device-control-property.png":::
6263

63-
2. Next, scroll down until you see the **Device Control** property (it will be the bottommost entry), and select **Add/Remove properties** directly underneath it.
64+
2. Next, scroll down until you see the **Device Control** property (it's the bottommost entry), and select **Add/Remove properties** directly underneath it.
6465

65-
3. Select **Device Control Policy**, and then click **Apply**.
66+
3. Select **Device Control Policy**, and then select **Apply**.
6667

6768
:::image type="content" source="media/macos-device-control-jamf-device-control-add-remove-property.png" alt-text="Shows how to apply Device Control Policy in Microsoft Defender for Endpoint." lightbox="media/macos-device-control-jamf-device-control-add-remove-property.png":::
6869

defender-endpoint/mac-device-control-manual.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,9 @@
22
title: Deploy and manage device control manually
33
description: Learn how to use device control policies manually.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: emmwalshh
6+
ms.author: ewalsh
7+
ms.reviewer: joshbregman
78
manager: deniseb
89
ms.localizationpriority: medium
910
audience: ITPro

0 commit comments

Comments
 (0)