Skip to content

Commit dd99f2b

Browse files
committed
Learn Editor: Update evaluate-mdav-using-gp.md
1 parent 167c5c7 commit dd99f2b

File tree

1 file changed

+22
-2
lines changed

1 file changed

+22
-2
lines changed

defender-endpoint/evaluate-mdav-using-gp.md

Lines changed: 22 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -204,7 +204,7 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
204204
| 01443614-cd74-433a-b99e-2ecdc07bfc25<br><br>**Note:** (Block executable files from running unless they meet a prevalence, age, or trusted list criterion) | 1 (Block) |
205205
| 26190899-1602-49e8-8b27-eb1d0a1ce869<br><br>**Note:** (Block Office communication application from creating child processes) | 1 (Block) |
206206
| d4f940ab-401b-4efc-aadc-ad5f3c50688a<br><br>**Note:** (Block all Office applications from creating child processes) | 1 (Block) |
207-
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ( \[PREVIEW\] Block use of copied or impersonated system tools) | 1 (Block) |
207+
| c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb<br><br>**Note:** ( [PREVIEW] Block use of copied or impersonated system tools) | 1 (Block) |
208208
| d3e037e1-3eb8-44c8-a917-57927947596d<br><br>**Note:** (Block JavaScript or VBScript from launching downloaded executable content) | 1 (Block) |
209209
| 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2<br><br>**Note:** (Block credential stealing from the Windows local security authority subsystem) | 1 (Block) |
210210
| a8f5898e-1dc8-49a9-9878-85004b8a61e6<br><br>**Note:** (Block Web shell creation for Servers) | 1 (Block) |
@@ -214,7 +214,7 @@ To enable Network Protection for Windows Servers, for now, please use Powershell
214214
| e6db77e5-3df2-4cf1-b95a-636979351e5b<br><br>**Note:** (Block persistence through WMI event subscription) | 1 (Block) |
215215
| c1db55ab-c21a-4637-bb3f-a12568109d35<br><br>**Note:** (Use advanced protection against ransomware) | 1 (Block) |
216216
| d1e49aac-8f56-4280-b9ba-993a6d77406c<br><br>**Note:** (Block process creations originating from PSExec and WMI commands) | 1 (Block)<br><br>**Note:** If you have Configuration Manager (formerly SCCM), or other management tools that use WMI, you might need to set this to 2 ('audit') instead of 1('block'). |
217-
| 33ddedf1-c6e0-47cb-833e-de6133960387<br><br>**Note:** ( \[PREVIEW\] Block rebooting machine in Safe Mode) | 1 (Block) |
217+
| 33ddedf1-c6e0-47cb-833e-de6133960387<br><br>**Note:** ( [PREVIEW] Block rebooting machine in Safe Mode) | 1 (Block) |
218218

219219
> [!TIP]
220220
> Some rules may block behavior you find acceptable in your organization. In these cases, change the rule from 'Enabled' to 'Audit' to prevent unwanted blocks.
@@ -229,6 +229,26 @@ Navigate to **Computer Configuration** > **Administrative Templates** > **Window
229229

230230
Assign the policies to the OU where the test machines are located.
231231

232+
#### Enable Tamper Protection
233+
234+
In the Microsoft XDR portal (security.microsoft.com), go to Settings > Endpoints > Advanced features > Tamper Protection > On.
235+
236+
For more information [How do I configure or manage tamper protection?](/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection)
237+
238+
#### Check the Cloud Protection network connectivity
239+
240+
It is important to check that the Cloud Protection network connectivity is working during your pen testing.
241+
242+
CMD (Run as admin)
243+
244+
245+
```
246+
cd "C:\Program Files\Windows Defender"
247+
MpCmdRun.exe -ValidateMapsConnection
248+
```
249+
250+
For more information [Use the cmdline tool to validate cloud-delivered protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
251+
232252
## Check the Platform Update version
233253

234254
The latest 'Platform Update' version Production channel (GA) is available here:

0 commit comments

Comments
 (0)