You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Known issues: These applications and "Block credential stealing from the Windows local security authority subsystem" rule, are incompatible:
352
+
353
+
|Application name|For information|
354
+
| -------- | -------- |
355
+
|Quest Dirsync Password Sync|[Dirsync Password Sync isn’t working when Windows Defender is installed, error: "VirtualAllocEx failed: 5" (4253914)](https://support.quest.com/kb/4253914/dirsync-password-sync-isn-t-working-when-windows-defender-is-installed-error-virtualallocex-failed-5)|
356
+
357
+
For technical support, contact the software vendor.
358
+
351
359
### Block executable content from email client and webmail
352
360
353
361
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
For technical support, contact the software vendor.
501
+
485
502
### Block Office communication application from creating child processes
486
503
487
504
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.
Copy file name to clipboardExpand all lines: defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ ms.reviewer: yongrhee
10
10
manager: deniseb
11
11
ms.subservice: ngp
12
12
ms.topic: conceptual
13
-
ms.date: 07/25/2024
13
+
ms.date: 11/10/2024
14
14
ms.collection:
15
15
- m365-security
16
16
- tier2
@@ -64,7 +64,7 @@ You can specify the cloud block timeout period with an [endpoint security policy
64
64
65
65
3. Select (or create) an antivirus policy.
66
66
67
-
4. In the **Configuration settings** section, expand **Cloud protection**. Then, in the **Microsoft Defender Antivirus Extended Timeout In Seconds**box, specify the more time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
67
+
4. In the **Configuration settings** section, scroll down to **Cloud Extended Timeout**and specify the timeout, in seconds, from 0 to 50 seconds. Whatever you specify is added to the default 10 seconds.
68
68
69
69
5. (This step is optional) Make any other changes to your antivirus policy. (Need help? See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)
Copy file name to clipboardExpand all lines: defender-endpoint/defender-endpoint-trial-user-guide.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.author: deniseb
7
7
manager: deniseb
8
8
audience: ITPro
9
9
ms.topic: how-to
10
-
ms.date: 09/10/2024
10
+
ms.date: 11/11/2024
11
11
ms.collection:
12
12
- m365-security
13
13
- tier2
@@ -117,6 +117,8 @@ After you have onboarded devices, [run a detection test](run-detection-test.md).
117
117
118
118
The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is a central location where you can view onboarded devices, security recommendations, detected threats, alerts, and more. To get started, see [Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal).
119
119
120
+
> [!IMPORTANT]
121
+
> If you decide not to renew your trial or purchase a subscription, make sure to offboard devices before your trial expires.
Copy file name to clipboardExpand all lines: defender-endpoint/device-discovery-faq.md
+51-6Lines changed: 51 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
- tier3
16
16
ms.topic: conceptual
17
17
search.appverid: met150
18
-
ms.date: 03/23/2021
18
+
ms.date: 11/12/2024
19
19
---
20
20
21
21
# Device discovery frequently asked questions
@@ -65,11 +65,54 @@ The discovery engine distinguishes between network events that are received in t
65
65
## What protocols are you capturing and analyzing?
66
66
67
67
By default, all onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 are capturing and analyzing the following protocols:
In addition, device discovery might also scan other commonly used ports to improve classification accuracy & coverage.
75
118
@@ -88,9 +131,10 @@ As device discovery uses passive methods to discover devices in the network, any
88
131
89
132
Devices will actively be probed when changes in device characteristics are observed to make sure the existing information is up to date (typically, devices probed no more than once in a three-week period)
90
133
91
-
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it, what should I do?
134
+
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it. What should I do?
92
135
93
136
The active probing scripts are signed by Microsoft and are safe. You can add the following path to your exclusion list:
## What is the amount of traffic being generated by the Standard discovery active probe?
@@ -101,13 +145,13 @@ Active probing can generate up to 50Kb of traffic between the onboarded device a
101
145
102
146
You may notice differences between the number of listed devices under "can be onboarded" in the device inventory, "onboard to Microsoft Defender for Endpoint" security recommendation, and "devices to onboard" dashboard widget.
103
147
104
-
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
148
+
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
105
149
106
150
## Can I onboard unmanaged devices that were found?
107
151
108
152
Yes. You can onboard unmanaged devices manually. Unmanaged endpoints in your network introduce vulnerabilities and risks to your network. Onboarding them to the service can increase the security visibility on them.
109
153
110
-
## I've noticed that unmanaged device health state is always "Active", why is that?
154
+
## I've noticed that unmanaged device health state is always "Active". Why is that?
111
155
112
156
Temporarily, unmanaged device health state is "Active" during the standard retention period of the device inventory, regardless of their actual state.
113
157
@@ -138,4 +182,5 @@ The device discovery capabilities have been built to only discover and identify
138
182
### You can exclude network lures from active probing
139
183
140
184
Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions ensure that those devices won't be actively probed and won't be alerted. Those devices are discovered using passive methods only (similar to Basic discovery mode).
185
+
141
186
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]
Copy file name to clipboardExpand all lines: defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
6
6
ms.topic: how-to
7
7
author: denisebmsft
8
8
ms.author: deniseb
9
-
ms.date: 04/03/2024
9
+
ms.date: 11/10/2024
10
10
ms.reviewer: pahuijbr
11
11
manager: deniseb
12
12
ms.custom: nextgen
@@ -81,7 +81,7 @@ For more information about the specific network-connectivity requirements to ens
81
81
82
82
| Task | Steps |
83
83
|---------|---------|
84
-
| Create a new policy | 1. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**. Then choose **Next**. <br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
84
+
| Create a new policy | 1. For **Platform**, select **Windows**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
85
85
| Edit an existing policy | 1. Select the policy that you want to edit.<br/><br/>2. Under **Configuration settings**, choose **Edit**.<br/><br/>3. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>4. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>5. Select **Review + save**. |
0 commit comments