Skip to content

Commit de74469

Browse files
committed
updates
2 parents 0f1c567 + ef9172c commit de74469

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

44 files changed

+303
-153
lines changed

ATADocs/docfx.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,10 @@
4646
"layout": "Conceptual",
4747
"breadcrumb_path": "/advanced-threat-analytics/bread/toc.json",
4848
"uhfHeaderId": "MSDocsHeader-M365-IT",
49-
"searchScope": ["ATA"]
49+
"searchScope": ["ATA"],
50+
"contributors_to_exclude": [
51+
"beccarobins"
52+
]
5053
},
5154
"markdownEngineName": "markdig"
5255
}

CloudAppSecurityDocs/docfx.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,10 @@
4242
"ms.author": "bagol",
4343
"ms.collection": "M365-security-compliance",
4444
"ms.service": "defender-for-cloud-apps",
45-
"ms.suite": "ems"
45+
"ms.suite": "ems",
46+
"contributors_to_exclude": [
47+
"beccarobins"
48+
]
4649
},
4750
"fileMetadata": {},
4851
"template": [],

defender-business/docfx.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
62-
"alekyaj"
62+
"alekyaj",
63+
"beccarobins"
6364
]
6465
},
6566
"fileMetadata": {},

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 11/05/2024
18+
ms.date: 11/10/2024
1919
search.appverid: met150
2020
---
2121

@@ -348,6 +348,14 @@ Advanced hunting action type:
348348

349349
Dependencies: Microsoft Defender Antivirus
350350

351+
Known issues: These applications and "Block credential stealing from the Windows local security authority subsystem" rule, are incompatible:
352+
353+
|Application name|For information|
354+
| -------- | -------- |
355+
|Quest Dirsync Password Sync|[Dirsync Password Sync isn’t working when Windows Defender is installed, error: "VirtualAllocEx failed: 5" (4253914)](https://support.quest.com/kb/4253914/dirsync-password-sync-isn-t-working-when-windows-defender-is-installed-error-virtualallocex-failed-5)|
356+
357+
For technical support, contact the software vendor.
358+
351359
### Block executable content from email client and webmail
352360

353361
This rule blocks email opened within the Microsoft Outlook application, or Outlook.com and other popular webmail providers from propagating the following file types:
@@ -482,6 +490,15 @@ Advanced hunting action type:
482490

483491
Dependencies: Microsoft Defender Antivirus
484492

493+
Known issues: These applications and "Block Office applications from injecting code into other processes" rule, are incompatible:
494+
495+
|Application name|For information|
496+
| -------- | -------- |
497+
|Avecto (BeyondTrust) Privilege Guard|[September-2024 (Platform: 4.18.24090.11 | Engine 1.1.24090.11)](/defender-endpoint/microsoft-defender-antivirus-updates). |
498+
|Heimdal security|n/a|
499+
500+
For technical support, contact the software vendor.
501+
485502
### Block Office communication application from creating child processes
486503

487504
This rule prevents Outlook from creating child processes, while still allowing legitimate Outlook functions. This rule protects against social engineering attacks and prevents exploiting code from abusing vulnerabilities in Outlook. It also protects against [Outlook rules and forms exploits](https://blogs.technet.microsoft.com/office365security/defending-against-rules-and-forms-injection/) that attackers can use when a user's credentials are compromised.

defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.reviewer: yongrhee
1010
manager: deniseb
1111
ms.subservice: ngp
1212
ms.topic: conceptual
13-
ms.date: 07/25/2024
13+
ms.date: 11/10/2024
1414
ms.collection:
1515
- m365-security
1616
- tier2
@@ -64,7 +64,7 @@ You can specify the cloud block timeout period with an [endpoint security policy
6464

6565
3. Select (or create) an antivirus policy.
6666

67-
4. In the **Configuration settings** section, expand **Cloud protection**. Then, in the **Microsoft Defender Antivirus Extended Timeout In Seconds** box, specify the more time, in seconds, from 1 second to 50 seconds. Whatever you specify is added to the default 10 seconds.
67+
4. In the **Configuration settings** section, scroll down to **Cloud Extended Timeout** and specify the timeout, in seconds, from 0 to 50 seconds. Whatever you specify is added to the default 10 seconds.
6868

6969
5. (This step is optional) Make any other changes to your antivirus policy. (Need help? See [Settings for Microsoft Defender Antivirus policy in Microsoft Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-windows).)
7070

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: deniseb
77
manager: deniseb
88
audience: ITPro
99
ms.topic: how-to
10-
ms.date: 09/10/2024
10+
ms.date: 11/11/2024
1111
ms.collection:
1212
- m365-security
1313
- tier2
@@ -117,6 +117,8 @@ After you have onboarded devices, [run a detection test](run-detection-test.md).
117117

118118
The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) is a central location where you can view onboarded devices, security recommendations, detected threats, alerts, and more. To get started, see [Microsoft Defender portal](/defender-xdr/microsoft-365-defender-portal).
119119

120+
> [!IMPORTANT]
121+
> If you decide not to renew your trial or purchase a subscription, make sure to offboard devices before your trial expires.
120122
121123
## See also
122124

defender-endpoint/device-discovery-faq.md

Lines changed: 51 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier3
1616
ms.topic: conceptual
1717
search.appverid: met150
18-
ms.date: 03/23/2021
18+
ms.date: 11/12/2024
1919
---
2020

2121
# Device discovery frequently asked questions
@@ -65,11 +65,54 @@ The discovery engine distinguishes between network events that are received in t
6565
## What protocols are you capturing and analyzing?
6666

6767
By default, all onboarded devices running on Windows 10 version 1809 or later, Windows 11, Windows Server 2019, or Windows Server 2022 are capturing and analyzing the following protocols:
68-
ARP, CDP, DHCP, DHCPv6, IP (headers), LLDP, LLMNR, mDNS, MNDP, MSSQL, NBNS, SSDP, TCP (SYN headers), UDP (headers), WSD
68+
69+
- ARP
70+
- CDP
71+
- DHCP
72+
- DHCPv6
73+
- IP (headers)
74+
- LLDP
75+
- LLMNR
76+
- mDNS
77+
- MNDP
78+
- MSSQL
79+
- NBNS
80+
- SSDP
81+
- TCP (SYN headers)
82+
- UDP (headers)
83+
- WSD
6984

7085
## Which protocols do you use for active probing in Standard discovery?
7186
When a device is configured to run Standard discovery, exposed services are being probed by using the following protocols:
72-
ARP, FTP, HTTP, HTTPS, ICMP, LLMNR, NBNS, RDP, SIP, SMTP, SNMP, SSH, Telnet, UPNP, WSD, SMB, NBSS, IPP, PJL, RPC, mDNS, DHCP, AFP, CrestonCIP, IphoneSync, WinRM, VNC, SLP, LDAP
87+
88+
- AFP
89+
- ARP
90+
- DHCP
91+
- FTP
92+
- HTTP
93+
- HTTPS
94+
- ICMP
95+
- IphoneSync
96+
- IPP
97+
- LDAP
98+
- LLMNR
99+
- mDNS
100+
- NBNS
101+
- NBSS
102+
- PJL
103+
- RDP
104+
- RPC
105+
- SIP
106+
- SLP
107+
- SMB
108+
- SMTP
109+
- SNMP
110+
- SSH
111+
- Telnet
112+
- UPNP
113+
- VNC
114+
- WinRM
115+
- WSD
73116

74117
In addition, device discovery might also scan other commonly used ports to improve classification accuracy & coverage.
75118

@@ -88,9 +131,10 @@ As device discovery uses passive methods to discover devices in the network, any
88131

89132
Devices will actively be probed when changes in device characteristics are observed to make sure the existing information is up to date (typically, devices probed no more than once in a three-week period)
90133

91-
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it, what should I do?
134+
## My security tool raised alert on UnicastScanner.ps1 / PSScript_{GUID}.ps1 or port scanning activity initiated by it. What should I do?
92135

93136
The active probing scripts are signed by Microsoft and are safe. You can add the following path to your exclusion list:
137+
94138
`C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Downloads\*.ps1`
95139

96140
## What is the amount of traffic being generated by the Standard discovery active probe?
@@ -101,13 +145,13 @@ Active probing can generate up to 50Kb of traffic between the onboarded device a
101145

102146
You may notice differences between the number of listed devices under "can be onboarded" in the device inventory, "onboard to Microsoft Defender for Endpoint" security recommendation, and "devices to onboard" dashboard widget.
103147

104-
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
148+
The security recommendation and the dashboard widget are for devices that are stable in the network; excluding ephemeral devices, guest devices and others. The idea is to recommend on persistent devices that also imply on the overall security score of the organization.
105149

106150
## Can I onboard unmanaged devices that were found?
107151

108152
Yes. You can onboard unmanaged devices manually. Unmanaged endpoints in your network introduce vulnerabilities and risks to your network. Onboarding them to the service can increase the security visibility on them.
109153

110-
## I've noticed that unmanaged device health state is always "Active", why is that?
154+
## I've noticed that unmanaged device health state is always "Active". Why is that?
111155

112156
Temporarily, unmanaged device health state is "Active" during the standard retention period of the device inventory, regardless of their actual state.
113157

@@ -138,4 +182,5 @@ The device discovery capabilities have been built to only discover and identify
138182
### You can exclude network lures from active probing
139183

140184
Standard discovery supports exclusion of devices or ranges (subnets) from active probing. If you have network lures deployed in place, you can use the Device Discovery settings to define exclusions based on IP addresses or subnets (a range of IP addresses). Defining those exclusions ensure that those devices won't be actively probed and won't be alerted. Those devices are discovered using passive methods only (similar to Basic discovery mode).
185+
141186
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/docfx.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@
5959
"v-stchambers",
6060
"Stacyrch140",
6161
"garycentric",
62-
"alekyaj"
62+
"alekyaj",
63+
"beccarobins"
6364
]
6465
},
6566
"fileMetadata": {},

defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
ms.topic: how-to
77
author: denisebmsft
88
ms.author: deniseb
9-
ms.date: 04/03/2024
9+
ms.date: 11/10/2024
1010
ms.reviewer: pahuijbr
1111
manager: deniseb
1212
ms.custom: nextgen
@@ -81,7 +81,7 @@ For more information about the specific network-connectivity requirements to ens
8181

8282
| Task | Steps |
8383
|---------|---------|
84-
| Create a new policy | 1. For **Platform**, select **Windows 10, Windows 11, and Windows Server**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**. Then choose **Next**. <br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
84+
| Create a new policy | 1. For **Platform**, select **Windows**. <br/><br/>2. For **Profile**, select **Microsoft Defender Antivirus**.<br/><br/>3. On the **Basics** page, specify a name and description for the policy, and then choose **Next**.<br/><br/>4. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>5. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>6. On the **Scope tags** step, if your organization is using [scope tags](/mem/intune/fundamentals/scope-tags), select the tags you want to use, and then choose **Next**.<br/><br/>7. On the **Assignments** step, select the groups, users, or devices that you want to apply this policy to, and then choose **Next**.<br/><br/>8. On the **Review + create** step, review the settings for your policy, and then choose **Create**. |
8585
| Edit an existing policy | 1. Select the policy that you want to edit.<br/><br/>2. Under **Configuration settings**, choose **Edit**.<br/><br/>3. In the **Defender** section, find **Allow Cloud Protection**, and set it to **Allowed**.<br/><br/>4. Scroll down to **Submit Samples Consent**, and select one of the following settings:<br/>- **Send all samples automatically**<br/>- **Send safe samples automatically**<br/><br/>5. Select **Review + save**. |
8686

8787
> [!TIP]

defender-endpoint/mac-preferences.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,10 @@
22
title: Set preferences for Microsoft Defender for Endpoint on Mac
33
description: Configure Microsoft Defender for Endpoint on Mac in enterprise organizations.
44
ms.service: defender-endpoint
5-
author: YongRhee-MSFT
6-
ms.author: yongrhee
5+
author: denisebmsft
6+
ms.author: deniseb
77
manager: deniseb
8+
ms.reviewer: yongrhee
89
ms.localizationpriority: medium
910
audience: ITPro
1011
ms.collection:
@@ -14,7 +15,7 @@ ms.collection:
1415
ms.topic: how-to
1516
ms.subservice: macos
1617
search.appverid: met150
17-
ms.date: 08/15/2024
18+
ms.date: 11/11/2024
1819
---
1920

2021
# Set preferences for Microsoft Defender for Endpoint on macOS
@@ -681,7 +682,7 @@ The following configuration profile (or, in case of JAMF, a property list that c
681682
<key>PayloadOrganization</key>
682683
<string>Microsoft</string>
683684
<key>PayloadIdentifier</key>
684-
<string>
685+
<string>C4E6A782-0C8D-44AB-A025-EB893987A295</string>
685686
<key>PayloadDisplayName</key>
686687
<string>Microsoft Defender for Endpoint settings</string>
687688
<key>PayloadDescription</key>

0 commit comments

Comments
 (0)