Skip to content

Commit dfa530c

Browse files
authored
Merge branch 'main' into mde-video-updates
2 parents ef09a0b + 0589dee commit dfa530c

File tree

3 files changed

+29
-6
lines changed

3 files changed

+29
-6
lines changed

defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-ngp
1818
search.appverid: met150
19-
ms.date: 03/04/2025
19+
ms.date: 04/01/2025
2020
---
2121

2222
# Detect and block potentially unwanted applications
@@ -106,6 +106,12 @@ You can enable PUA protection with Microsoft Defender for Endpoint Security Sett
106106

107107
At first, try using PUA protection in audit mode. It detects potentially unwanted applications without actually blocking them. Detections are captured in the Windows Event log. PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and it's important to avoid false positives.
108108

109+
| Operating systems |Potentially Unwanted Protection (PUA) by default is set to:|
110+
| -------- | -------- |
111+
|Windows 11, Windows 10, Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016|Audit mode (2)|
112+
|Windows 11, Windows 10 + Microsoft Defender for Endpoint Plan 1 or Microsoft Defender for Endpoint Plan 2 or Microsoft Endpoint for Business|Block mode (1)|
113+
|Windows Server 2025, Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows Server 2012 R2 with the unified Microsoft Defender for Endpoint client + Microsoft Defender for Servers Plan 1 or Microsoft Defender for Servers Plan 2 or Microsoft Defender for Endpoint for servers|Block mode (1) |
114+
109115
### Use Microsoft Defender for Endpoint Security Settings Management to configure PUA protection
110116

111117
See the following articles:
@@ -156,7 +162,7 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
156162
Set-MpPreference -PUAProtection Enabled
157163
```
158164

159-
Setting the value for this cmdlet to `Enabled` turns on the feature if it is disabled.
165+
Setting the value for this cmdlet to `Enabled` turns on the feature if it's disabled.
160166

161167
#### To set PUA protection to audit mode
162168

@@ -186,8 +192,8 @@ get-mpPreference | ft PUAProtection
186192
|Value | Description|
187193
| -------- | -------- |
188194
| `0` | PUA Protection off (Default). Microsoft Defender Antivirus won't protect against potentially unwanted applications. |
189-
| `1` | PUA Protection on. Detected items are blocked. They will show in history along with other threats.|
190-
| `2` | Audit mode. Microsoft Defender Antivirus will detect potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
195+
| `1` | PUA Protection on. Detected items are blocked. They'll show in history along with other threats.|
196+
| `2` | Audit mode. Microsoft Defender Antivirus detects potentially unwanted applications but take no action. You can review information about the applications Windows Defender would've taken action against by searching for events created by Windows Defender in the Event Viewer.|
191197

192198
For more information, see [Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus](use-powershell-cmdlets-microsoft-defender-antivirus.md) and [Defender Antivirus cmdlets](/powershell/module/defender/index).
193199

defender-endpoint/troubleshoot-asr.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
audience: ITPro
77
author: emmwalshh
88
ms.author: ewalsh
9-
ms.date: 03/11/2025
9+
ms.date: 04/01/2025
1010
ms.reviewer:
1111
manager: deniseb
1212
ms.custom: asr
@@ -136,6 +136,23 @@ Use the [Microsoft Security Intelligence web-based submission form](https://www.
136136

137137
When you report a problem with attack surface reduction rules, you're asked to collect and submit diagnostic data for Microsoft support and engineering teams to help troubleshoot issues.
138138

139+
### Using the MDE Client Analyzer
140+
141+
1. Download the [MDE Client Analyzer](/defender-endpoint/overview-client-analyzer).
142+
143+
2. Run the MDE Client Analyzer using [Live Response or locally](/defender-endpoint/run-analyzer-windows).
144+
145+
> [!TIP]
146+
> Ensure that log collection takes place during the reproduction attempt. Also, close any applications that aren't essential to reproducing the issue.
147+
148+
3. Run the MDE Client Analyzer with the `-v` switches:
149+
150+
```powershell
151+
C:\Work\tools\MDEClientAnalyzer\MDEClientAnalyzer.cmd -v
152+
```
153+
154+
### Manual process
155+
139156
1. Open Command Prompt as an administrator and open the Windows Defender directory:
140157

141158
```console

defender-xdr/compare-rbac-roles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ You configured protection-related Exchange Online permissions in the Exchange ad
138138
139139
|Defender for Cloud Apps permission|Defender XDR Unified RBAC permission|
140140
|---|-----|
141-
|Local Global administrator|Security operations \ Security data \ Security data basics (read)</br>Security operations \ Security data \ Alerts (manage)</br>Security operations \ Security data \ Response (manage)</br>Security operations \ Posture management \ Secure Score (read)</br>Security operations \ Posture management \ Secure Score (manage)</br>Authorization and settings \ Authorization (all permissions) </br>Authorization and settings \ Security settings (all permissions) </br>Authorization and settings \ System settings (all permissions)|
141+
|Local Global administrator|Security operations \ Security data \ Security data basics (read)</br>Security operations \ Security data \ Alerts (manage)</br>Authorization and settings \ Authorization (all permissions) </br>Authorization and settings \ Security settings (all permissions) </br>Authorization and settings \ System settings (all permissions)|
142142
|Local Security operator|Security operations \ Security data \ Security data basics (read) </br>Security operations \ Security data \ Alerts (manage)</br>Authorization and settings \ Authorization (read) </br>Authorization and settings \ Security setting (all permissions) </br>Authorization and settings \ System setting (read)|
143143
|Local Security reader|Security operations \ Security data \ Security data basics (read)</br>Authorization and settings \ Authorization (read) </br>Authorization and settings \ Security settings \ Security settings (read) </br>Authorization and settings \ System settings (read)|
144144
|Local Compliance administrator|Security operations \ Security data \ Security data basics (read)</br>Security operations \ Security data \ Alerts (manage)</br>Authorization and settings \ Authorization (read) </br>Authorization and settings \ Security settings \ Security settings (all permissions) </br>Authorization and settings \ System settings (read)|

0 commit comments

Comments
 (0)