Skip to content

Commit e0f26ce

Browse files
authored
Merge pull request #2141 from MicrosoftDocs/main
MDE on Linux ARM64-based devices
2 parents 107f1e6 + 73152a9 commit e0f26ce

File tree

7 files changed

+444
-40
lines changed

7 files changed

+444
-40
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,13 @@ ms.topic: how-to
99

1010
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1111

12+
> [!NOTE]
13+
> This feature can potentially be exploited by an adversary to obtain the Net-NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
14+
> The new Defender for Identity sensor is not affected by this issue as it uses different detection methods.
15+
>
16+
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
17+
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).
18+
1219
This article describes the configuration changes required to allow the Defender for Identity Directory Services Account (DSA) to perform the SAM-R queries.
1320

1421
> [!TIP]
@@ -20,7 +27,7 @@ This article describes the configuration changes required to allow the Defender
2027
To ensure that Windows clients and servers allow your Defender for Identity Directory Services Account (DSA) to perform SAM-R queries, you must modify the **Group Policy** and add the DSA, in **addition to the configured accounts** listed in the **Network access** policy. Make sure to apply group policies to all computers **except domain controllers**.
2128

2229
> [!IMPORTANT]
23-
> Perform this procedure in [*audit mode*](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls#audit-only-mode) first, verifying the compatibility of the proposed configuration before making the changes to your production environment.
30+
> Perform this procedure in the [*audit mode*](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls#audit-only-mode) first, by verifying the compatibility of the proposed configuration before making the changes to your production environment.
2431
>
2532
> Testing in audit mode is critical in ensuring that your environment remains secure, and any changes will not impact your application compatibility. You may observe increased SAM-R traffic, generated by the Defender for Identity sensors.
2633
>
@@ -31,9 +38,9 @@ To ensure that Windows clients and servers allow your Defender for Identity Dire
3138

3239
:::image type="content" source="../media/samr-policy-location.png" alt-text="Screenshot of the Network access policy selected." lightbox="../media/samr-policy-location.png":::
3340

34-
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode
41+
1. Add the DSA to the list of approved accounts able to perform this action, together with any other account that you've discovered during audit mode.
3542

36-
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
43+
For more information, see [Network access: Restrict clients allowed to make remote calls to SAM](/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls).
3744

3845
## Make sure the DSA is allowed to access computers from the network (optional)
3946

@@ -48,10 +55,10 @@ For more information, see [Network access: Restrict clients allowed to make remo
4855

4956
1. Add the Defender for Identity Directory Service account to the list of approved accounts.
5057

51-
> [!IMPORTANT]
52-
> When configuring user rights assignments in group policies, it's important to note that the setting *replaces* the previous one rather than adding to it. Therefore, make sure to include *all* the desired accounts in the effective group policy. By default, workstations and servers include the following accounts: Administrators, Backup Operators, Users, and Everyone
53-
>
54-
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
58+
> [!IMPORTANT]
59+
> When configuring user rights assignments in group policies, it's important to note that the setting *replaces* the previous one rather than adding to it. Therefore, make sure to include *all* the desired accounts in the effective group policy. By default, workstations and servers include the following accounts: Administrators, Backup Operators, Users, and Everyone.
60+
>
61+
> The [Microsoft Security Compliance Toolkit](https://www.microsoft.com/download/details.aspx?id=55319) recommends replacing the default *Everyone* with *Authenticated Users* to prevent anonymous connections from performing network sign-ins. Review your local policy settings before managing the [Access this computer from the network](/windows/security/threat-protection/security-policy-settings/access-this-computer-from-the-network) setting from a GPO, and consider including *Authenticated Users* in the GPO if needed.
5562
5663
## Configure a Device profile for Microsoft Entra hybrid joined devices only
5764

@@ -86,7 +93,7 @@ This procedure describes how to use the [Microsoft Intune admin center](https://
8693

8794
1. Continue the wizard to select the **scope tags** and **assignments**, and select **Create** to create your profile.
8895

89-
For more information, see [Apply features and settings on your devices using device profiles in Microsoft Intune](/mem/intune/configuration/device-profiles).
96+
For more information, see [Apply features and settings on your devices using device profiles in Microsoft Intune](/mem/intune/configuration/device-profiles).
9097

9198
## Next step
9299

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -255,6 +255,8 @@
255255
items:
256256
- name: Deploy Defender for Endpoint on Linux
257257
items:
258+
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
259+
href: mde-linux-arm.md
258260
- name: Puppet based deployment
259261
href: linux-install-with-puppet.md
260262
- name: Ansible based deployment

0 commit comments

Comments
 (0)