You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/evaluate-mda-using-mde-security-settings-management.md
+24-24Lines changed: 24 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,28 +142,28 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
142
142
1. On the **Configuration settings** page, expand the groups of settings and configure those settings you want to manage with this profile.
143
143
1. Set the policies based on the following recommended settings:
144
144
145
-
|Description |Setting |
146
-
|---------|---------|
147
-
|Block executable content from email client and webmail | Block |
148
-
|Block Adobe Reader from creating child processes | Block |
149
-
|Block execution of potentially obfuscated scripts | Block |
150
-
|Block abuse of exploited vulnerable signed drivers (Device) | Block |
151
-
|Block Win32 API calls from Office macros | Block |
152
-
|Block executable files from running unless they meet a prevalence, age, or trusted list criterion | Block |
153
-
|Block Office communication application from creating child processes | Block |
154
-
|Block all Office applications from creating child processes | Block |
155
-
|[PREVIEW] Block use of copied or impersonated system tools | Block |
156
-
|Block JavaScript or VBScript from launching downloaded executable content | Block |
157
-
|Block credential stealing from the Windows local security authority subsystem | Block |
158
-
|Block Webshell creation for Servers | Block |
159
-
|Block Office applications from creating executable content | Block |
160
-
|Block untrusted and unsigned processes that run from USB | Block |
161
-
|Block Office applications from injecting code into other processes | Block |
162
-
|Block persistence through WMI event subscription | Block |
163
-
|Use advanced protection against ransomware | Block |
164
-
|Block process creations originating from PSExec and WMI commands | Block<br>NOTE:If you have Configuration Manager (formerly SCCM), or other management tools, that use WMI, you might need to set this to **Audit** instead of **Block**. |
165
-
|[PREVIEW] Block rebooting machine in Safe Mode | Block |
166
-
|Enable Controlled Folder Access | Enabled |
145
+
|Description |Setting |
146
+
|---------|---------|
147
+
|Block executable content from email client and webmail | Block |
148
+
|Block Adobe Reader from creating child processes | Block |
149
+
|Block execution of potentially obfuscated scripts | Block |
150
+
|Block abuse of exploited vulnerable signed drivers (Device) | Block |
151
+
|Block Win32 API calls from Office macros | Block |
152
+
|Block executable files from running unless they meet a prevalence, age, or trusted list criterion | Block |
153
+
|Block Office communication application from creating child processes | Block |
154
+
|Block all Office applications from creating child processes | Block |
155
+
|[PREVIEW] Block use of copied or impersonated system tools | Block |
156
+
|Block JavaScript or VBScript from launching downloaded executable content | Block |
157
+
|Block credential stealing from the Windows local security authority subsystem | Block |
158
+
|Block Webshell creation for Servers | Block |
159
+
|Block Office applications from creating executable content | Block |
160
+
|Block untrusted and unsigned processes that run from USB | Block |
161
+
|Block Office applications from injecting code into other processes | Block |
162
+
|Block persistence through WMI event subscription | Block |
163
+
|Use advanced protection against ransomware | Block |
164
+
|Block process creations originating from PSExec and WMI commands | Block<br>NOTE:If you have Configuration Manager (formerly SCCM), or other management tools, that use WMI, you might need to set this to **Audit** instead of **Block**. |
165
+
|[PREVIEW] Block rebooting machine in Safe Mode | Block |
166
+
|Enable Controlled Folder Access | Enabled |
167
167
168
168
> [!TIP]
169
169
> Any of the rules may block behavior you find acceptable in your organization. In these cases, add the per-rule exclusions named “Attack Surface Reduction Only Exclusions”. And, change the rule from **Enabled** to **Audit** to prevent unwanted blocks.
@@ -175,9 +175,9 @@ To enable Attack Surface Reduction (ASR) rules using the endpoint security polic
175
175
176
176
#### Check the platform update version
177
177
178
-
The latest Platform Update” version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
178
+
The latest "Platform Update" version Production channel (GA) is available in [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623+update).
179
179
180
-
To check which "Platform Update” version you have installed, run the following command in PowerShell using the privileges of an administrator:
180
+
To check which "Platform Update" version you have installed, run the following command in PowerShell using the privileges of an administrator:
Copy file name to clipboardExpand all lines: defender-endpoint/mac-install-with-intune.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -403,7 +403,7 @@ After completing the profile configuration, you'll be able to review the status
403
403
404
404
Once the Intune changes are propagated to the enrolled devices, you can see them listed under **Monitor**\>**Device status**:
405
405
406
-
:::image type="content" source="../defender-endpoint/media/mdatp-7-devicestatusblade.png" alt-text="Screenshot that shows the view of the device status" lightbox="../defender-endpoint/media/mdatp-7-devicestatusblade.png":::
406
+
:::image type="content" source="../defender-endpoint/media/mdatp-7-devicestatusblade.png" alt-text="Screenshot that shows the view of the device status." lightbox="../defender-endpoint/media/mdatp-7-devicestatusblade.png":::
407
407
408
408
#### Client device setup
409
409
@@ -431,11 +431,11 @@ A standard [Company Portal installation](/intune-user-help/enroll-your-device-in
431
431
432
432
:::image type="content" source="../defender-endpoint/media/mdatp-13-systempreferences.png" alt-text="Screenshot that shows the System preferences page." lightbox="../defender-endpoint/media/mdatp-13-systempreferences.png":::
433
433
434
-
:::image type="content" source="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png" alt-text="Screenshot that shows the System Preferences Profiles page" lightbox="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png":::
434
+
:::image type="content" source="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png" alt-text="Screenshot that shows the System Preferences Profiles page." lightbox="../defender-endpoint/media/mdatp-14-systempreferencesprofiles.png":::
435
435
436
436
2. Verify that the following configuration profiles are present and installed. The **Management Profile** should be the Intune system profile. _Wdav-config_ and _wdav-kext_ are system configuration profiles that were added in Intune:
437
437
438
-
:::image type="content" source="../defender-endpoint/media/mdatp-15-managementprofileconfig.png" alt-text="Screenshot that shows the Profiles page" lightbox="../defender-endpoint/media/mdatp-15-managementprofileconfig.png":::
438
+
:::image type="content" source="../defender-endpoint/media/mdatp-15-managementprofileconfig.png" alt-text="Screenshot that shows the Profiles page." lightbox="../defender-endpoint/media/mdatp-15-managementprofileconfig.png":::
439
439
440
440
3. You should also see the Microsoft Defender for Endpoint icon in the top-right corner.
0 commit comments