Skip to content

Commit e458c15

Browse files
authored
Merge pull request #2388 from MicrosoftDocs/main
1/9/2025 AM Publish
2 parents 2c68dca + 0593ef7 commit e458c15

24 files changed

+333
-115
lines changed

.openpublishing.redirection.defender-xdr.json

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,16 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "defender-xdr/microsoft-365-security-center-defender-cloud-apps.md",
5+
"redirect_url": "/defender-cloud-apps/microsoft-365-security-center-defender-cloud-apps",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "defender-xdr/microsoft-365-security-center-mdi.md",
10+
"redirect_url": "/defender-for-identity/microsoft-365-security-center-mdi",
11+
"redirect_document_id": false
12+
},
13+
314
{
415
"source_path": "defender-xdr/eval-create-eval-environment.md",
516
"redirect_url": "/defender-xdr/pilot-deploy-overview",

defender-xdr/microsoft-365-security-center-mdi.md renamed to ATPDocs/microsoft-365-security-center-mdi.md

Lines changed: 23 additions & 25 deletions
Large diffs are not rendered by default.

ATPDocs/toc.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,16 +11,18 @@ items:
1111
href: zero-trust.md
1212
- name: System architecture
1313
href: architecture.md
14-
- name: Defender for Identity in Microsoft Defender XDR
15-
href: /microsoft-365/security/defender/microsoft-365-security-center-mdi?bc=/defender-for-identity/bread/toc.json&toc=/defender-for-identity/TOC.json
14+
- name: Defender for Identity in the Microsoft Defender portal
15+
href: microsoft-365-security-center-mdi.md
1616
- name: Defender for Identity for US Government
1717
href: us-govt-gcc-high.md
1818
- name: Deploy
1919
expanded: true
2020
items:
2121
- name: Quick installation guide
2222
href: deploy/quick-installation-guide.md
23-
- name: Deployment overview
23+
- name: Pilot and deploy Microsoft Defender XDR
24+
href: /defender-xdr/pilot-deploy-overview?toc=/defender-for-identity/toc.json&bc=/defender-for-identity/breadcrumb/toc.json
25+
- name: Defender for Identity deployment overview
2426
href: deploy/deploy-defender-identity.md
2527
- name: Plan and prepare
2628
items:
File renamed without changes.
File renamed without changes.

defender-xdr/microsoft-365-security-center-defender-cloud-apps.md renamed to CloudAppSecurityDocs/microsoft-365-security-center-defender-cloud-apps.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -26,26 +26,26 @@ ms.custom: admindeeplinkDEFENDER
2626

2727
**Applies to:**
2828

29-
- [Microsoft Defender XDR](microsoft-365-defender.md)
29+
- [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)
3030
- [Microsoft Defender for Cloud Apps](/defender-cloud-apps/)
3131

3232
Microsoft Defender for Cloud Apps is available inside the Microsoft Defender portal. The Defender portal is the home for monitoring and managing security across your Microsoft identities, data, devices, apps, and infrastructure, allowing security admins to perform their security tasks in one location, across multiple Microsoft Defender services.
3333

3434
SOC analysts can triage, investigate, and hunt across all Microsoft Defender XDR workloads, including cloud apps.
3535

36-
Take a look in Microsoft Defender XDR at <https://security.microsoft.com>.
36+
Take a look in the Microsoft Defender portal at <https://security.microsoft.com>.
3737

38-
Learn more about the benefits: [Overview of Microsoft Defender XDR](microsoft-365-defender.md).
38+
Learn more about the benefits: [Overview of Microsoft Defender XDR](/defender-xdr/microsoft-365-defender).
3939

4040
## Perform cloud app security tasks
4141

4242
Find Defender for Cloud Apps functionality in the Microsoft Defender portal under **Cloud Apps**. For example:
4343

44-
:::image type="content" source="media/defender-for-cloud-apps/cloud-apps.png" alt-text="Screenshot that shows the Defender for Cloud Apps Cloud discovery page." lightbox="media/defender-for-cloud-apps/cloud-apps.png":::
44+
:::image type="content" source="media/microsoft-365-security-center-defender-cloud-apps/cloud-apps.png" alt-text="Screenshot that shows the Defender for Cloud Apps Cloud discovery page." lightbox="media/microsoft-365-security-center-defender-cloud-apps/cloud-apps.png":::
4545

4646
## Investigate cloud app alerts
4747

48-
Defender for Cloud Apps alerts show in the Defender portal's incident and alerts queues, with relevant content inside alert pages for each type of an alert. For more information, see [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md).
48+
Defender for Cloud Apps alerts show in the Defender portal's incident and alerts queues, with relevant content inside alert pages for each type of an alert. For more information, see [Investigate incidents in Microsoft Defender XDR](/defender-xdr/investigate-incidents).
4949

5050
## Global search for your connected cloud apps
5151

@@ -57,7 +57,7 @@ Use the Microsoft Defender portal's global search bar at the top of the page to
5757

5858
Use the **Assets > Identities** page to find comprehensive details about entities pulled from connected cloud applications, including a users's activity history and security alerts related to the user. For example:
5959

60-
:::image type="content" source="media/defender-for-cloud-apps/dashboard-top-users.png" alt-text="Screenshot that shows cloud app entities in the Identities page." lightbox="media/defender-for-cloud-apps/dashboard-top-users.png":::
60+
:::image type="content" source="media/microsoft-365-security-center-defender-cloud-apps/dashboard-top-users.png" alt-text="Screenshot that shows cloud app entities in the Identities page." lightbox="media/microsoft-365-security-center-defender-cloud-apps/dashboard-top-users.png":::
6161

6262
<a name='redirection-from-the-classic-microsoft-defender-for-cloud-apps-portal-to-microsoft-365-defender'></a>
6363

@@ -76,9 +76,9 @@ Learn how to protect your cloud apps in Microsoft Defender XDR:
7676
> [!VIDEO https://learn.microsoft.com/_themes/docs.theme/master/en-us/_themes/global/video-embed.html?id=2105e5c9-23bf-41fb-a61d-0f0fae8ef05f title="Defender for Cloud Apps in Microsoft Defender XDR for customers migrating from the classic portal"]
7777
7878

79-
## Related information
79+
## Related content
8080

81-
- [Microsoft Defender XDR](microsoft-365-defender.md)
82-
- [Investigate incidents in Microsoft Defender XDR](investigate-incidents.md)
81+
- [Microsoft Defender XDR](/defender-xdr/microsoft-365-defender)
82+
- [Investigate incidents in Microsoft Defender XDR](/defender-xdr/investigate-incidents)
8383
- [Contact support](/defender-cloud-apps/support-and-ts)
8484
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/defender-m3d-techcommunity.md)]

CloudAppSecurityDocs/toc.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,8 @@ items:
77
href: what-is-defender-for-cloud-apps.md
88
- name: What's new in Defender for Cloud Apps
99
href: release-notes.md
10+
- name: Defender for Cloud Apps in the Microsoft Defender portal
11+
href: microsoft-365-security-center-defender-cloud-apps.md
1012
- name: Privacy with Defender for Cloud Apps
1113
href: cas-compliance-trust.md
1214
- name: Preview features
@@ -31,6 +33,8 @@ items:
3133
href: best-practices.md
3234
- name: Deploy Defender for Cloud Apps
3335
items:
36+
- name: Pilot and deploy Microsoft Defender XDR
37+
href: /defender-xdr/pilot-deploy-overview?toc=/cloud-app-security/toc.json&bc=/cloud-app-security/breadcrumb/toc.json
3438
- name: Network requirements
3539
href: network-requirements.md
3640
- name: Getting started

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -511,6 +511,8 @@
511511
href: troubleshoot-collect-support-log.md
512512
- name: Troubleshoot Microsoft Defender Antivirus settings
513513
href: troubleshoot-settings.md
514+
- name: Troubleshoot Microsoft Defender Antivirus service startup problems
515+
href: troubleshoot-service-startup-problems.md
514516
- name: Troubleshooting Security Intelligence Updates from Microsoft Update source
515517
href: security-intelligence-update-tshoot.md
516518
displayName: Troubleshooting Security Intelligence Updates from Microsoft Update source

defender-endpoint/attack-surface-reduction-rules-deployment-test.md

Lines changed: 49 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -39,15 +39,17 @@ In this section of the attack surface reduction rules deployment guide, you'll l
3939
- use Event Viewer for attack surface reduction rules events
4040

4141
> [!NOTE]
42-
> Before you begin testing attack surface reduction rules, it is recommended that you first disable all rules that you have previously set to either **audit** or **enable** (if applicable). See [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md) for information about using the attack surface reduction rules report to disable attack surface reduction rules.
42+
> Before you begin testing attack surface reduction rules, it's recommended that you first disable all rules that you have previously set to either **audit** or **enable** (if applicable). See [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md) for information about using the attack surface reduction rules report disabling attack surface reduction rules.
4343
4444
Begin your attack surface reduction rules deployment with ring 1.
4545

4646
> :::image type="content" source="media/asr-rules-testing-steps.png" alt-text="The Microsoft Defender for Endpoint attack surface reduction (ASR rules) test steps. Audit attack surface reduction rules, configure ASR rules exclusions. Configure ASR rules Intune. ASR rules exclusions. ASR rules event viewer." lightbox="media/asr-rules-testing-steps.png":::
4747
4848
## Step 1: Test attack surface reduction rules using Audit
4949

50-
Begin the testing phase by turning on the attack surface reduction rules with the rules set to Audit, starting with your champion users or devices in ring 1. Typically, the recommendation is that you enable all the rules (in Audit) so that you can determine which rules are triggered during the testing phase. Rules that are set to Audit don't generally impact functionality of the entity or entities to which the rule is applied but do generate logged events for the evaluation; there is no effect on end users.
50+
Begin the testing phase by turning on the attack surface reduction rules with the rules set to Audit, starting with your champion users or devices in ring 1. Typically, the recommendation is that you enable all the rules (in Audit) so that you can determine which rules are triggered during the testing phase.
51+
52+
Rules that are set to Audit don't generally impact functionality of the entity or entities to which the rule is applied but do generate logged events for the evaluation; there's no effect on end users.
5153

5254
### Configure attack surface reduction rules using Intune
5355

@@ -77,14 +79,14 @@ You can use Microsoft Intune Endpoint Security to configure custom attack surfac
7779
> [!NOTE]
7880
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
7981
80-
10. Review your settings in the **Review + create** pane. Click **Create** to apply the rules.
82+
10. Review your settings in the **Review + create** pane. Select **Create** to apply the rules.
8183

8284
> [!div class="mx-imgBorder"]
8385
> :::image type="content" source="media/asr-mem-review-create.png" alt-text="The Create profile page" lightbox="media/asr-mem-review-create.png":::
8486
8587
Your new attack surface reduction policy for attack surface reduction rules is listed in **Endpoint security | Attack surface reduction**.
8688

87-
> [!div class="mx-imgBorder"]
89+
> [!div class="mx-imgBorder"]
8890
> :::image type="content" source="media/asr-mem-my-asr-rules.png" alt-text=" The Attack surface reduction page" lightbox="media/asr-mem-my-asr-rules.png":::
8991
9092
<a name='step-2-understand-the-asr-rules-reporting-page-in-the-microsoft-365-defender-portal'></a>
@@ -131,23 +133,23 @@ The **GroupBy** returns results set to the following groups:
131133
> [!NOTE]
132134
> When filtering by rule, the number of individual _detected_ items listed in the lower half of the report is currently limited to 200 rules. You can use **Export** to save the full list of detections to Excel.
133135
134-
:::image type="content" source="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png" alt-text="Screenshot that shows the ASR rules report search feature on the configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png":::
136+
:::image type="content" source="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png" alt-text="Screenshot that shows the Azure Site Recovery rules report search feature on the configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-tabs-search-configuration-tab.png":::
135137

136138
**Filter** opens the **Filter on rules** page, which enables you to scope the results to only the selected attack surface reduction rules:
137139

138140
> [!div class="mx-imgBorder"]
139141
> :::image type="content" source="media/asr-defender365-filter.png" alt-text="The Attack surface reduction rules detections filter on rules" lightbox="media/asr-defender365-filter.png":::
140142
141143
> [!NOTE]
142-
> If you have a Microsoft Microsoft 365 Security E5 or A5, Windows E5 or A5 license, the following link opens the Microsoft Defender 365 Reports > [Attack surface reductions](https://security.microsoft.com/asr?viewid=detections) > Detections tab.
144+
> If you have a Microsoft 365 Security E5 or A5, Windows E5 or A5 license, the following link opens the Microsoft Defender 365 Reports > [Attack surface reductions](https://security.microsoft.com/asr?viewid=detections) > Detections tab.
143145
144146
### Configuration tab
145147

146148
Lists—on a per-computer basis—the aggregate state of attack surface reduction rules: Off, Audit, Block.
147149

148150
>:::image type="content" source="media/attack-surface-reduction-rules-report-main-configuration-tab.png" alt-text="Screenshot that shows the attack surface reduction rules report main configuration tab." lightbox="media/attack-surface-reduction-rules-report-main-configuration-tab.png":::
149151
150-
On the Configurations tab, you can check, on a per-device basis, which attack surface reduction rules are enabled, and in which mode, by selecting the device for which you want to review attack surface reduction rules.
152+
On the Configurations tab, you can see which attack surface reduction rules are enabled and their mode for each device by selecting the device you want to review.
151153

152154
>:::image type="content" source="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png" alt-text="Screenshot that shows the ASR rules fly-out to add ASR rules to devices." lightbox="media/attack-surface-reduction-rules-report-configuration-add-to-policy.png":::
153155
@@ -167,31 +169,30 @@ The Endpoint Security | Attack surface reduction pane opens:
167169
> :::image type="content" source="media/asr-defender365-05b-mem3.png" alt-text="The Endpoint security Attack surface reduction pane" lightbox="media/asr-defender365-05b-mem3.png":::
168170
169171
> [!NOTE]
170-
> If you have a Microsoft Defender 365 E5 (or Windows E5?) license, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Configurations](https://security.microsoft.com/asr?viewid=configuration) tab.
172+
> If you have a Microsoft Defender 365 E5 (or Windows E5?) License, this link opens the Microsoft Defender 365 Reports > Attack surface reductions > [Configurations](https://security.microsoft.com/asr?viewid=configuration) tab.
171173
172174
### Add exclusions
173175

174176
This tab provides a method to select detected entities (for example, false positives) for exclusion. When exclusions are added, the report provides a summary of the expected impact.
175177

176178
> [!NOTE]
177-
> Microsoft Defender Antivirus AV exclusions are honored by attack surface reduction rules. See [Configure and validate exclusions based on extension, name, or location](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
179+
> Attack surface reduction rules honor Microsoft Defender Antivirus (AV) exclusion. See [Configure and validate exclusions based on extension, name, or location](configure-extension-file-exclusions-microsoft-defender-antivirus.md).
178180
179181
> [!div class="mx-imgBorder"]
180182
> :::image type="content" source="media/asr-defender365-06d.png" alt-text="The pane for exclusion of the detected file" lightbox="media/asr-defender365-06d.png":::
181183
182184
> [!NOTE]
183-
> If you have a Microsoft Defender 365 E5 (or Windows E5?) license, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Exclusions](https://security.microsoft.com/asr?viewid=exclusions) tab.
185+
> If you have a Microsoft Defender 365 E5 (or Windows E5?) License, this link will open the Microsoft Defender 365 Reports > Attack surface reductions > [Exclusions](https://security.microsoft.com/asr?viewid=exclusions) tab.
184186
185187
For more information about using the attack surface reduction rules report, see [Attack surface reduction rules reports](attack-surface-reduction-rules-report.md).
186188

187189
## Configure attack surface reduction per-rule exclusions
188190

189191
Attack surface reduction rules now provide the capability to configure rule-specific exclusions, known as "Per Rule Exclusions."
190192

191-
> [!NOTE]
192-
> Per-rule exclusions cannot currently be configured by using PowerShell or Group Policy.
193+
To configure specific rule exclusions, you have the choices of using the MDE Security Settings Management, Intune, and Group Policy.
193194

194-
To configure specific rule exclusions:
195+
#### Via Intune:
195196

196197
1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), and navigate to **Home** > **Endpoint security** > **Attack surface reduction**.
197198

@@ -208,9 +209,40 @@ To configure specific rule exclusions:
208209
> [!TIP]
209210
> Use the checkboxes next to your list of exclusion entries to select items to **Delete**, **Sort**, **Import**, or **Export**.
210211
212+
### Via Group Policy
213+
214+
215+
216+
Use Group Policy to set the per-user ASR rule exclusions
217+
218+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
219+
220+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
221+
222+
1. In the **Group Policy Management Editor** go to **Computer configuration**.
223+
224+
1. Select **Administrative templates**.
225+
226+
1. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Microsoft Defender Exploit Guard > Attack Surface Reduction**.
227+
228+
1. Double-click **Apply a list of exclusions to specific attack surface reduction (ASR) rules**, and set the option to **Enabled**.
229+
230+
1. Then click on **Show...**
231+
232+
1. Under "**Value Name**", enter "GUID for the ASR Rule" without the double quotes
233+
234+
1. Under "**Value**", enter the <drive_letter:\Path\ProcessName>. In order to add multiple processes, it's separated by a greater than sign (>)
235+
236+
e.g., "C:\Notepad.exe>c:\regedit.exe>C:\SomeFolder\test.exe" without the double quotes
237+
238+
1. select **OK**. This setting allows the processes that are being blocked by the particular ASR Rule to continue running.
239+
240+
> [!NOTE]
241+
> "If policies aren't applying, review [Troubleshoot Microsoft Defender Antivirus settings](/defender-endpoint/troubleshoot-settings)
242+
211243
### Use PowerShell as an alternative method to enable attack surface reduction rules
212244

213-
You can use PowerShell - as an alternative to Intune - to enable attack surface reduction rules in audit mode to view a record of apps that would have been blocked if the feature was fully enabled. You can also get an idea of how often the rules fire during normal use.
245+
Use PowerShell, as an alternative to Intune, to enable attack surface reduction rules in audit mode. This allows you to view a record of apps that would have been blocked if the feature was fully enabled. You can also see how often the rules fire during normal use.
214246

215247
To enable an attack surface reduction rule in audit mode, use the following PowerShell cmdlet:
216248

@@ -227,7 +259,7 @@ To enable all the added attack surface reduction rules in audit mode, use the fo
227259
```
228260

229261
> [!TIP]
230-
> If you want to fully audit how attack surface reduction rules will work in your organization, you'll need to use a management tool to deploy this setting to devices in your network(s).
262+
> If you want to fully audit how attack surface reduction rules work in your organization, you'll need to use a management tool to deploy this setting to devices in your network.
231263
232264
You can also use Group Policy, Intune, or mobile device management (MDM) configuration service providers (CSPs) to configure and deploy the setting. Learn more in the main [Attack surface reduction rules](attack-surface-reduction.md) article.
233265

@@ -255,4 +287,6 @@ Event ID | Description
255287

256288
[Attack surface reduction rules reference](attack-surface-reduction-rules-reference.md)
257289

290+
[Troubleshoot attack surface reduction rules](/defender-endpoint/troubleshoot-asr)
291+
258292
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)