Skip to content

Commit e712e02

Browse files
authored
Merge branch 'main' into diannegali-updatesecbaselines
2 parents bea19bb + 0363dca commit e712e02

File tree

76 files changed

+3091
-5150
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+3091
-5150
lines changed

ATPDocs/health-alerts.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Microsoft Defender for Identity health issues
33
description: This article describes all the health issues that can occur for each component, listing the cause and the steps needed to resolve the problem
4-
ms.date: 07/09/2024
4+
ms.date: 01/16/2025
55
ms.topic: how-to
66
---
77

@@ -191,6 +191,12 @@ Sensor-specific health issues are displayed in the **Sensor health issues** tab
191191
|----|----|----|----|----|
192192
|Radius accounting (VPN integration) data ingestion failures.|The listed Defender for Identity sensors have radius accounting (VPN integration) data ingestion failures.|Validate that the shared secret in the Defender for Identity configuration settings matches your VPN server, according to the guidance described [Configure VPN in Defender for Identity](vpn-integration.md#configure-vpn-in-defender-for-identity) section, in the [Defender for Identity VPN integration](vpn-integration.md) page.|Low|Health issues page|
193193

194+
### Auditing for AD CS servers is not enabled as required
195+
196+
|Alert|Description|Resolution|Severity|Displayed in|
197+
|----|----|----|----|----|
198+
|Auditing for AD CS servers is not enabled as required. (This configuration is validated once a day, per sensor).|The Advanced Auditing Policy Configuration or AD CS auditing is not enabled as required.|Enable the Advanced Auditing Policy Configuration and AD CS auditing according to the guidance as described in the [Configure auditing on AD CS](configure-windows-event-collection.md#configure-auditing-on-ad-cs) section, in the [Configure Windows Event collection](configure-windows-event-collection.md) page.|Medium|Sensors health issues tab|
199+
194200
### Sensor failed to retrieve Microsoft Entra Connect service configuration
195201

196202
| Alert| Description |Resolution|Severity|Displayed in|

CloudAppSecurityDocs/behaviors.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -26,22 +26,22 @@ While behaviors might be related to security scenarios, they're not necessarily
2626

2727
Behaviors currently support low-fidelity, Defender for Cloud Apps detections, that may not meet the standard for alerts but are still useful in providing context during an investigation. Currently supported detections include:
2828

29-
|Alert name |Policy name |
30-
|---------|---------|
31-
|**Activity from infrequent country** |Activity from infrequent country/region  |
32-
|**Impossible travel activity** |Impossible travel |
33-
|**Mass delete** |Unusual file deletion activity (by user) |
34-
|**Mass download** |Unusual file download (by user) |
35-
|**Mass share** |Unusual file share activity (by user) |
36-
|**Multiple delete VM activities** |Multiple delete VM activities |
37-
|**Multiple failed login attempts** |Multiple failed sign-in attempts |
38-
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |
39-
|**Multiple VM creation activities** |Multiple VM creation activities |
40-
|**Suspicious administrative activity** |Unusual administrative activity (by user) |
41-
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |
42-
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |
43-
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |
44-
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |
29+
|Alert name |Policy name |ActionType (Hunting)|
30+
|---------|---------|---------|
31+
|**Activity from infrequent country** |Activity from infrequent country/region  |ActivityFromInfrequentCountry|
32+
|**Impossible travel activity** |Impossible travel |ImpossibleTravelActivity|
33+
|**Mass delete** |Unusual file deletion activity (by user) |MassDelete|
34+
|**Mass download** |Unusual file download (by user) |MassDownload|
35+
|**Mass share** |Unusual file share activity (by user) |MassShare|
36+
|**Multiple delete VM activities** |Multiple delete VM activities |MultipleDeleteVmActivities|
37+
|**Multiple failed login attempts** |Multiple failed sign-in attempts |MultipleFailedLoginAttempts|
38+
|**Multiple Power BI report sharing activities** |Multiple Power BI report sharing activities |MultiplePowerBiReportSharingActivities|
39+
|**Multiple VM creation activities** |Multiple VM creation activities |MultipleVmCreationActivities|
40+
|**Suspicious administrative activity** |Unusual administrative activity (by user) |SuspiciousAdministrativeActivity|
41+
|**Suspicious impersonated activity** |Unusual impersonated activity (by user) |SuspiciousImpersonatedActivity|
42+
|**Suspicious OAuth app file download activities** |Suspicious OAuth app file download activities |SuspiciousOauthAppFileDownloadActivities|
43+
|**Suspicious Power BI report sharing** |Suspicious Power BI report sharing  |SuspiciousPowerBiReportSharing|
44+
|**Unusual addition of credentials to an OAuth app** |Unusual addition of credentials to an OAuth app |UnusualAdditionOfCredentialsToAnOauthApp|
4545

4646

4747
## Defender for Cloud Apps' transition from alerts to behaviors

CloudAppSecurityDocs/discovery-docker-ubuntu-azure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ This procedure describes how to deploy your machine with Ubuntu. The deployment
105105

106106
1. Change to root privileges using `sudo -i`.
107107

108-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
109109

110110
#### [CentOS](#tab/centos)
111111

CloudAppSecurityDocs/discovery-docker-ubuntu.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The following steps describe the deployment in Ubuntu. The deployment steps for
105105
export https_proxy='<IP>:<PORT>'
106106
```
107107

108-
1. If you accept the [software license terms](https://go.microsoft.com/fwlink/?linkid=862492), uninstall old versions and install Docker CE by running the commands appropriate for your environment:
108+
1. If you accept the software license terms, uninstall old versions and install Docker CE by running the commands appropriate for your environment:
109109

110110
### [CentOS](#tab/centos)
111111

CloudAppSecurityDocs/siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ Integrating with your SIEM is accomplished in three steps:
8484
8585
### Step 2: Download the JAR file and run it on your server
8686

87-
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the [software license terms](https://go.microsoft.com/fwlink/?linkid=862491), download the .zip file and unzip it.
87+
1. In the [Microsoft Download Center](https://go.microsoft.com/fwlink/?linkid=838596), after accepting the software license terms, download the .zip file and unzip it.
8888

8989
1. Run the extracted file on your server:
9090

defender-endpoint/TOC.yml

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -926,25 +926,21 @@
926926

927927
- name: Troubleshooting Microsoft Defender Antivirus
928928
items:
929-
- name: Troubleshoot Microsoft Defender Antivirus performance issues
930-
items:
929+
- name: Troubleshoot performance issues related to real-time protection
930+
href: troubleshoot-performance-issues.md
931+
items:
931932
- name: Performance analyzer for Microsoft Defender Antivirus
932933
href: tune-performance-defender-antivirus.md
933934
- name: Performance analyzer reference
934935
href: performance-analyzer-reference.md
935-
displayName: high cpu msmpeng.exe antimalware engine microsoft defender
936-
antivirus windows defender antivirus
937-
- name: Troubleshoot performance issues related to real-time protection
938-
href: troubleshoot-performance-issues.md
939-
- name: Troubleshoot Microsoft Defender Antivirus performance issues with WPRUI
940-
href: troubleshoot-av-performance-issues-with-wprui.md
941-
displayName: Troubleshoot antivirus performance issues with WPRUI windows
942-
performance recorder UI WPR windows performance recorder
943936
- name: Troubleshoot Microsoft Defender Antivirus performance issues with Process
944937
Monitor
945938
href: troubleshoot-av-performance-issues-with-procmon.md
946-
displayName: Troubleshoot Microsoft Defender Antivirus MDAV performance perf
947-
issues with Process Monitor ProcMon
939+
- name: Troubleshoot Microsoft Defender Antivirus performance issues with WPRUI
940+
href: troubleshoot-av-performance-issues-with-wprui.md
941+
- name: Troubleshoot Microsoft Defender Antivirus performance issues
942+
items:
943+
948944
- name: Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus
949945
href: troubleshoot-microsoft-defender-antivirus.yml
950946
- name: Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution

defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: ewalsh
88
ms.custom: nextgen
99
ms.reviewer: ksarens
1010
manager: deniseb
11-
ms.date: 06/06/2023
11+
ms.date: 01/16/2025
1212
ms.subservice: ngp
1313
ms.topic: how-to
1414
ms.collection:
@@ -32,7 +32,7 @@ search.appverid: met150
3232
You can perform various functions in Microsoft Defender Antivirus using the dedicated command-line tool **mpcmdrun.exe**. This utility is useful when you want to automate Microsoft Defender Antivirus tasks. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. Run it from a command prompt.
3333

3434
> [!TIP]
35-
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the Start menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
35+
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the **Start** menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
3636
3737
The MpCmdRun utility uses the following syntax:
3838

@@ -52,38 +52,45 @@ In our example, the MpCmdRun utility starts a full antivirus scan on the device.
5252

5353
|Command|Description|
5454
|---|---|
55-
|`-?` **or** `-h`|Displays all available options for the MpCmdRun tool|
55+
|`-?` **or** `-h`|Displays all available options for the MpCmdRun tool.|
5656
|`-Scan [-ScanType [<value>]] [-File <path> [-DisableRemediation] [-BootSectorScan] [-CpuThrottling]] [-Timeout <days>] [-Cancel]`|Scans for malicious software. Values for **ScanType** are:<p>**0** Default, according to your configuration<p>**1** Quick scan<p>**2** Full scan<p>**3** File and directory custom scan.<p>CpuThrottling runs according to policy configurations.|
57-
|`-Trace [-Grouping #] [-Level #]`|Starts diagnostic tracing|
57+
|`-Trace [-Grouping #] [-Level #]`|Starts diagnostic tracing.|
5858
|`-CaptureNetworkTrace -Path <path>`|Captures all the network input into the Network Protection service and saves it to a file at `<path>`. <br/>Supply an empty path to stop tracing.|
5959
|`-GetFiles [-SupportLogLocation <path>]`|Collects support information. See [collecting diagnostic data](collect-diagnostic-data.md).|
6060
|`-GetFilesDiagTrack`|Same as `-GetFiles`, but outputs to temporary DiagTrack folder.|
6161
|`-RemoveDefinitions [-All]`|Restores the installed security intelligence to a previous backup copy or to the original default set.|
6262
|`-RemoveDefinitions [-DynamicSignatures]`|Removes only the dynamically downloaded security intelligence.|
6363
|`-RemoveDefinitions [-Engine]`|Restores the previous installed engine.|
64-
|`-SignatureUpdate [-UNC \|-MMPC]`|Checks for new security intelligence updates.|
65-
|`-Restore [-ListAll \|[[-Name <name>] [-All] \|[-FilePath <filePath>]] [-Path <path>]]`|Restores or lists quarantined item(s).|
64+
|`-SignatureUpdate [-UNC |-MMPC]`|Checks for new security intelligence updates.|
65+
|`-Restore [-ListAll |[[-Name <name>] [-All] |[-FilePath <filePath>]] [-Path <path>]]`|Restores or lists quarantined items.|
6666
|`-AddDynamicSignature [-Path]`|Loads dynamic security intelligence.|
6767
|`-ListAllDynamicSignatures`|Lists the loaded dynamic security intelligence.|
6868
|`-RemoveDynamicSignature [-SignatureSetID]`|Removes dynamic security intelligence.|
6969
|`-CheckExclusion -path <path>`|Checks whether a path is excluded.|
70+
|`-TDT [-on|-off|-default]`|Disable or Enable TDT feature or sets it to default. If no option is specified, it retrieves the current status.|
71+
|`-OSCA`|Prints OS Copy Acceleration feature status.|
72+
|`-DeviceControl -TestPolicyXml <FilePath> [-Rules | -Groups]`|Validate xml policy groups and rules.|
73+
|`-TrustCheck -File <FilePath>`|Checks trust status of a file.|
7074
|`-ValidateMapsConnection`|Verifies that your network can communicate with the Microsoft Defender Antivirus cloud service. This command will only work on Windows 10, version 1703 or higher.|
75+
|`-ListCustomASR`|List the custom Azure Site Recovery rules present on this device.|
76+
|`-DisplayECSConnection`|Displays URLs that Defender Core service uses to establish connection to ECS.|
77+
|`-HeapSnapshotConfig <-Enable|-Disable> [-Pid <ProcessID>]`|Enable or Disable heap snapshot (tracing) configuration for process. Replace `<ProcessID>` with the actual process ID.|
7178
|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
7279
|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
7380

7481
> [!NOTE]
75-
> For the "Scan" command, the following are the default timeout values for Quick or Full scans where the scan will stop at that time by default.
76-
> - Portal initiated scans (Quick or Full) or Windows Security app (Quick or Full): No time limit
77-
> - Scheduled Full Scans or MpCmdRun -scan: 7 day limit
78-
> - Scheduled Quick Scans or MpCmdRun -scan: 1 day limit
82+
> For the `Scan` command, the following are the default time out values for Quick or Full scans where the scan will stop at that time by default.
83+
> - Scheduled Full Scans or MpCmdRun -scan: Seven day limit
84+
> - Scheduled Quick Scans or MpCmdRun -scan: One day limit
85+
7986

8087
## Common errors in running commands via mpcmdrun.exe
8188

8289
The following table lists common errors that can occur while using the MpCmdRun tool.
8390

8491
|Error message|Possible reason|
8592
|---|---|
86-
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> Note that in Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
93+
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> In Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
8794
|**0x80070667**|You're running the `-ValidateMapsConnection` command from a computer that is Windows 10 version 1607 or older, or Windows Server 2016 or older. Run the command from a machine that is Windows 10 version 1703 or newer, or Windows Server 2019 or newer.|
8895
|**MpCmdRun is not recognized as an internal or external command, operable program, or batch file.**|The tool must be run from either `%ProgramFiles%\Windows Defender` or `C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2012.4-0` (where `2012.4-0` might differ since platform updates are monthly except for March)|
8996
|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80070005 httpcode=450)**|The command was attempted using insufficient privileges. Use the command prompt (cmd.exe) as an administrator.|
@@ -98,7 +105,7 @@ The following table lists common errors that can occur while using the MpCmdRun
98105
- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
99106
- [Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md)
100107
- [Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)
101-
- [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
108+
- [Reference articles for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
102109
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
103110
- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
104111
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)

0 commit comments

Comments
 (0)