You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**Comments**|Available in Defender for Endpoint version `101.68.80` or later.||
664
664
665
+
#### Remediate Infected File feature
666
+
667
+
Determines whether infected processes that open or load any infected file will get remediated or not.
668
+
669
+
> [!NOTE]
670
+
> When enabled the processes that open or load any infected file will be remediated in RTP mode. These processes will not appear in the threat list as these are not malicious but are only being terminated because they were loading the threat file in memory.
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-portaloverview-abovefoldlink)
32
31
33
32
> [!NOTE]
34
-
> The [Network device discovery and vulnerability assessments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-device-discovery-and-vulnerability-assessments/ba-p/2267548)Blog \(published 04-13-2021\) provides insights into the new **Network device discovery** capabilities in Defender for Endpoint. This article provides an overview of the challenge that **Network device discovery** is designed to address, and detailed information about how get started using these new capabilities.
33
+
> The [Tech Community Blog: Network device discovery and vulnerability assessments](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/network-device-discovery-and-vulnerability-assessments/ba-p/2267548) (published 04-13-2021) provides insights into the new **Network device discovery** capabilities in Defender for Endpoint. This article provides an overview of the challenge that **Network device discovery** is designed to address, and detailed information about how to get started using these new capabilities.
35
34
36
35
Network discovery capabilities are available in the **Device inventory** section of the [Microsoft Defender portal](https://security.microsoft.com) and Microsoft Defender XDR consoles.
37
36
@@ -43,6 +42,9 @@ Once the network devices are discovered and classified, security administrators
43
42
44
43
Network devices aren't managed as standard endpoints since Defender for Endpoint doesn't have a sensor built into the network devices themselves. These types of devices require an agentless approach where a remote scan obtains the necessary information from the devices. Depending on the network topology and characteristics, a single device or a few devices onboarded to Microsoft Defender for Endpoint performs authenticated scans of network devices using SNMP (read-only).
45
44
45
+
> [!NOTE]
46
+
> Authenticated scans support `SNMPv2` and `SNMPv3`.
47
+
46
48
There are two types of devices to keep in mind:
47
49
48
50
-**Scanning device**: A device that's already onboarded that you use to scan the network devices.
@@ -85,9 +87,9 @@ Your first step is to select a device that performs the authenticated network sc
85
87
86
88
8. To allow the scanner to be authenticated and work properly, it's essential that you add the following domains/URLs:
87
89
88
-
-\*.security.microsoft.com
89
-
- login.microsoftonline.com
90
-
-\*.blob.core.windows.net/networkscannerstable/\*
90
+
-`*.security.microsoft.com`
91
+
-`login.microsoftonline.com`
92
+
-`*.blob.core.windows.net/networkscannerstable/*`
91
93
92
94
> [!NOTE]
93
95
> Not all URLs are specified in the Defender for Endpoint documented list of allowed data collection.
@@ -96,7 +98,7 @@ Your first step is to select a device that performs the authenticated network sc
96
98
97
99
To configure scan jobs, the following user permission option is required: **Manage security settings in Defender**. You can find the permission by going to **Settings**\>**Roles**. For more information, see [Create and manage roles for role-based access control](user-roles.md).
98
100
99
-
## Windows version pre-requisite for the scanner
101
+
## Windows version prerequisite for the scanner
100
102
101
103
The scanner is supported on Windows 10, version 1903 and Windows Server, version 1903 and later. For more information, see [Windows 10, version 1903 and Windows Server, version 1903](https://support.microsoft.com/topic/windows-10-update-history-e6058e7c-4116-38f1-b984-4fcacfba5e5d).
102
104
@@ -109,7 +111,7 @@ The scanner is supported on Windows 10, version 1903 and Windows Server, version
109
111
110
112
2. Download the scanner and install it on the designated Defender for Endpoint scanning device.
111
113
112
-
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan-new.png" alt-text="Screenshot of the add new authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan-new.png":::
114
+
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan-new.png" alt-text="Screenshot of the add new authenticated scan screen." lightbox="/defender/media/defender-endpoint/network-authenticated-scan-new.png":::
113
115
114
116
## Scanner installation & registration
115
117
@@ -122,8 +124,8 @@ To complete the scanner registration process:
122
124
123
125
1. Copy and follow the URL that appears on the command line and use the provided installation code to complete the registration process.
124
126
125
-
> [!NOTE]
126
-
> You may need to change Command Prompt settings to be able to copy the URL.
127
+
> [!NOTE]
128
+
> You may need to change Command Prompt settings to be able to copy the URL.
127
129
128
130
2. Enter the code and sign in using a Microsoft account that has the Defender for Endpoint permission called "Manage security settings in Defender."
129
131
@@ -141,7 +143,7 @@ If there's a difference between the two versions, the update process determines
141
143
142
144
2. Select **Add new scan** and choose **Network device authenticated scan** and select **Next**.
143
145
144
-
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen" lightbox="/defender/media/defender-endpoint/network-authenticated-scan.png":::
146
+
:::image type="content" source="/defender/media/defender-endpoint/network-authenticated-scan.png" alt-text="Screenshot of the add new network device authenticated scan screen." lightbox="/defender/media/defender-endpoint/network-authenticated-scan.png":::
145
147
146
148
3. Choose whether to **Activate scan**.
147
149
@@ -151,17 +153,17 @@ If there's a difference between the two versions, the update process determines
151
153
152
154
6. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file overrides any manually added addresses.
153
155
154
-
7. Select the **Scan interval:** By default, the scan runs every four hours, you can change the scan interval or have it only run once, by selecting **Don't repeat**.
156
+
7. Select the **Scan interval:** By default, the scan runs every four hours. You can change the scan interval or have it only run once, by selecting **Don't repeat**.
155
157
156
158
8. Choose your **Authentication method**.
157
159
158
160
You can select to **Use azure KeyVault for providing credentials:** If you manage your credentials in Azure KeyVault, you can enter the Azure KeyVault URL and Azure KeyVault secret name to be accessed by the scanning device to provide credentials. The secret value is dependent on the Authenticated Method you choose, as described in the following table:
@@ -172,38 +174,38 @@ If there's a difference between the two versions, the update process determines
172
174
173
175
### Scan and add network devices
174
176
175
-
During the set-up process, you can perform a one time test scan to verify that:
177
+
During the setup process, you can perform a one time test scan to verify that:
176
178
177
179
- There's connectivity between the Defender for Endpoint scanning device and the configured target network devices.
178
180
- The configured SNMP credentials are correct.
179
181
180
-
Each scanning device can support up to 1,500 successful IP addresses scan. For example, if you scan 10 different subnets where only 100 IP addresses return successful results, you'll be able to scan 1,400 IP additional addresses from other subnets on the same scanning device.
182
+
Each scanning device can support up to 1,500 successful IP addresses scan. For example, if you scan 10 different subnets where only 100 IP addresses return successful results, you can scan 1,400 IP more addresses from other subnets on the same scanning device.
181
183
182
184
If there are multiple IP address ranges/subnets to scan, the test scan results take several minutes to show up. A test scan is available for up to 1,024 addresses.
183
185
184
-
Once the results show up, you can choose which devices will be included in the periodic scan. If you skip viewing the scan results, all configured IP addresses are added to the network device authenticated scan (regardless of the device's response). The scan results can also be exported.
186
+
Once the results show up, you can choose which devices to include in the periodic scan. If you skip viewing the scan results, all configured IP addresses are added to the network device authenticated scan (regardless of the device's response). The scan results can also be exported.
185
187
186
188
## Device inventory
187
189
188
-
Newly discovered devices are shown under the new **Network devices** tab in the **Device inventory** page. It may take up to two hours after adding a scanning job until the devices are updated.
190
+
Newly discovered devices are shown under the new **Network devices** tab in the **Device inventory** page. It might take up to two hours after adding a scanning job until the devices are updated.
189
191
190
-
:::image type="content" source="/defender/media/defender-endpoint/network-devices-inventory.png" alt-text="Screenshot of the network device tab in the device inventory" lightbox="/defender/media/defender-endpoint/network-devices-inventory.png":::
192
+
:::image type="content" source="/defender/media/defender-endpoint/network-devices-inventory.png" alt-text="Screenshot of the network device tab in the device inventory." lightbox="/defender/media/defender-endpoint/network-devices-inventory.png":::
191
193
192
194
## Troubleshooting
193
195
194
-
### Scanner installation has failed
196
+
### Scanner installation failed
195
197
196
198
Verify that the required URLs are added to the allowed domains in your firewall settings. Also, make sure proxy settings are configured as described in [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
197
199
198
-
### The Microsoft.com/devicelogin web page did not show up
200
+
### The Microsoft.com/devicelogin web page didn't show up
199
201
200
202
Verify that the required URLs are added to the allowed domains in your firewall. Also, make sure proxy settings are configured as described in [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
201
203
202
-
### Network devices are not shown in the device inventory after several hours
204
+
### Network devices aren't shown in the device inventory after several hours
203
205
204
206
The scan results should be updated a few hours after the initial scan that took place after completing the network device authenticated scan configuration.
205
207
206
-
If devices are still not shown, verify that the service 'MdatpNetworkScanService' is running on your devices being scanned, on which you installed the scanner, and perform a "Run scan" in the relevant network device authenticated scan configuration.
208
+
If devices are still not shown, verify that the service `MdatpNetworkScanService` is running on your devices being scanned, on which you installed the scanner, and perform a "Run scan" in the relevant network device authenticated scan configuration.
207
209
208
210
If you still don't get results after 5 minutes, restart the service.
209
211
@@ -215,9 +217,9 @@ Validate that the scanner is running properly. Then go to the scan definition an
215
217
216
218
As the authenticated scanner currently uses an encryption algorithm that isn't compliant with [Federal Information Processing Standards (FIPS)](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing/), the scanner can't operate when an organization enforces the use of FIPS compliant algorithms.
217
219
218
-
To allow algorithms that aren't compliant with FIPS, set the following value in the registry for the devices where the scanner will run:
220
+
To allow algorithms that aren't compliant with FIPS, set the following value in the registry for the devices where the scanner runs:
219
221
220
-
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy with a DWORD value named **Enabled** and value of **0x0**
222
+
Computer`\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy` with a DWORD value named `Enabled` and value of `0x0`.
221
223
222
224
FIPS compliant algorithms are only used in relation to departments and agencies of the United States federal government.
223
225
@@ -242,4 +244,4 @@ Change command-line settings on your device to allow copying and change text siz
0 commit comments