Skip to content

Commit f525d49

Browse files
committed
Merge branch 'main' into maccruz-custompanes
2 parents 789d34d + ed1295f commit f525d49

File tree

5 files changed

+52
-18
lines changed

5 files changed

+52
-18
lines changed

defender-endpoint/command-line-arguments-microsoft-defender-antivirus.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.author: ewalsh
88
ms.custom: nextgen
99
ms.reviewer: ksarens
1010
manager: deniseb
11-
ms.date: 06/06/2023
11+
ms.date: 01/16/2025
1212
ms.subservice: ngp
1313
ms.topic: how-to
1414
ms.collection:
@@ -32,7 +32,7 @@ search.appverid: met150
3232
You can perform various functions in Microsoft Defender Antivirus using the dedicated command-line tool **mpcmdrun.exe**. This utility is useful when you want to automate Microsoft Defender Antivirus tasks. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. Run it from a command prompt.
3333

3434
> [!TIP]
35-
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the Start menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
35+
> You might need to open an administrator-level version of the command prompt. When you search for **Command Prompt** on the **Start** menu, choose **Run as administrator**. If you're running an updated Microsoft Defender antimalware platform version, run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\<antimalware platform version>`. For more information about the antimalware platform, see [Microsoft Defender Antivirus updates and baselines](microsoft-defender-antivirus-updates.md).
3636
3737
The MpCmdRun utility uses the following syntax:
3838

@@ -52,38 +52,45 @@ In our example, the MpCmdRun utility starts a full antivirus scan on the device.
5252

5353
|Command|Description|
5454
|---|---|
55-
|`-?` **or** `-h`|Displays all available options for the MpCmdRun tool|
55+
|`-?` **or** `-h`|Displays all available options for the MpCmdRun tool.|
5656
|`-Scan [-ScanType [<value>]] [-File <path> [-DisableRemediation] [-BootSectorScan] [-CpuThrottling]] [-Timeout <days>] [-Cancel]`|Scans for malicious software. Values for **ScanType** are:<p>**0** Default, according to your configuration<p>**1** Quick scan<p>**2** Full scan<p>**3** File and directory custom scan.<p>CpuThrottling runs according to policy configurations.|
57-
|`-Trace [-Grouping #] [-Level #]`|Starts diagnostic tracing|
57+
|`-Trace [-Grouping #] [-Level #]`|Starts diagnostic tracing.|
5858
|`-CaptureNetworkTrace -Path <path>`|Captures all the network input into the Network Protection service and saves it to a file at `<path>`. <br/>Supply an empty path to stop tracing.|
5959
|`-GetFiles [-SupportLogLocation <path>]`|Collects support information. See [collecting diagnostic data](collect-diagnostic-data.md).|
6060
|`-GetFilesDiagTrack`|Same as `-GetFiles`, but outputs to temporary DiagTrack folder.|
6161
|`-RemoveDefinitions [-All]`|Restores the installed security intelligence to a previous backup copy or to the original default set.|
6262
|`-RemoveDefinitions [-DynamicSignatures]`|Removes only the dynamically downloaded security intelligence.|
6363
|`-RemoveDefinitions [-Engine]`|Restores the previous installed engine.|
64-
|`-SignatureUpdate [-UNC \|-MMPC]`|Checks for new security intelligence updates.|
65-
|`-Restore [-ListAll \|[[-Name <name>] [-All] \|[-FilePath <filePath>]] [-Path <path>]]`|Restores or lists quarantined item(s).|
64+
|`-SignatureUpdate [-UNC |-MMPC]`|Checks for new security intelligence updates.|
65+
|`-Restore [-ListAll |[[-Name <name>] [-All] |[-FilePath <filePath>]] [-Path <path>]]`|Restores or lists quarantined items.|
6666
|`-AddDynamicSignature [-Path]`|Loads dynamic security intelligence.|
6767
|`-ListAllDynamicSignatures`|Lists the loaded dynamic security intelligence.|
6868
|`-RemoveDynamicSignature [-SignatureSetID]`|Removes dynamic security intelligence.|
6969
|`-CheckExclusion -path <path>`|Checks whether a path is excluded.|
70+
|`-TDT [-on|-off|-default]`|Disable or Enable TDT feature or sets it to default. If no option is specified, it retrieves the current status.|
71+
|`-OSCA`|Prints OS Copy Acceleration feature status.|
72+
|`-DeviceControl -TestPolicyXml <FilePath> [-Rules | -Groups]`|Validate xml policy groups and rules.|
73+
|`-TrustCheck -File <FilePath>`|Checks trust status of a file.|
7074
|`-ValidateMapsConnection`|Verifies that your network can communicate with the Microsoft Defender Antivirus cloud service. This command will only work on Windows 10, version 1703 or higher.|
75+
|`-ListCustomASR`|List the custom Azure Site Recovery rules present on this device.|
76+
|`-DisplayECSConnection`|Displays URLs that Defender Core service uses to establish connection to ECS.|
77+
|`-HeapSnapshotConfig <-Enable|-Disable> [-Pid <ProcessID>]`|Enable or Disable heap snapshot (tracing) configuration for process. Replace `<ProcessID>` with the actual process ID.|
7178
|`-ResetPlatform`| Reset platform binaries back to `%ProgramFiles%\Windows Defender`.|
7279
|`-RevertPlatform`| Revert platform binaries back to the previously installed version of the Defender platform.|
7380

7481
> [!NOTE]
75-
> For the "Scan" command, the following are the default timeout values for Quick or Full scans where the scan will stop at that time by default.
76-
> - Portal initiated scans (Quick or Full) or Windows Security app (Quick or Full): No time limit
77-
> - Scheduled Full Scans or MpCmdRun -scan: 7 day limit
78-
> - Scheduled Quick Scans or MpCmdRun -scan: 1 day limit
82+
> For the `Scan` command, the following are the default time out values for Quick or Full scans where the scan will stop at that time by default.
83+
> - Scheduled Full Scans or MpCmdRun -scan: Seven day limit
84+
> - Scheduled Quick Scans or MpCmdRun -scan: One day limit
85+
7986

8087
## Common errors in running commands via mpcmdrun.exe
8188

8289
The following table lists common errors that can occur while using the MpCmdRun tool.
8390

8491
|Error message|Possible reason|
8592
|---|---|
86-
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> Note that in Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
93+
|**ValidateMapsConnection failed (800106BA)** or **0x800106BA**|The Microsoft Defender Antivirus service is disabled. Enable the service and try again. If you need help re-enabling Microsoft Defender Antivirus, see [Reinstall/enable Microsoft Defender Antivirus on your endpoints](switch-to-mde-phase-2.md#step-1-reinstallenable-microsoft-defender-antivirus-on-your-endpoints).<p> In Windows 10 1909 or older, and Windows Server 2019 or older, the service was formerly called *Windows Defender Antivirus*.|
8794
|**0x80070667**|You're running the `-ValidateMapsConnection` command from a computer that is Windows 10 version 1607 or older, or Windows Server 2016 or older. Run the command from a machine that is Windows 10 version 1703 or newer, or Windows Server 2019 or newer.|
8895
|**MpCmdRun is not recognized as an internal or external command, operable program, or batch file.**|The tool must be run from either `%ProgramFiles%\Windows Defender` or `C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2012.4-0` (where `2012.4-0` might differ since platform updates are monthly except for March)|
8996
|**ValidateMapsConnection failed to establish a connection to MAPS (hr=80070005 httpcode=450)**|The command was attempted using insufficient privileges. Use the command prompt (cmd.exe) as an administrator.|
@@ -98,7 +105,7 @@ The following table lists common errors that can occur while using the MpCmdRun
98105
- [Performance analyzer for Microsoft Defender Antivirus](tune-performance-defender-antivirus.md)
99106
- [Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md)
100107
- [Configure and validate Microsoft Defender Antivirus network connections](configure-network-connections-microsoft-defender-antivirus.md)
101-
- [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
108+
- [Reference articles for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
102109
- [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md)
103110
- [macOS Antivirus policy settings for Microsoft Defender Antivirus for Intune](/mem/intune/protect/antivirus-microsoft-defender-settings-macos)
104111
- [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)

defender-office-365/mdo-email-entity-page.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ f1.keywords:
55
ms.author: chrisda
66
author: chrisda
77
manager: deniseb
8-
ms.date: 4/12/2024
8+
ms.date: 01/16/2025
99
audience: ITPro
1010
ms.topic: conceptual
1111
ms.service: defender-office-365
@@ -196,6 +196,7 @@ Use :::image type="icon" source="media/m365-cc-sc-download-icon.png" border="fal
196196
The **Analysis** view contains information that helps you analyze the message in depth. The following information is available in this view:
197197

198198
- **Threat detection details** section: Information about threats detected in the message:
199+
- **Threat classification**: AI determination of the threat. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
199200
- **Threats**: The primary threat is indicated by :::image type="icon" source="media/m365-cc-sc-primary-threat-icon.png" border="false"::: **Primary threat**.
200201
- **Confidence level**: Values are **High**, **Medium**, or **Low**.
201202
- **Priority account protection**: Values are **Yes** or **No**. For more information, see [Configure and review priority account protection in Microsoft Defender for Office 365](priority-accounts-turn-on-priority-account-protection.md).
@@ -511,6 +512,7 @@ The following sections are available on the Email summary panel for all features
511512
- **Delivery action**
512513
- **Detection technologies**
513514
- **Primary override : Source**
515+
- **Threat classification**
514516

515517
- **Email details** section:
516518
- **Sender display name**

defender-office-365/threat-explorer-real-time-detections-about.md

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: chrisda
77
manager: deniseb
88
audience: ITPro
99
ms.topic: conceptual
10-
ms.date: 10/07/2024
10+
ms.date: 01/15/2025
1111
ms.localizationpriority: medium
1212
ms.collection:
1313
- m365-security
@@ -181,6 +181,7 @@ The filterable properties that are available in the **Delivery action** box in t
181181
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**: For more information, see [Dynamic Delivery in Safe Attachments policies](safe-attachments-about.md#dynamic-delivery-in-safe-attachments-policies).</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**: The message was retroactively identified as good.</li><li>**ZAP**: For more information, see [Zero-hour auto purge (ZAP) in Microsoft Defender for Office 365](zero-hour-auto-purge.md).</li></ul>|
182182
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|
183183
|Detection technology|Select one or more values: <ul><li>**Advanced filter**: Signals based on machine learning.</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**: [Safe Attachments](safe-attachments-about.md) detected a malicious attachment during detonation analysis.</li><li>**File detonation reputation**: File attachments previously detected by [Safe Attachments](safe-attachments-about.md) detonations in other Microsoft 365 organizations.</li><li>**File reputation**: The message contains a file that was previously identified as malicious in other Microsoft 365 organizations.</li><li>**Fingerprint matching**: The message closely resembles a previous detected malicious message.</li><li>**General filter**</li><li>**Impersonation brand**: Sender impersonation of well-known brands.</li><li>**Impersonation domain**: Impersonation of sender domains that you own or specified for protection in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365)</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**: Impersonation detections from mailbox intelligence in [anti-phishing policies](anti-phishing-policies-about.md#impersonation-settings-in-anti-phishing-policies-in-microsoft-defender-for-office-365).</li><li>**Mixed analysis detection**: Multiple filters contributed to the message verdict.</li><li>**spoof DMARC**: The message failed [DMARC authentication](email-authentication-dmarc-configure.md).</li><li>**Spoof external domain**: Sender email address spoofing using a domain that's external to your organization.</li><li>**Spoof intra-org**: Sender email address spoofing using a domain that's internal to your organization.</li><li>**URL detonation reputation**: URLs previously detected by [Safe Links](safe-links-about.md) detonations in other Microsoft 365 organizations.</li><li>**URL malicious reputation**: The message contains a URL that was previously identified as malicious in other Microsoft 365 organizations.</li></ul>|
184+
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|
184185
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|
185186
|Latest delivery location¹|Same values as **Original delivery location**</li></ul>|
186187
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|
@@ -279,6 +280,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
279280

280281
Hovering over a data point in the chart shows the count for each detection technology.
281282

283+
#### Threat classification chart pivot in the All email view in Threat Explorer
284+
285+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
286+
287+
Hovering over a data point in the chart shows the count for each classification.
288+
282289
#### Full URL chart pivot in the All email view in Threat Explorer
283290

284291
The **Full URL** pivot organizes the chart by the full URLs in messages for the specified date/time range and property filters.
@@ -340,6 +347,7 @@ The **Email** view shows a details table. You can sort the entries by clicking o
340347
- **Data loss prevention rule**
341348
- **Threat type**<sup>\*</sup>
342349
- **Detection technology**
350+
- **Threat classification**
343351
- **Attachment Count**
344352
- **URL Count**
345353
- **Email size**
@@ -681,6 +689,7 @@ The chart pivots that are available in the **Malware** view in Threat Explorer a
681689
|**Sender domain**|||
682690
|**Sender IP**|||
683691
|**Delivery action**|||
692+
|**Threat classification**|||
684693
|**Detection technology**|||
685694

686695
The available chart pivots are described in the following subsections.
@@ -721,6 +730,12 @@ The **Delivery action** pivot organizes the chart by what happened to messages t
721730

722731
Hovering over a data point in the chart shows the count for each delivery action.
723732

733+
#### Threat classification chart pivot in the Malware view in Threat Explorer and Real-time detections
734+
735+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
736+
737+
Hovering over a data point in the chart shows the count for each classification.
738+
724739
#### Detection technology chart pivot in the Malware view in Threat Explorer and Real-time detections
725740

726741
The **Detection technology** pivot organizes the chart by the feature that identified malware in messages for the specified date/time range and property filters.
@@ -778,6 +793,7 @@ The following table shows the columns that are available in Threat Explorer and
778793
|**Data loss prevention rule**|||
779794
|**Threat type**<sup>\*</sup>|||
780795
|**Detection technology**|||
796+
|**Threat classification**|||
781797
|**Attachment Count**|||
782798
|**URL Count**|||
783799
|**Email size**|||
@@ -895,6 +911,7 @@ The filterable properties that are available in the **Sender address** box in th
895911
|Additional action|Select one or more values: <ul><li>**Automated remediation**</li><li>**Dynamic Delivery**</li><li>**Manual remediation**</li><li>**None**</li><li>**Quarantine release**</li><li>**Reprocessed**</li><li>**ZAP**</li></ul>|||
896912
|Directionality|Select one or more values: <ul><li>**Inbound**</li><li>**Intra-org**</li><li>**Outbound**</li></ul>|||
897913
|Detection technology|Select one or more values: <ul><li>**Advanced filter**</li><li>**Antimalware protection**</li><li>**Bulk**</li><li>**Campaign**</li><li>**Domain reputation**</li><li>**File detonation**</li><li>**File detonation reputation**</li><li>**File reputation**</li><li>**Fingerprint matching**</li><li>**General filter**</li><li>**Impersonation brand**</li><li>**Impersonation domain**</li><li>**Impersonation user**</li><li>**IP reputation**</li><li>**Mailbox intelligence impersonation**</li><li>**Mixed analysis detection**</li><li>**spoof DMARC**</li><li>**Spoof external domain**</li><li>**Spoof intra-org**</li><li>**URL detonation**</li><li>**URL detonation reputation**</li><li>**URL malicious reputation**</li></ul>|||
914+
|Threat classification|Select one or more values: <ul><li>**Business inteligence**</li><li>**Contact establishment**</li><li>**Gift card**</li><li>**Invoice**</li><li>**Payroll**</li><li><**PII gathering**/li><li>**Task**</li></ul> For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).|||
898915
|Original delivery location|Select one or more values: <ul><li>**Deleted Items folder**</li><li>**Dropped**</li><li>**Failed**</li><li>**Inbox/folder**</li><li>**Junk folder**</li><li>**On-prem/external**</li><li>**Quarantine**</li><li>**Unknown**</li></ul>|||
899916
|Latest delivery location|Same values as **Original delivery location**</li></ul>|||
900917
|Phish confidence level|Select one or more values: <ul><li>**High**</li><li>**Normal**</li></ul>|||
@@ -947,6 +964,7 @@ The chart pivots that are available in the **Phish** view in Threat Explorer and
947964
|**Sender IP**|||
948965
|**Delivery action**|||
949966
|**Detection technology**|||
967+
|**Threat classification**|||
950968
|**Full URL**|||
951969
|**URL domain**|||
952970
|**URL domain and path**|||
@@ -989,6 +1007,12 @@ The **Detection technology** pivot organizes the chart by the feature that ident
9891007

9901008
Hovering over a data point in the chart shows the count for each detection technology.
9911009

1010+
#### Threat classification chart pivot in the Phish view in Threat Explorer and Real-time detections
1011+
1012+
The **Threat classification** pivot organizes the chart by classified threats. For more information, see [Threat classification in Microsoft Defender for Office 365](mdo-threat-classification.md).
1013+
1014+
Hovering over a data point in the chart shows the count for each classification.
1015+
9921016
#### Full URL chart pivot in the Phish view in Threat Explorer
9931017

9941018
The **Full URL** pivot organizes the chart by the full URLs in phishing messages for the specified date/time range and property filters.
@@ -1065,6 +1089,7 @@ The following table shows the columns that are available in Threat Explorer and
10651089
|**Data loss prevention rule**|||
10661090
|**Threat type**<sup>\*</sup>|||
10671091
|**Detection technology**|||
1092+
|**Threat classification**|||
10681093
|**Attachment Count**|||
10691094
|**URL Count**|||
10701095
|**Email size**|||

0 commit comments

Comments
 (0)