You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/live-response.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: edr
16
16
search.appverid: met150
17
-
ms.date: 04/03/2024
17
+
ms.date: 01/10/2025
18
18
---
19
19
20
20
# Investigate entities on devices using live response
@@ -229,9 +229,9 @@ Here are some examples:
229
229
230
230
Live response has a library where you can put files into. The library stores files (such as scripts) that can be run in a live response session at the tenant level.
231
231
232
-
Live response allows PowerShell scripts to run, however you must first put the files into the library before you can run them.
232
+
Live response allows PowerShell and Bash scripts to run; however, you must first put the files into the library before you can run them.
233
233
234
-
You can have a collection of PowerShell scripts that can run on devices that you initiate live response sessions with.
234
+
You can have a collection of PowerShell and Bash scripts that can run on devices that you initiate live response sessions with.
235
235
236
236
#### To upload a file in the library
237
237
@@ -311,7 +311,7 @@ Live response supports table and JSON format output types. For each command, the
311
311
312
312
## Supported output pipes
313
313
314
-
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: [command] > [filename].txt.
314
+
Live response supports output piping to CLI and file. CLI is the default output behavior. You can pipe the output to a file using the following command: `[command] > [filename].txt`.
Copy file name to clipboardExpand all lines: defender-endpoint/microsoft-defender-antivirus-compatibility.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn about Microsoft Defender Antivirus with other security produc
4
4
ms.service: defender-endpoint
5
5
ms.subservice: ngp
6
6
ms.localizationpriority: medium
7
-
ms.date: 10/17/2024
7
+
ms.date: 01/10/2025
8
8
ms.topic: conceptual
9
9
author: emmwalshh
10
10
ms.author: ewalsh
@@ -132,6 +132,12 @@ In order for Microsoft Defender Antivirus to run in passive mode, endpoints must
132
132
133
133
- Endpoints must be onboarded to Defender for Endpoint.
134
134
135
+
- Windows Security Center Service must be enabled.
136
+
137
+
> [!WARNING]
138
+
> If the **Windows Security Center Service** is *disabled* on Windows Clients then Microsoft Defender Antivirus can't detect third-party antivirus installations and will stay **Active**.
139
+
> This could lead to conflicts between the Microsoft Defender Antivirus and the third-party Antivirus, as both will attempt to provide active protection. This will impact performance and is not supported.
140
+
135
141
> [!IMPORTANT]
136
142
> - Microsoft Defender Antivirus is only available on devices running Windows 10 and 11, Windows Server 2022, Windows Server 2016, Windows Server 2019, Windows Server, version 1803 or newer, Windows Server 2016, and Windows Server 2012 R2.
137
143
> - Passive mode is only supported on Windows Server 2012 R2 & 2016 when the device is onboarded using the [modern, unified solution](configure-server-endpoints.md).
Copy file name to clipboardExpand all lines: defender-endpoint/troubleshoot-av-performance-issues-with-procmon.md
+42-50Lines changed: 42 additions & 50 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.reviewer: yonghree
7
7
manager: deniseb
8
8
ms.service: defender-endpoint
9
9
ms.topic: troubleshooting-general
10
-
ms.date: 01/06/2025
10
+
ms.date: 01/10/2025
11
11
ms.subservice: ngp
12
12
ms.localizationpriority: medium
13
13
ms.collection:
@@ -21,6 +21,12 @@ ai-usage: human-only
21
21
22
22
# Troubleshoot Microsoft Defender Antivirus performance issues with Process Monitor
23
23
24
+
> [!TIP]
25
+
> First, review common reasons for performance issues, such as high CPU usage. See **[Troubleshoot performance issues related to Microsoft Defender Antivirus real-time protection (rtp) or scans (scheduled or on-demand](/defender-endpoint/troubleshoot-performance-issues)**.
26
+
> Then, run the **[Microsoft Defender Antivirus Performance Analyzer](/defender-endpoint/tune-performance-defender-antivirus)**This tool will help identify the cause of high CPU usage in Microsoft Defender Antivirus, whether it's the Antimalware Service Executable, the Microsoft Defender Antivirus service, or MsMpEng.exe.
27
+
>If the Microsoft Defender Antivirus Performance Analyzer doesn't identify the root cause of the high CPU utilization, proceed with running **[Processor Monitor](/defender-endpoint/troubleshoot-av-performance-issues-with-procmon)**.
28
+
>The final tool in your toolkit to run is [Windows Performance Recorder UI (WPRUI) or Windows Performance Recorded (WPR command-line)](/defender-endpoint/troubleshoot-av-performance-issues-with-wprui).
29
+
24
30
## Capture process logs using Process Monitor
25
31
26
32
Process Monitor (ProcMon) is an advanced monitoring tool that provides real-time data on processes. It can be used to capture performance issues, such as high CPU usage, and to monitor application compatibility scenarios as they occur.
@@ -33,9 +39,9 @@ There are two ways to capture a Process Monitor (ProcMon) trace:
33
39
34
40
### Using the MDE Client Analyzer
35
41
36
-
1. Download the [MDE Client Analyzer](/defender-endpoint/download-client-analyzer).
42
+
1. Download the [MDE Client Analyzer](/defender-endpoint/download-client-analyzer).
37
43
38
-
1. Run the MDE Client Analyzer using [Live Response or locally](/defender-endpoint/run-analyzer-windows).
44
+
1. Run the MDE Client Analyzer using [Live Response or locally](/defender-endpoint/run-analyzer-windows).
39
45
40
46
> [!TIP]
41
47
> Before starting the trace, please make sure that the issue is reproducible. Additionally, close any applications that do not contribute to the reproduction of the issue.
@@ -50,84 +56,70 @@ There are two ways to capture a Process Monitor (ProcMon) trace:
50
56
51
57
1. Download [Process Monitor v3.89](/sysinternals/downloads/procmon) to a folder like `C:\temp`.
52
58
53
-
1. To remove the file's mark of the web:
59
+
2. To remove the file's mark of the web:
54
60
55
61
1. Right-click **ProcessMonitor.zip** and select **Properties**.
56
-
62
+
57
63
1. Under the *General* tab, look for *Security*.
58
-
64
+
59
65
1. Check the box beside **Unblock**.
60
-
66
+
61
67
1. Select **Apply**.
62
-
68
+
63
69

64
70
65
-
1. Unzip the file in `C:\temp` so that the folder path is `C:\temp\ProcessMonitor`.
71
+
3. Unzip the file in `C:\temp` so that the folder path is `C:\temp\ProcessMonitor`.
66
72
67
-
1. Copy **ProcMon.exe** to the Windows client or Windows server you're troubleshooting.
73
+
4. Copy **ProcMon.exe** to the Windows client or Windows server you're troubleshooting.
68
74
69
-
> [!TIP]
75
+
> [!TIP]
70
76
> Before running ProcMon, make sure all other applications not related to the high CPU usage issue are closed. Taking this step helps to minimize the number of processes to check.
71
77
72
-
1. You can launch ProcMon in two ways.
78
+
5. You can launch ProcMon in two ways.
73
79
74
80
1. Right-click **ProcMon.exe** and select **Run as administrator**.
75
-
76
-
Since logging starts automatically, stop the capture by selecting the magnifying glass icon or pressing **Ctrl+E**.
77
-
81
+
82
+
- Since logging starts automatically, stop the capture by selecting the magnifying glass icon or pressing **Ctrl+E**.
83
+
78
84

79
-
80
-
To confirm the capture has stopped, look for a red X on the magnifying glass icon.
81
-
85
+
86
+
2. To confirm the capture has stopped, look for a red X on the magnifying glass icon.
87
+
82
88

83
-
84
-
Next, to clear the earlier capture, select the eraser icon.
85
-
86
-

87
-
88
-
Or use the keyboard shortcut **Ctrl+X**.
89
-
90
-
1. Run the **command line** as admin, then from the Process Monitor path, run:
91
-
89
+

90
+
91
+
3. Run the **command line** as admin, then from the Process Monitor path, run:
92
+
92
93

93
-
94
-
ConsoleEdit development language
95
-
96
-
97
-
```
98
-
Procmon.exe /AcceptEula /Noconnect /Profiling
99
-
```
100
-
94
+
101
95
> [!TIP]
102
96
> Make the ProcMon window as small as possible when capturing data so you can easily start and stop the trace.
103
-
104
-

105
-
106
-
1. After completing step 6, set filters by selecting **OK**. You can filter the results after the capture is complete.
97
+
> 
98
+
99
+
6. After completing step 6, set filters by selecting **OK**. You can filter the results after the capture is complete.
107
100
108
101

109
102
110
-
1. To start the capture, select the magnifying glass icon again.
103
+
7. To start the capture, select the magnifying glass icon again.
111
104
112
-
1. Reproduce the problem.
105
+
8. Reproduce the problem.
113
106
114
-
> [!TIP]
107
+
> [!TIP]
115
108
> Wait for the problem to be reproduced, then note the timestamp when the trace begins.
116
109
117
-
1. After capturing two to four minutes of process activity during high CPU usage, stop the capture by clicking the magnifying glass icon.
110
+
9. After capturing two to four minutes of process activity during high CPU usage, stop the capture by clicking the magnifying glass icon.
118
111
119
-
1. To save the capture with a unique name in the `.pml` format, go to **File** then click **Save...**. Ensure you select the radio buttons **All events** and **Native Process Monitor Format (PML)**.
112
+
10. To save the capture with a unique name in the `.pml` format, go to **File** then click **Save...**. Ensure you select the radio buttons **All events** and **Native Process Monitor Format (PML)**.
120
113
121
-

114
+

122
115
123
-
1. For better tracking, change the default path from `C:\temp\ProcessMonitor\LogFile.PML` to `C:\temp\ProcessMonitor\%ComputerName%_LogFile_MMDDYEAR_Repro_of_issue.PML` where:
116
+
11. For better tracking, change the default path from `C:\temp\ProcessMonitor\LogFile.PML` to `C:\temp\ProcessMonitor\%ComputerName%_LogFile_MMDDYEAR_Repro_of_issue.PML` where:
124
117
125
118
-`%ComputerName%` is the device name
126
119
-`MMDDYEAR` is the month, day, and year
127
120
-`Repro_of_issue` is the name of the issue you're trying to reproduce
128
-
129
-
> [!TIP]
130
-
> If you have a working system, you might want to get a sample log to compare.
131
121
132
-
1. Zip the `.pml` file and submit it to Microsoft Support.
122
+
> [!TIP]
123
+
> If you have a working system, you might want to get a sample log to compare.
133
124
125
+
12. Zip the `.pml` file and submit it to Microsoft Support.
1. Check the URLs required for the Security intelligence updates. You can get them via the firewall and/or proxy. See [Configure your network environment to ensure connectivity with Defender for Endpoint service](configure-environment.md).
56
+
57
+
1. Ensure that Microsoft Defender Antivirus (MDAV) is your primary antivirus. If you have a third-party antivirus that uses the Windows Security Center (WSC) API, it will disable MDAV. When MDAV is disabled, updates can't occur.
58
+
59
+
1. Given that MDAV is the primary antivirus and the services are running:
60
+
61
+
1. Check if updating Security Intelligence works when you manually download from [Latest security intelligence updates for Microsoft Defender Antivirus and other Microsoft antimalware?](https://www.microsoft.com/wdsi/defenderupdates)
62
+
63
+
1. If so, try updating through the Microsoft Malware Protection Center (MMPC).
64
+
65
+
Run the following PowerShell command as an administrator.
1. If this command works, the issue might be that the Security intelligence [Fallback order](manage-protection-updates-microsoft-defender-antivirus.md#fallback-order) is set to a WSUS server without **Security intelligence** approved updates. Alternatively, the UNC share might be stale, or the Windows Update service might have issues.
72
+
73
+
1. To check the WSUS server that the machine goes to, review `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\WUServer (REG_SZ)`. Once you find the WUServer, check if that WSUS server has the MDAV security intelligence [(KB2267602 for MDAV and KB2461484 for SCEP)](microsoft-defender-antivirus-updates.md#security-intelligence-updates) approved.
74
+
1. To check the UNC share, review [Manage how and where Microsoft Defender Antivirus receives updates](manage-protection-updates-microsoft-defender-antivirus.md#create-a-unc-share-for-security-intelligence-and-platform-updates).
75
+
1. To check the status of the Windows Update service, review [Guidance for troubleshooting Windows Update issues](/troubleshoot/windows-client/installing-updates-features-roles/troubleshoot-windows-update-issues) and [Troubleshoot problems updating Windows](https://support.microsoft.com/windows/troubleshoot-problems-updating-windows-188c2b0f-10a7-d72f-65b8-32d177eb136c).
Copy file name to clipboardExpand all lines: defender-office-365/defender-for-office-365-whats-new.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.author: chrisda
8
8
author: chrisda
9
9
manager: deniseb
10
10
ms.localizationpriority: medium
11
-
ms.date: 12/17/2024
11
+
ms.date: 01/10/2025
12
12
audience: ITPro
13
13
ms.collection:
14
14
- m365-security
@@ -39,6 +39,10 @@ For more information on what's new with other Microsoft Defender security produc
39
39
-[What's new in Microsoft Defender for Identity](/defender-for-identity/whats-new)
40
40
-[What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
41
41
42
+
## January 2025
43
+
44
+
-[Use the built-in Report button in Outlook](submissions-outlook-report-messages.md#use-the-built-in-report-button-in-outlook): The built-in **Report** button in Outlook for iOS and Android version 4.2446 or later now supports the [user reported settings](submissions-user-reported-messages-custom-mailbox.md) experience to report messages as Phishing, Junk, and Not Junk.
45
+
42
46
## December 2024
43
47
44
48
-[Considerations for integrating non-Microsoft security services with Microsoft 365](mdo-integrate-security-service.md): Considerations and recommendations for deploying a defense-in-depth email security strategy using third-party security services.
Copy file name to clipboardExpand all lines: defender-office-365/how-policies-and-protections-are-combined.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ ms.custom:
17
17
description: Admins can learn how the order of protection settings and the priority order of security policies affect the application of security policies in Microsoft 365.
- ✅ <a href="https://learn.microsoft.com/defender-office-365/mdo-about#defender-for-office-365-plan-1-vs-plan-2-cheat-sheet" target="_blank">Microsoft Defender for Office 365 Plan 1 and Plan 2</a>
@@ -186,8 +186,8 @@ Tenant allows and blocks are able to override some filtering stack verdicts as d
186
186
|Not spam|**Tenant wins**: Email delivered to mailbox|**Tenant wins**: Email delivered to user's Junk Email folder|
187
187
188
188
-[Allow entries in the Tenant Allow/Block List](tenant-allow-block-list-about.md#allow-entries-in-the-tenant-allowblock-list): There are two types of allow entries:
189
-
- Message level allow entries act on the entire message, regardless of the entities in the message. Allow entries for email address and domains are message level allow entries.
190
-
- Entity level allow entries act on the filtering verdict of entities. Allow entries for URLs, spoofed senders, and files are entity level allow entries. To override malware and high confidence phishing verdicts, you need to use entity level allow entries, which you can create by submission only due to [Secure by default in Microsoft 365](secure-by-default.md).
189
+
-**Message level** allow entries act on the entire message, regardless of the entities in the message. Allow entries for email address and domains are message level allow entries. These allow entries override bulk and spam verdicts, and high confidence phishing verdicts from machine learning models.
190
+
-**Entity level** allow entries act on the filtering verdict of entities. Allow entries for URLs, spoofed senders, and files are entity level allow entries. To override malware and high confidence phishing verdicts, you need to use entity level allow entries, which you can create by submission only due to [Secure by default in Microsoft 365](secure-by-default.md).
0 commit comments