Skip to content

Commit f9d5878

Browse files
authored
Merge branch 'main' into 8330bb97-d300-484c-9865-cc140bb34dd3_45
2 parents 8cafc44 + 2f8effb commit f9d5878

File tree

45 files changed

+238
-98
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+238
-98
lines changed

defender-endpoint/attack-surface-reduction-rules-reference.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier2
1717
- mde-asr
18-
ms.date: 05/02/2024
18+
ms.date: 09/07/2024
1919
search.appverid: met150
2020
---
2121

@@ -109,7 +109,6 @@ The following ASR rules DO NOT honor Microsoft Defender for Endpoint Indicators
109109
The following table lists the supported operating systems for rules that are currently released to general availability. The rules are listed alphabetical order in this table.
110110

111111
> [!NOTE]
112-
>
113112
> Unless otherwise indicated, the minimum Windows 10 build is version 1709 (RS3, build 16299) or later; the minimum Windows Server build is version 1809 or later.
114113
>
115114
> Attack surface reduction rules in Windows Server 2012 R2 and Windows Server 2016 are available for devices onboarded using the modern unified solution package. For more information, see [New Windows Server 2012 R2 and 2016 functionality in the modern unified solution](configure-server-endpoints.md#functionality-in-the-modern-unified-solution).
@@ -257,7 +256,6 @@ This rule prevents an application from writing a vulnerable signed driver to dis
257256
The **Block abuse of exploited vulnerable signed drivers** rule doesn't block a driver already existing on the system from being loaded.
258257

259258
> [!NOTE]
260-
>
261259
> You can configure this rule using Intune OMA-URI. See [Intune OMA-URI](enable-attack-surface-reduction.md#custom-profile-in-intune) for configuring custom rules.
262260
>
263261
> You can also configure this rule using [PowerShell](enable-attack-surface-reduction.md#powershell).
@@ -322,6 +320,9 @@ Dependencies: Microsoft Defender Antivirus
322320

323321
### Block credential stealing from the Windows local security authority subsystem
324322

323+
> [!NOTE]
324+
> If you have [LSA protection](/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection) enabled and [Credential Guard](/windows/security/identity-protection/credential-guard) enabled, this attack surface reduction rule is not required.
325+
325326
This rule helps prevent credential stealing by locking down Local Security Authority Subsystem Service (LSASS).
326327

327328
LSASS authenticates users who sign in on a Windows computer. Microsoft Defender Credential Guard in Windows normally prevents attempts to extract credentials from LSASS. Some organizations can't enable Credential Guard on all of their computers because of compatibility issues with custom smartcard drivers or other programs that load into the Local Security Authority (LSA). In these cases, attackers can use tools like Mimikatz to scrape cleartext passwords and NTLM hashes from LSASS.
@@ -573,6 +574,14 @@ Configuration Manager name: Not yet available
573574

574575
GUID: `33ddedf1-c6e0-47cb-833e-de6133960387`
575576

577+
Advanced hunting action type:
578+
579+
- `AsrSafeModeRebootedAudited`
580+
581+
- `AsrSafeModeRebootBlocked`
582+
583+
- `AsrSafeModeRebootWarnBypassed`
584+
576585
Dependencies: Microsoft Defender Antivirus
577586

578587
### Block untrusted and unsigned processes that run from USB
@@ -610,6 +619,14 @@ Configuration Manager name: Not yet available
610619

611620
GUID: `c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb`
612621

622+
Advanced hunting action type:
623+
624+
- `AsrAbusedSystemToolAudited`
625+
626+
- `AsrAbusedSystemToolBlocked`
627+
628+
- `AsrAbusedSystemToolWarnBypassed`
629+
613630
Dependencies: Microsoft Defender Antivirus
614631

615632
### Block Webshell creation for Servers

defender-endpoint/defender-endpoint-false-positives-negatives.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- m365solution-fpfn
1717
- highpri
1818
- tier1
19-
ms.topic: how-to
19+
ms.topic: solution-overview
2020
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree, jcedola
2121
ms.custom:
2222
- FPFN

defender-endpoint/edr-block-mode-faqs.yml

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ metadata:
1515
- partner-contribution
1616
ms.topic: faq
1717
ms.collection: m365-security
18-
ms.date: 04/26/2024
18+
ms.date: 09/07/2024
1919

2020
title: Endpoint detection and response (EDR) in block mode frequently asked questions (FAQ)
2121
summary: |
@@ -38,14 +38,12 @@ sections:
3838
- question: |
3939
Do I need to turn EDR in block mode on if I have Microsoft Defender Antivirus running on devices?
4040
answer: |
41-
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. EDR detections can be automatically remediated by [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) or by [automated investigation & remediation capabilities](automated-investigations.md) in block mode.
42-
43-
The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product.
41+
Yes, Microsoft recommends enabling EDR in block mode, even when primary antivirus software on the system is Microsoft Defender Antivirus. The primary purpose of EDR in block mode is to remediate post-breach detections that were missed by a non-Microsoft antivirus product. However, there are scenarios where EDR in block mode might be beneficial, such as if Microsoft Defender Antivirus is misconfigured, or if [PUA protection](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) is not enabled. In such cases, EDR in block mode can automatically remediate detections like PUA.
4442
4543
- question: |
4644
Will EDR in block mode affect a user's antivirus protection?
4745
answer: |
48-
EDR in block mode does not affect third-party antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
46+
EDR in block mode does not affect non-Microsoft antivirus protection running on users' devices. EDR in block mode works if the primary antivirus solution misses something, or if there is a post-breach detection. EDR in block mode works just like Microsoft Defender Antivirus in passive mode, except that EDR in block mode also blocks and remediates malicious artifacts or behaviors that are detected.
4947
5048
- question: |
5149
Why do I need to keep Microsoft Defender Antivirus up to date?

defender-endpoint/edr-detection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.custom: admindeeplinkDEFENDER
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 08/15/2024
18+
ms.date: 09/04/2024
1919
---
2020

2121
# EDR detection test for verifying device's onboarding and reporting services
@@ -57,7 +57,7 @@ Run an EDR detection test to verify that the device is properly onboarded and re
5757

5858

5959
```bash
60-
curl -o ~/Downloads/MDE Linux DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
60+
curl -o ~/Downloads/MDE-Linux-EDR-DIY.zip -L https://aka.ms/MDE-Linux-EDR-DIY
6161
```
6262

6363
2. Extract the zip

defender-endpoint/linux-support-ebpf.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: linux
1717
search.appverid: met150
18-
ms.date: 08/22/2024
18+
ms.date: 09/07/2024
1919
---
2020

2121
# Use eBPF-based sensor for Microsoft Defender for Endpoint on Linux
@@ -62,6 +62,10 @@ The eBPF sensor for Microsoft Defender for Endpoint on Linux is supported on the
6262
| Oracle Linux RHCK | 7.9 | 3.10.0-1160 |
6363
| Oracle Linux UEK | 7.9 | 5.4 |
6464
| Amazon Linux 2 | 2 | 5.4.261-174.360|
65+
| Rocky Linux 8 | 8.7 | 4.18.0-425 |
66+
| Rocky Linux 9 | 9.2 | 5.14.0-284 |
67+
| Alma Linux 8 | 8.4 | 4.18.0-305 |
68+
| Alma Linux 9 | 9.2 | 5.14.0-284 |
6569

6670
> [!NOTE]
6771
> Oracle Linux 8.8 with kernel version 5.15.0-0.30.20.el8uek.x86_64, 5.15.0-0.30.20.1.el8uek.x86_64 will result in kernel hang when eBPF is enabled as supplementary subsystem provider. This kernel version should not be used for eBPF mode. Refer to Troubleshooting and Diagnostics section for mitigation steps.
@@ -153,7 +157,7 @@ The following two sets of data help analyze potential issues and determine the m
153157

154158
#### Troubleshooting performance issues
155159

156-
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirusexclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
160+
If you see increased resource consumption by Microsoft Defender on your endpoints, it's important to identify the process/mount-point/files that are causing most of the CPU/Memory utilization. You can then apply the necessary exclusions. After applying possible antivirus exclusions, if `wdavdaemon` (parent process) is still consuming the resources, use the ebpf-statistics command to get the top system call count:
157161

158162
```Bash
159163
sudo mdatp diagnostic ebpf-statistics

defender-endpoint/mtd.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: onboard
77
ms.author: siosulli
88
author: siosulli
99
ms.localizationpriority: medium
10-
ms.date: 01/28/2024
10+
ms.date: 09/05/2024
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -101,10 +101,10 @@ While evaluating mobile threat defense with Microsoft Defender for Endpoint, you
101101
This helps reduce potential issues that could arise while rolling out the service. Here are some tests and exit criteria that might help:
102102

103103
- Devices show up in the device inventory list: After successful onboarding of Defender for Endpoint on the mobile device, verify that the device is listed in the Device Inventory in the [security console](https://security.microsoft.com).
104+
<!---
105+
- Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here's an example app that can be used for this test: (We are working on new one, it will be updated soon). Note that on Android Enterprise with a work profile, only the work profile is supported. --->
104106

105-
- Run a malware detection test on an Android device: Install any test virus app from the Google play store and verify that it gets detected by Microsoft Defender for Endpoint. Here's an example app that can be used for this test: [Test virus](https://play.google.com/store/apps/details?id=com.antivirus&hl=en_US&gl=US). Note that on Android Enterprise with a work profile, only the work profile is supported.
106-
107-
- Run a phishing test: Browse to https://smartscreentestratings2.net and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.
107+
- Run a phishing test: Browse to `https://smartscreentestratings2.net` and verify that it gets blocked by Microsoft Defender for Endpoint. Note that on Android Enterprise with a work profile, only the work profile is supported.
108108

109109
- Alerts appear in dashboard: Verify that alerts for above detection tests appear on the [security console](https://security.microsoft.com).
110110

defender-endpoint/respond-machine-alerts.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
55
ms.author: diannegali
66
author: diannegali
77
ms.localizationpriority: medium
8-
ms.date: 12/15/2023
8+
ms.date: 09/09/2024
99
manager: deniseb
1010
audience: ITPro
1111
ms.collection:
@@ -266,11 +266,13 @@ When a device is being isolated, the following notification is displayed to info
266266
267267
## Contain devices from the network
268268

269-
When you have identified an unmanaged device that is compromised or potentially compromised, you might want to contain that device from the network. When you contain a device any Microsoft Defender for Endpoint onboarded device will block incoming and outgoing communication with that device. This action can help prevent neighboring devices from becoming compromised while the security operations analyst locates, identifies, and remediates the threat on the compromised device.
269+
When you have identified an unmanaged device that is compromised or potentially compromised, you might want to contain that device from the network to prevent the potential attack from moving laterally across the network. When you contain a device any Microsoft Defender for Endpoint onboarded device will block incoming and outgoing communication with that device. This action can help prevent neighboring devices from becoming compromised while the security operations analyst locates, identifies, and remediates the threat on the compromised device.
270270

271271
> [!NOTE]
272272
> Blocking incoming and outgoing communication with a 'contained' device is supported on onboarded Microsoft Defender for Endpoint Windows 10 and Windows Server 2019+ devices.
273273
274+
Once devices are contained, we recommend investigating and remediating the threat on the contained devices as soon as possible. After remediation, you should remove the devices from containment.
275+
274276
### How to contain a device
275277

276278
1. Go to the **Device inventory** page and select the device to contain.
@@ -283,6 +285,9 @@ When you have identified an unmanaged device that is compromised or potentially
283285

284286
:::image type="content" alt-text="Screenshot of the contain device menu item." source="/defender/media/defender-endpoint/contain_device_popup.png" lightbox="/defender/media/defender-endpoint/contain_device_popup.png":::
285287

288+
> [!IMPORTANT]
289+
> Containing a large number of devices might cause performance issues on Defender for Endpoint-onboarded devices. To prevent any issues, Microsoft recommends containing up to 100 devices at any given time.
290+
286291
### Contain a device from the device page
287292

288293
A device can also be contained from the device page by selecting **Contain device** from the action bar:

defender-endpoint/schedule-antivirus-scans-group-policy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.localizationpriority: medium
66
author: siosulli
77
ms.author: siosulli
88
ms.custom: nextgen
9-
ms.date: 03/06/2023
9+
ms.date: 09/07/2024
1010
ms.reviewer: pauhijbr, ksarens
1111
manager: deniseb
1212
ms.subservice: ngp
@@ -80,7 +80,7 @@ For more information, see the [Manage when protection updates should be download
8080
| Location | Setting | Description | Default setting (if not configured) |
8181
|:---|:---|:---|:---|
8282
| Scan | Specify the interval to run quick scans per day | Specify how many hours should elapse before the next quick scan. For example, to run every two hours, enter **2**, for once a day, enter **24**. Enter **0** to never run a daily quick scan. | Never |
83-
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) | 2 a.m. |
83+
| Scan | Specify the time for a daily quick scan | Specify the number of minutes after midnight (for example, enter **60** for 1 a.m.) Note that if this setting is set to 0, daily quick scans do not run.| 2 a.m. |
8484

8585
## Group Policy settings for scheduling scans after protection updates
8686

@@ -97,4 +97,5 @@ For more information, see the [Manage when protection updates should be download
9797
> - [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md)
9898
> - [Configure Defender for Endpoint on Android features](android-configure.md)
9999
> - [Configure Microsoft Defender for Endpoint on iOS features](ios-configure-features.md)
100+
100101
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/switch-to-mde-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414
- m365initiative-defender-endpoint
1515
- highpri
1616
- tier1
17-
ms.topic: overview
17+
ms.topic: solution-overview
1818
ms.custom: migrationguides
1919
ms.date: 10/24/2023
2020
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho, yongrhee
224 KB
Loading

0 commit comments

Comments
 (0)