Skip to content

Commit fdf2d6f

Browse files
authored
Merge branch 'main' into batamig-patch-2
2 parents ffe0a23 + 77b94ab commit fdf2d6f

File tree

77 files changed

+1631
-795
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

77 files changed

+1631
-795
lines changed

defender-endpoint/TOC.yml

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -896,7 +896,7 @@
896896
- name: Troubleshooting mode scenarios
897897
href: troubleshooting-mode-scenarios.md
898898

899-
- name: Diagnostics and performance for Microsoft Defender Antivirus
899+
- name: Diagnostics for Microsoft Defender Antivirus
900900
items:
901901
- name: Device health reports
902902
href: device-health-reports.md
@@ -907,18 +907,23 @@
907907
href: device-health-sensor-health-os.md
908908
- name: Microsoft Defender Core service overview
909909
href: microsoft-defender-core-service-overview.md
910-
displayName: Microsoft Defender Core service overview
911910
- name: Microsoft Defender Core service configurations and experimentation
912911
href: microsoft-defender-core-service-configurations-and-experimentation.md
913-
- name: Troubleshoot performance issues related to real-time protection
914-
href: troubleshoot-performance-issues.md
915912
- name: Collect diagnostic data of Microsoft Defender Antivirus
916913
href: collect-diagnostic-data.md
917-
- name: Improve performance of Microsoft Defender Antivirus
918-
href: tune-performance-defender-antivirus.md
919914

920915
- name: Troubleshooting Microsoft Defender Antivirus
921916
items:
917+
- name: Troubleshoot Microsoft Defender Antivirus performance issues
918+
items:
919+
- name: Performance analyzer for Microsoft Defender Antivirus
920+
href: tune-performance-defender-antivirus.md
921+
- name: Performance analyzer reference
922+
href: performance-analyzer-reference.md
923+
displayName: high cpu msmpeng.exe antimalware engine microsoft defender
924+
antivirus windows defender antivirus
925+
- name: Troubleshoot performance issues related to real-time protection
926+
href: troubleshoot-performance-issues.md
922927
- name: Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus
923928
href: troubleshoot-microsoft-defender-antivirus.yml
924929
- name: Troubleshoot Microsoft Defender Antivirus while migrating from a third-party solution

defender-endpoint/android-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: android
1717
search.appverid: met150
18-
ms.date: 10/18/2024
18+
ms.date: 11/22/2024
1919
---
2020

2121
# Configure Defender for Endpoint on Android features
@@ -57,7 +57,7 @@ This feature provides protection against rogue Wi-Fi related threats and rogue c
5757

5858
It includes several admin controls to offer flexibility, such as the ability to configure the feature from within the Microsoft Intune admin center and add trusted certificates. Admins can enable [privacy controls](android-configure.md#privacy-controls) to configure the data sent to Defender for Endpoint from Android devices.
5959

60-
Network protection in Microsoft Defender for endpoint is disabled by default. Admins can use the following steps to **configure Network protection in Android devices.**
60+
Network protection in Microsoft Defender for endpoint is enabled by default. Admins can use the following steps to **configure Network protection in Android devices.**
6161

6262
In the Microsoft Intune admin center, navigate to Apps > App configuration policies. Create a new App configuration policy.
6363

defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Exclude files from Microsoft Defender Antivirus scans based on thei
44
ms.service: defender-endpoint
55
ms.subservice: ngp
66
ms.localizationpriority: medium
7-
ms.date: 09/10/2024
7+
ms.date: 11/21/2024
88
author: denisebmsft
99
ms.author: deniseb
1010
ms.topic: conceptual
@@ -57,7 +57,7 @@ The following table lists some examples of exclusions based on file extension an
5757
|Exclusion|Examples|Exclusion list|
5858
|---|---|---|
5959
|Any file with a specific extension|All files with the specified extension, anywhere on the machine. <br/><br/> Valid syntax: `.test` and `test`|Extension exclusions|
60-
|Any file under a specific folder|All files under the `c:\test\sample` folder|File and folder exclusions|
60+
|Any file or folder under a specific folder|All files and folders under the `c:\test\sample` folder|File and folder exclusions|
6161
|A specific file in a specific folder|The file `c:\sample\sample.test` only|File and folder exclusions|
6262
|A specific process|The executable file `c:\test\process.exe`|File and folder exclusions|
6363

defender-endpoint/defender-endpoint-demonstration-cloud-delivered-protection.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,15 @@ ms.collection:
1414
- demo
1515
ms.topic: article
1616
ms.subservice: ngp
17-
ms.date: 10/21/2022
17+
ms.date: 11/22/2024
1818
---
1919

2020
# Cloud-delivered protection demonstration
2121

2222
**Applies to:**
2323

24-
-
25-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2624
- [Microsoft Defender for Business](https://www.microsoft.com/security/business/endpoint-security/microsoft-defender-business)
27-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25+
- [Microsoft Defender for Endpoint Plan 1 and 2](microsoft-defender-endpoint.md)
2826
- [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md)
2927
- [Microsoft Defender for Individuals](https://www.microsoft.com/microsoft-365/microsoft-defender-for-individuals)
3028

@@ -39,7 +37,10 @@ Cloud-delivered protection for Microsoft Defender Antivirus, also referred to as
3937

4038
### Scenario
4139

42-
1. Download the [test file](https://aka.ms/ioavtest). Important: The test file isn't malicious, it's just a harmless file simulating a virus.
40+
1. Download and extract the [zipped folder that contains the test file](https://go.microsoft.com/fwlink/?linkid=2298135). The password is *infected*.
41+
42+
> [!IMPORTANT]
43+
> The test file isn't malicious, it's just a harmless file simulating a virus.
4344
4445
2. If you see file blocked by Microsoft Defender SmartScreen, select on "View downloads" button.
4546

defender-endpoint/evaluate-exploit-protection.md

Lines changed: 69 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- tier2
1616
- mde-asr
1717
search.appverid: met150
18-
ms.date: 11/15/2024
18+
ms.date: 11/21/2024
1919
---
2020

2121
# Evaluate exploit protection
@@ -37,7 +37,7 @@ In audit, you can see how mitigation works for certain apps in a test environmen
3737

3838
Exploit protection mitigations work at a low level in the operating system, and some kinds of software that perform similar low-level operations might have compatibility issues when they're configured to be protected by using exploit protection.
3939

40-
#### What kinds of Software shouldn't be protected by exploit protection?
40+
#### What kinds of software shouldn't be protected by exploit protection?
4141

4242
- Anti-malware and intrusion prevention or detection software
4343
- Debuggers
@@ -55,6 +55,40 @@ Services
5555
- System services
5656
- Network services
5757

58+
## Exploit protection mitigations enabled by default
59+
60+
| Mitigation | Enabled by default |
61+
| -------- | -------- |
62+
| Data Execution Prevention (DEP) | 64-bit and 32-bit applications |
63+
| Validate exception chains (SEHOP) | 64-bit applications |
64+
| Validate heap integrity | 64-bit and 32-bit applications |
65+
66+
## Deprecated "Program settings" mitigations
67+
68+
| “Program settings” mitigations | Reason |
69+
| -------- | -------- |
70+
| Export address filtering (EAF) | Application compatibility issues |
71+
| Import address filtering (IAF) | Application compatibility issues |
72+
| Simulate execution (SimExec) | Replaced with Arbitrary Code Guard (ACG) |
73+
| Validate API invocation (CallerCheck) | Replaced with Arbitrary Code Guard (ACG) |
74+
| Validate stack integrity (StackPivot) | Replaced with Arbitrary Code Guard (ACG) |
75+
76+
## Office application best practices
77+
78+
Instead of using Exploit Protection for Office applications such as Outlook, Word, Excel, PowerPoint, and OneNote, consider using a more modern approach to prevent their misuse: Attack Surface Reduction rules (ASR rules):
79+
80+
- [Block executable content from email client and webmail ](attack-surface-reduction-rules-reference.md#block-executable-content-from-email-client-and-webmail)
81+
- [Block Office applications from creating executable content](attack-surface-reduction-rules-reference.md#block-office-applications-from-creating-executable-content)
82+
- [Block all Office applications from creating child processes](attack-surface-reduction-rules-reference.md#block-all-office-applications-from-creating-child-processes)
83+
- [Block Office communication application from creating child processes](attack-surface-reduction-rules-reference.md#block-office-communication-application-from-creating-child-processes)
84+
- [Block Office applications from injecting code into other processes](attack-surface-reduction-rules-reference.md#block-office-applications-from-injecting-code-into-other-processes)
85+
- [Block execution of potentially obfuscated scripts](attack-surface-reduction-rules-reference.md#block-execution-of-potentially-obfuscated-scripts)
86+
- [Block Win32 API calls from Office macros](attack-surface-reduction-rules-reference.md#block-win32-api-calls-from-office-macros)
87+
88+
For Adobe Reader use the following ASR rule:
89+
90+
[Block Adobe Reader from creating child processes](attack-surface-reduction-rules-reference.md#block-adobe-reader-from-creating-child-processes)
91+
5892
## Application compatibility list
5993

6094
The following table lists specific products that have compatibility issues with the mitigations that are included in exploit protection. You must disable specific incompatible mitigations if you want to protect the product by using exploit protection. Be aware that this list takes into consideration the default settings for the latest versions of the product. Compatibility issues can introduced when you apply certain add-ins or other components to the standard software.
@@ -69,7 +103,7 @@ The following table lists specific products that have compatibility issues with
69103
| DropBox | EAF |
70104
| Excel Power Query, Power View, Power Map and PowerPivot | EAF |
71105
| Google Chrome | EAF+ |
72-
| Immidio Flex+ | Cell 4 |
106+
| Immidio Flex+ | EAF |
73107
| Microsoft Office Web Components (OWC) | System DEP=AlwaysOn |
74108
| Microsoft PowerPoint | EAF |
75109
| Microsoft Teams | EAF+ |
@@ -82,7 +116,38 @@ The following table lists specific products that have compatibility issues with
82116

83117
ǂ EMET mitigations might be incompatible with Oracle Java when they're run by using settings that reserve a large chunk of memory for the virtual machine (that is, by using the -Xms option).
84118

85-
## Enable exploit protection for testing
119+
## Enable exploit protection system settings for testing
120+
121+
These Exploit Protection system settings are enabled by default except for the Mandatory Address Space Layout Randomization (ASLR) on Windows 10 and later, Windows Server 2019 and later, and on Windows Server version 1803 core edition and later.
122+
123+
| System settings | Setting |
124+
| -------- | -------- |
125+
| Control flow guard (CFG) | Use default (On) |
126+
| Data Execution Prevention (DEP) | Use default (On) |
127+
| Force randomization for images (Mandatory ASRL) | Use default (Off) |
128+
| Randomize memory allocations (Bottom-up ASRL) | Use default (On) |
129+
| High-entropy ASRL | Use default (On) |
130+
| Validate exception chains (SEHOP) | Use default (On) |
131+
132+
The xml sample is available below
133+
134+
```
135+
<?xml version="1.0" encoding="UTF-8"?>
136+
<MitigationPolicy>
137+
<SystemConfig>
138+
<DEP Enable="true" EmulateAtlThunks="false" />
139+
<ASLR ForceRelocateImages="false" RequireInfo="false" BottomUp="true" HighEntropy="true" />
140+
<ControlFlowGuard Enable="true" SuppressExports="false" />
141+
<SEHOP Enable="true" TelemetryOnly="false" />
142+
<Heap TerminateOnError="true" />
143+
</SystemConfig>
144+
</MitigationPolicy>
145+
```
146+
147+
## Enable exploit protection program settings for testing
148+
149+
> [!TIP]
150+
> We highly recommend reviewing the modern approach for vulnerability mitigations, which is to use [Attack Surface Reduction rules (ASR rules)](attack-surface-reduction.md).
86151
87152
You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
88153

defender-endpoint/exploit-protection.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.collection:
1616
- tier2
1717
- mde-asr
1818
search.appverid: met150
19-
ms.date: 12/18/2020
19+
ms.date: 11/21/2024
2020
---
2121

2222
# Protect devices from exploits
@@ -60,6 +60,23 @@ DeviceEvents
6060
| where ActionType startswith 'ExploitGuard' and ActionType !contains 'NetworkProtection'
6161
```
6262

63+
### Exploit Protection and advanced hunting
64+
65+
Below are the advanced hunting actiontypes available for Exploit Protection.
66+
67+
| Exploit Protection mitigation name | Exploit Protection - Advanced Hunting - ActionTypes |
68+
|:---|:---|
69+
| Arbitrary code guard | ExploitGuardAcgAudited <br/> ExploitGuardAcgEnforced <br/>|
70+
| Don't allow child processes | ExploitGuardChildProcessAudited <br/> ExploitGuardChildProcessBlocked <br/> |
71+
| Export address filtering (EAF) | ExploitGuardEafViolationAudited <br/> ExploitGuardEafViolationBlocked <br/> |
72+
| Import address filtering (IAF) | ExploitGuardIafViolationAudited <br/> ExploitGuardIafViolationBlocked <br/> |
73+
| Block low integrity images | ExploitGuardLowIntegrityImageAudited <br/> ExploitGuardLowIntegrityImageBlocked <br/> |
74+
| Code integrity guard | ExploitGuardNonMicrosoftSignedAudited <br/> ExploitGuardNonMicrosoftSignedBlocked <br/> |
75+
|• Simulate execution (SimExec)<br/> • Validate API invocation (CallerCheck) <br/> • Validate stack integrity (StackPivot) <br/> | ExploitGuardRopExploitAudited <br/> ExploitGuardRopExploitBlocked <br/> |
76+
| Block remote images | ExploitGuardSharedBinaryAudited <br/> ExploitGuardSharedBinaryBlocked <br/> |
77+
| Disable Win32k system calls | ExploitGuardWin32SystemCallAudited <br/> ExploitGuardWin32SystemCallBlocked <br/>|
78+
79+
6380
## Review exploit protection events in Windows Event Viewer
6481

6582
You can review the Windows event log to see events that are created when exploit protection blocks (or audits) an app:<br/><br/>
@@ -126,7 +143,6 @@ The table in this section indicates the availability and support of native mitig
126143
|Validate image dependency integrity | Yes | No |
127144

128145
> [!NOTE]
129-
130146
> The Advanced ROP mitigations that are available in EMET are superseded by ACG in Windows 10 and Windows 11, which other EMET advanced settings are enabled by default, as part of enabling the anti-ROP mitigations for a process. For more information on how Windows 10 employs existing EMET technology, see the [Mitigation threats by using Windows 10 security features](/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10#understanding-windows-10-in-relation-to-the-enhanced-mitigation-experience-toolkit).
131147
132148
## See also

defender-endpoint/microsoft-defender-core-service-overview.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: deniseb
77
ms.service: defender-endpoint
88
ms.subservice: ngp
99
ms.topic: overview
10-
ms.date: 06/21/2024
10+
ms.date: 11/25/2024
1111
search.appverid: met150
1212
ms.localizationpriority: medium
1313
audience: ITPro
@@ -32,6 +32,8 @@ To enhance your endpoint security experience, Microsoft is releasing the Microso
3232
- Mid April 2024 to Enterprise customers running Windows clients.
3333
- Beginning of July 2024 to U.S. Government customers running Windows clients.
3434

35+
- Mid January 2025 to Enterprise customers running Windows Server.
36+
3537
3. If you're using the Microsoft Defender for Endpoint **streamlined** device connectivity experience, you don't need to add any other URLs.
3638

3739
4. If you're using the Microsoft Defender for Endpoint **standard** device connectivity experience:

0 commit comments

Comments
 (0)