Skip to content

Commit ff0389b

Browse files
authored
Merge branch 'main' into docs-editor/enable-network-protection-1747412847
2 parents 4aa9081 + 4c570fe commit ff0389b

20 files changed

+220
-121
lines changed

ATPDocs/deploy/remote-calls-sam.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,18 +8,11 @@ ms.topic: how-to
88
# Configure SAM-R to enable lateral movement path detection in Microsoft Defender for Identity
99

1010
> [!IMPORTANT]
11-
> Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. This change will happen automatically by the specified dates. No admin action is required.
11+
> The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. The change will occur automatically by the specified date, and no administrative action is required.
1212
>
1313
1414
Microsoft Defender for Identity mapping for [potential lateral movement paths](/defender-for-identity/understand-lateral-movement-paths) relies on queries that identify local admins on specific machines. These queries are performed with the SAM-R protocol, using the Defender for Identity [Directory Service account](directory-service-accounts.md) you configured.
1515

16-
> [!NOTE]
17-
> This feature can potentially be exploited by an adversary to obtain the NTLM hash of the DSA account due to a Windows limitation in the SAM-R calls that allows downgrading from Kerberos to NTLM.
18-
> The new Defender for Identity sensor (version 3.x) is not affected by this issue as it uses different detection methods.
19-
>
20-
> It is recommended to use a [low privileged DSA account](directory-service-accounts.md#grant-required-dsa-permissions). You can also [contact support](../support.md) to open a case and request to completely disable the [Lateral Movement Paths](../security-assessment-riskiest-lmp.md) data collection capability.
21-
> Please note that this will result in reduced data available for the [attack path feature in Exposure Management](/security-exposure-management/review-attack-paths).
22-
2316
This article describes the configuration changes required to allow the Defender for Identity Directory Services Account (DSA) to perform the SAM-R queries.
2417

2518
> [!TIP]

ATPDocs/integrate-microsoft-and-pam-services.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,4 +56,6 @@ For more information, see:
5656

5757
[How to integrate Defender for Identity with Delinea](https://docs.delinea.com/online-help/integrations/microsoft/mdi/integrating-mdi.htm)
5858

59-
[How to integrate Defender for Identity with CyberArk](https://community.cyberark.com/marketplace/s/#a35Ht0000018sDVIAY-a39Ht000004GLaEIAW)
59+
[How to integrate Defender for Identity with CyberArk](https://community.cyberark.com/marketplace/s/#a35Ht0000018sDVIAY-a39Ht000004GLaEIAW)
60+
61+
[How to integrate Defender for Identity with BeyondTrust](https://docs.beyondtrust.com/insights/docs/microsoft-defender)

ATPDocs/understand-lateral-movement-paths.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,13 @@ ms.topic: conceptual
77

88
# Understand and investigate Lateral Movement Paths (LMPs) with Microsoft Defender for Identity
99

10+
> [!IMPORTANT]
11+
> The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. The change will occur automatically by the specified date, and no administrative action is required.
12+
>
13+
1014
Lateral movement is when an attacker uses non-sensitive accounts to gain access to sensitive accounts throughout your network. Lateral movement is used by attackers to identify and gain access to the sensitive accounts and machines in your network that share stored sign-in credentials in accounts, groups and machines. Once an attacker makes successful lateral moves towards your key targets, the attacker can also take advantage and gain access to your domain controllers. Lateral movement attacks are carried out using many of the methods described in [Microsoft Defender for Identity Security Alerts](alerts-overview.md).
1115

12-
A key component of Microsoft Defender for Identity's security insights are Lateral Movement Paths or LMPs. Defender for Identity LMPs are visual guides that help you quickly understand and identify exactly how attackers can move laterally inside your network. The purpose of lateral movements within the cyber-attack kill chain are for attackers to gain and compromise your sensitive accounts using non-sensitive accounts. Compromising your sensitive accounts gets them another step closer to their ultimate goal, domain dominance. To stop these attacks from being successful, Defender for Identity LMPs give you easy to interpret, direct visual guidance on your most vulnerable, sensitive accounts. LMPs help you mitigate and prevent those risks in the future, and close attacker access before they achieve domain dominance.
16+
A key component of Microsoft Defender for Identity's security insights is Lateral Movement Paths or LMPs. Defender for Identity LMPs are visual guides that help you quickly understand and identify exactly how attackers can move laterally inside your network. The purpose of lateral movements within the cyber-attack kill chain are for attackers to gain and compromise your sensitive accounts using non-sensitive accounts. Compromising your sensitive accounts gets them another step closer to their ultimate goal, domain dominance. To stop these attacks from being successful, Defender for Identity LMPs give you easy to interpret, direct visual guidance on your most vulnerable, sensitive accounts. LMPs help you mitigate and prevent those risks in the future, and close attacker access before they achieve domain dominance.
1317

1418
For example:
1519

ATPDocs/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ For updates about versions and features released six months ago or earlier, see
2525
## May 2025
2626

2727
### Local administrators collection (using SAM-R queries) feature will be disabled
28-
Remote collection of local administrators' group members on endpoints (using SAM-R queries) feature in Microsoft Defender for Identity will be disabled by mid-May 2025. The details collected are used to build the potential lateral movement paths map. Alternative methods are currently being explored. This change will happen automatically by the specified dates. No admin action is required.
28+
The remote collection of local administrators group members from endpoints using SAM-R queries in Microsoft Defender for Identity will be disabled by mid-May 2025. This data is currently used to build potential lateral movement path maps, which will no longer be updated after this change. An alternative method is being explored. The change will occur automatically by the specified date, and no administrative action is required.
2929

3030
### New Health Issue
3131

defender-endpoint/behavior-monitor-macos.md

Lines changed: 40 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
manager: deniseb
77
ms.service: defender-endpoint
88
ms.topic: overview
9-
ms.date: 01/02/2025
9+
ms.date: 05/15/2025
1010
ms.subservice: ngp
1111
audience: ITPro
1212
ms.collection:
@@ -116,18 +116,7 @@ The following sections describe each of these methods in detail.
116116
<dict>
117117
<key>behaviorMonitoring</key>
118118
<string>enabled</string>
119-
<key>behaviorMonitoringConfigurations</key>
120-
<dict>
121-
<key>blockExecution</key>
122-
<string>enabled</string>
123-
<key>notifyForks</key>
124-
<string>enabled</string>
125-
<key>forwardRtpToBm</key>
126-
<string>enabled</string>
127-
<key>avoidOpenCache</key>
128-
<string>enabled</string>
129-
</dict>
130-
</dict>
119+
</dict>
131120
</dict>
132121
</array>
133122
</dict>
@@ -162,22 +151,11 @@ The following sections describe each of these methods in detail.
162151
<key>behaviorMonitoring</key>
163152
<string>enabled</string>
164153
</dict>
165-
<key>features</key>
166-
<dict>
167-
<key>behaviorMonitoring</key>
168-
<string>enabled</string>
169-
<key>behaviorMonitoringConfigurations</key>
170-
<dict>
171-
<key>blockExecution</key>
172-
<string>enabled</string>
173-
<key>notifyForks</key>
174-
<string>enabled</string>
175-
<key>forwardRtpToBm</key>
176-
<string>enabled</string>
177-
<key>avoidOpenCache</key>
178-
<string>enabled</string>
179-
</dict>
180-
</dict>
154+
<key>features</key>
155+
<dict>
156+
<key>behaviorMonitoring</key>
157+
<string>enabled</string>
158+
</dict>
181159
</dict>
182160
</plist>
183161
```
@@ -219,14 +197,42 @@ sudo mdatp threat list
219197

220198
```
221199

222-
### Frequently Asked Questions (FAQ)
200+
### Frequently asked questions (FAQ)
201+
202+
#### What if I see an increase in CPU utilization or memory utilization?
203+
204+
Disable behavior monitoring and see if the issue goes away. If the issue doesn't go away, it isn't related to behavior monitoring.
205+
206+
If the issue goes away, re-enable behavior monitoring and use behavior monitoring statistics to identify and exclude processes generating excessive events:
207+
208+
```bash
209+
sudo mdatp config behavior-monitoring-statistics --value enabled
210+
```
211+
212+
Repro the issue and then execute:
213+
214+
```bash
215+
sudo mdatp diagnostic behavior-monitoring-statistics --sort
216+
```
217+
218+
This command lists processes running on the machine which are reporting behavior monitoring events to the engine process. The more events, the more CPU/memory impact that process has.
223219

224-
#### What if I see an increase in cpu utilization or memory utilization?
220+
Exclude identified processes using:
225221

226-
Disable behavior monitoring and see if the issue goes away.
222+
```bash
223+
sudo mdatp exclusion process add --path <path to process with lots of events>
224+
```
225+
226+
> [!IMPORTANT]
227+
> Please verify the reliability of the processes being excluded. Excluding these processes will prevent all events from being sent to behavior monitoring and from undergoing content scanning. However, EDR will continue to receive events from these processes. It is important to note that this mitigation is unlikely to reduce CPU usage of the `wdavdaemon` or `wdavdaemon_enterprise` processes, but may affect `wdavdaemon_unprivileged`. If the other two processes are also experiencing high CPU usage, behavior monitoring may not be the sole cause, and contacting Microsoft support is recommended.
228+
229+
Once done, disable behavior monitoring statistics:
230+
231+
```bash
232+
sudo mdatp config behavior-monitoring-statistics --value disabled
233+
```
227234

228-
- If the issue doesn't go away, it isn't related to behavior monitoring.
229-
- If the issue goes away, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
235+
If the issue persists, download the [XMDE Client Analyzer](https://aka.ms/XMDEClientAnalyzer), and then contact Microsoft support.
230236

231237
## Network real-time inspection for macOS
232238

defender-endpoint/indicator-file.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 03/04/2025
9+
ms.date: 05/16/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -58,7 +58,7 @@ Understand the following prerequisites before you create indicators for files:
5858
- This feature is available if your organization uses [Microsoft Defender Antivirus](microsoft-defender-antivirus-windows.md) (in active mode)
5959
- The antimalware client version must be `4.18.1901.x` or later. See [Monthly platform and engine versions](microsoft-defender-antivirus-updates.md#platform-and-engine-releases)
6060
- This feature is supported on devices running Windows 10, version 1703 or later, Windows 11, Windows Server 2012 R2, Windows Server 2016 or later, Windows Server 2019, Windows Server 2022, and Windows Server 2025.
61-
- File hash computation is enabled, by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\` to **Enabled**
61+
- File hash computation is enabled by setting `Computer Configuration\Administrative Templates\Windows Components\Microsoft Defender Antivirus\MpEngine\Enable File Hash Computation` to **Enabled**. Or, you can run the following PowerShell command: `Set-MpPreference -EnableFileHashComputation $true`
6262

6363
> [!NOTE]
6464
> File indicators support portable executable (PE) files, including `.exe` and `.dll` files only.
@@ -91,9 +91,6 @@ Understand the following prerequisites before you create indicators for files:
9191
- Action: Specify the action to be taken and provide a description.
9292
- Scope: Define the scope of the device group (scoping isn't available in [Defender for Business](/defender-business/mdb-overview)).
9393

94-
> [!NOTE]
95-
> Device Group creation is supported in both Defender for Endpoint Plan 1 and Plan 2
96-
9794
5. Review the details in the Summary tab, then select **Save**.
9895

9996
## Create a contextual indicator from the file details page
@@ -124,7 +121,7 @@ The current supported actions for file IOC are allow, audit and block, and remed
124121
:::image type="content" source="media/indicators-generate-alert.png" alt-text="The Alert settings for file indicators" lightbox="media/indicators-generate-alert.png":::
125122

126123
> [!IMPORTANT]
127-
> - Typically, file blocks are enforced and removed within15 minutes, average 30 minutes but can take upwards of 2 hours.
124+
> - Typically, file blocks are enforced and removed within 15 minutes, average 30 minutes but can take upwards of 2 hours.
128125
> - If there are conflicting file IoC policies with the same enforcement type and target, the policy of the more secure hash will be applied. An SHA-256 file hash IoC policy will win over an SHA-1 file hash
129126
IoC policy, which will win over an MD5 file hash IoC policy if the hash types define the same file. This is always true regardless of the device group.
130127
> - In all other cases, if conflicting file IoC policies with the same enforcement target are applied to all devices and to the device's group, then for a device, the policy in the device group will win.
@@ -147,7 +144,7 @@ Timestamp > ago(30d)
147144

148145
For more information about advanced hunting, see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
149146

150-
Here are other thread names that can be used in the sample query:
147+
Here are other threat names that can be used in the sample query:
151148

152149
Files:
153150

@@ -201,9 +198,13 @@ Microsoft Defender Vulnerability Management's block vulnerable application featu
201198
## See also
202199

203200
- [Create indicators](indicators-overview.md)
201+
204202
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
203+
205204
- [Create indicators based on certificates](indicator-certificates.md)
205+
206206
- [Manage indicators](indicator-manage.md)
207+
207208
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)
208209

209210
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

defender-endpoint/linux-whatsnew.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: ewalsh
66
author: emmwalshh
77
ms.reviewer: kumasumit, gopkr; mevasude
88
ms.localizationpriority: medium
9-
ms.date: 05/13/2025
9+
ms.date: 05/19/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -101,17 +101,17 @@ What's new
101101

102102
Known Issues
103103

104-
- There's a known issue where MDE is deleting the configuration file located at /etc/system/system/mdatp.service.d on each service start. As a workaround, customers can use the Immutable attribute that prevents the files from being modified or deleted.
104+
- There's a known issue where MDE is deleting the configuration file located at /etc/systemd/system/mdatp.service.d on each service start. As a workaround, customers can use the Immutable attribute that prevents the files from being modified or deleted.
105105

106106
To set the file to be unmodifiable, execute the following command:
107-
107+
108108
```bash
109109

110110
sudo chattr +i /etc/systemd/system/mdatp.service.d/[file name]
111111
```
112112

113-
This command makes the file unchangeable. T If you need to restore modification permissions, use the following command:
114-
113+
This command makes the file unchangeable. If you need to restore modification permissions, use the following command:
114+
115115
```bash
116116

117117
sudo chattr -i /etc/systemd/system/mdatp.service.d/[file name]

defender-endpoint/whats-new-in-microsoft-defender-endpoint.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: ewalsh
77
author: emmwalshh
88
ms.reviewer: noamhadash, pahuijbr, yongrhee
99
ms.localizationpriority: medium
10-
ms.date: 05/14/2025
10+
ms.date: 05/19/2025
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -46,10 +46,6 @@ For more information on what's new with other Microsoft Defender security produc
4646
- [What's new in Microsoft Defender for Cloud Apps](/cloud-app-security/release-notes)
4747
- [What's new in Microsoft Defender Vulnerability Management](/defender-vulnerability-management/whats-new-in-microsoft-defender-vulnerability-management)
4848

49-
## May 2025
50-
51-
- (GA) New setting for **"Allow Network Protection On Win Server"** to be able to manage Network Protection for Windows Server 2019 and later in Microsoft Defender for Endpoint Security Settings Management and Microsoft Intune. See [Turn on network protection](/defender-endpoint/enable-network-protection).
52-
5349
## April 2025
5450

5551
- (Preview) **Contain IP addresses of undiscovered devices**: Containing IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint is now in preview. Containing an IP address prevents attackers from spreading attacks to other non-compromised devices. See [Contain IP addresses of undiscovered devices](respond-machine-alerts.md#contain-ip-addresses-of-undiscovered-devices) for more information.

0 commit comments

Comments
 (0)