Skip to content

Unexpected installation of Microsoft Defender (wdavdaemon) on GitHub-hosted Ubuntu runners #12656

@varunsh-coder

Description

@varunsh-coder

Description

We've observed network calls from the wdavdaemon process to various Microsoft Defender endpoints (*.microsoft.com) on GitHub-hosted Ubuntu runners. These observations were made by StepSecurity Harden Runner across multiple workflow runs, and the behavior suggests that Microsoft Defender is occasionally being installed or activated in specific instances, though this doesn't happen consistently.

Examples

Here is one example:

GitHub Action Run: PicnicSupermarket/error-prone-support Run #16319862376

Observed Network Calls:
x.cp.wd.microsoft.com
global.endpoint.security.microsoft.com
wdcp.microsoft.com

Full network details available here: StepSecurity Insights

Platforms affected

  • Azure DevOps
  • GitHub Actions - Standard Runners
  • GitHub Actions - Larger Runners

Runner images affected

  • Ubuntu 22.04
  • Ubuntu 24.04
  • macOS 13
  • macOS 13 Arm64
  • macOS 14
  • macOS 14 Arm64
  • macOS 15
  • macOS 15 Arm64
  • Windows Server 2019
  • Windows Server 2022
  • Windows Server 2025

Image version and build link

https://github.com/PicnicSupermarket/error-prone-support/actions/runs/16319862376/job/46094587540#step:1:14

Is it regression?

Not sure

Expected behavior

Defender was not installed on GitHub-hosted Ubuntu runners earlier and there was no announcement that it would be installed. So expected behavior is for it to not be installed.

Actual behavior

Defender is installed on some instances of GitHub-hosted Ubuntu runners

Repro steps

Cannot repro it in every build. Observed it across multiple workflow runs using https://github.com/step-security/harden-runner

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions