-
Notifications
You must be signed in to change notification settings - Fork 3.4k
Description
Description
We've observed network calls from the wdavdaemon process to various Microsoft Defender endpoints (*.microsoft.com) on GitHub-hosted Ubuntu runners. These observations were made by StepSecurity Harden Runner across multiple workflow runs, and the behavior suggests that Microsoft Defender is occasionally being installed or activated in specific instances, though this doesn't happen consistently.
Examples
Here is one example:
GitHub Action Run: PicnicSupermarket/error-prone-support Run #16319862376
Observed Network Calls:
x.cp.wd.microsoft.com
global.endpoint.security.microsoft.com
wdcp.microsoft.com
Full network details available here: StepSecurity Insights
Platforms affected
- Azure DevOps
- GitHub Actions - Standard Runners
- GitHub Actions - Larger Runners
Runner images affected
- Ubuntu 22.04
- Ubuntu 24.04
- macOS 13
- macOS 13 Arm64
- macOS 14
- macOS 14 Arm64
- macOS 15
- macOS 15 Arm64
- Windows Server 2019
- Windows Server 2022
- Windows Server 2025
Image version and build link
Is it regression?
Not sure
Expected behavior
Defender was not installed on GitHub-hosted Ubuntu runners earlier and there was no announcement that it would be installed. So expected behavior is for it to not be installed.
Actual behavior
Defender is installed on some instances of GitHub-hosted Ubuntu runners
Repro steps
Cannot repro it in every build. Observed it across multiple workflow runs using https://github.com/step-security/harden-runner