mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #4630 from MicrosoftDocs/master
Publish 01/27/21, 3:30 PM
This commit is contained in:
commit
02ea379dd0
@ -13,7 +13,7 @@ ms.author: deniseb
|
||||
ms.custom: nextgen
|
||||
ms.reviewer: tewchen, pahuijbr, shwjha
|
||||
manager: dansimp
|
||||
ms.date: 01/22/2021
|
||||
ms.date: 01/27/2021
|
||||
ms.technology: mde
|
||||
---
|
||||
|
||||
@ -89,10 +89,12 @@ The table in this section summarizes the functionality and features that are ava
|
||||
| [Threat remediation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus) | Yes | See note <sup>[[4](#fn4)]<sup> | Yes | No |
|
||||
| [Security intelligence updates](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus) | Yes | Yes | Yes | No |
|
||||
|
||||
(<a id="fn3">3</a>) In general, when Microsoft Defender Antivirus is in passive mode, real-time protection does not provide any blocking or enforcement, even though it is enabled and in passive mode. However, if [Microsoft 365 Endpoint data loss prevention](https://docs.microsoft.com/microsoft-365/compliance/endpoint-dlp-learn-about) (Endpoint DLP) is configured and in effect, protective actions are enforced. Endpoint DLP works with real-time protection and behavior monitoring.
|
||||
(<a id="fn3">3</a>) In general, when Microsoft Defender Antivirus is in passive mode, real-time protection does not provide any blocking or enforcement, even though it is enabled and in passive mode.
|
||||
|
||||
(<a id="fn4">4</a>) When Microsoft Defender Antivirus is in passive mode, threat remediation features are active only during scheduled or on-demand scans.
|
||||
|
||||
> [!NOTE]
|
||||
> [Microsoft 365 Endpoint data loss prevention](https://docs.microsoft.com/microsoft-365/compliance/endpoint-dlp-learn-about) protection continues to operate normally when Microsoft Defender Antivirus is in active or passive mode.
|
||||
|
||||
## Keep the following points in mind
|
||||
|
||||
|
@ -65,18 +65,18 @@ Before you classify or suppress an alert, determine whether the alert is accurat
|
||||
3. Select an alert to more details about the alert. (See [Review alerts](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/review-alerts).)
|
||||
4. Depending on the alert status, take the steps described in the following table:
|
||||
|
||||
| Alert status | What to do |
|
||||
|:---|:---|
|
||||
| The alert is accurate | Assign the alert, and then [investigate it](investigate-alerts.md) further. |
|
||||
| The alert is a false positive | 1. [Classify the alert](#classify-an-alert) as a false positive. <br/>2. [Suppress the alert](#suppress-an-alert). <br/> 3. [Create an indicator](#indicators-for-microsoft-defender-for-endpoint) for Microsoft Defender for Endpoint. <br/> 4. [Submit a file to Microsoft for analysis](#part-4-submit-a-file-for-analysis). |
|
||||
| The alert is accurate, but benign (unimportant) | [Classify the alert](#classify-an-alert) as a true positive, and then [suppress the alert](#suppress-an-alert). |
|
||||
| Alert status | What to do |
|
||||
|:---|:---|
|
||||
| The alert is accurate | Assign the alert, and then [investigate it](investigate-alerts.md) further. |
|
||||
| The alert is a false positive | 1. [Classify the alert](#classify-an-alert) as a false positive. <br/>2. [Suppress the alert](#suppress-an-alert). <br/> 3. [Create an indicator](#indicators-for-microsoft-defender-for-endpoint) for Microsoft Defender for Endpoint. <br/> 4. [Submit a file to Microsoft for analysis](#part-4-submit-a-file-for-analysis). |
|
||||
| The alert is accurate, but benign (unimportant) | [Classify the alert](#classify-an-alert) as a true positive, and then [suppress the alert](#suppress-an-alert). |
|
||||
|
||||
### Classify an alert
|
||||
|
||||
Alerts can be classified as false positives or true positives in the Microsoft Defender Security Center. Classifying alerts helps train Microsoft Defender for Endpoint so that, over time, you'll see more true alerts and fewer false alerts.
|
||||
|
||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
||||
2. Select **Alerts queue**, and then select an alert that is a false positive.
|
||||
2. Select **Alerts queue**, and then select an alert.
|
||||
3. For the selected alert, select **Actions** > **Manage alert**. A flyout pane opens.
|
||||
4. In the **Manage alert** section, select either **True alert** or **False alert**. (Use **False alert** to classify a false positive.)
|
||||
|
||||
|
@ -30,6 +30,14 @@ ms.technology: mde
|
||||
> [!IMPORTANT]
|
||||
> Support for macOS 10.13 (High Sierra) will be discontinued on February 15th, 2021.
|
||||
|
||||
## 101.19.48
|
||||
|
||||
> [!NOTE]
|
||||
> The old command-line tool syntax has been deprecated with this release. For information on the new syntax, see [Resources](mac-resources.md#configuring-from-the-command-line).
|
||||
|
||||
- Added a new command-line switch to disable the network extension: `mdatp system-extension network-filter disable`. This command can be useful to troubleshoot networking issues that could be related to Microsoft Defender for Endpoint for Mac
|
||||
- Performance improvements & bug fixes
|
||||
|
||||
## 101.19.21
|
||||
|
||||
- Bug fixes
|
||||
|
Loading…
x
Reference in New Issue
Block a user