mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 13:23:36 +00:00
Update defender-endpoint-false-positives-negatives.md
This commit is contained in:
@ -11,7 +11,7 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: deniseb
|
||||
author: denisebmsft
|
||||
ms.date: 01/26/2021
|
||||
ms.date: 01/27/2021
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
@ -52,7 +52,7 @@ And, you can [get help if you still have issues with false positives/negatives](
|
||||
|
||||
## Part 1: Review and classify alerts
|
||||
|
||||
If you see an alert that was triggered because something was detected as malicious or suspicious that should not have been, you can suppress the alert for that entity. You can also suppress alerts that are not necessarily false positives, but are unimportant. We recommend that you classify alerts as well.
|
||||
If you see an [alert](alerts.md) that was triggered because something was detected as malicious or suspicious that should not have been, you can suppress the alert for that entity. You can also suppress alerts that are not necessarily false positives, but are unimportant. We recommend that you classify alerts as well.
|
||||
|
||||
Managing your alerts and classifying true/false positives helps to train your threat protection solution and can reduce the number of false positives or false negatives over time. Taking these steps also helps reduce noise in your security operations dashboard so that your security team can focus on higher priority work items.
|
||||
|
||||
@ -73,7 +73,7 @@ Before you classify or suppress an alert, determine whether the alert is accurat
|
||||
|
||||
### Classify an alert
|
||||
|
||||
You can classify an alert as a false positive or a true positive in the Microsoft Defender Security Center, in the **Alerts queue**. Classifying alerts helps train Microsoft Defender for Endpoint so that, over time, you'll see more true alerts and fewer false alerts.
|
||||
Alerts can be classified as false positives or true positives in the Microsoft Defender Security Center. Classifying alerts helps train Microsoft Defender for Endpoint so that, over time, you'll see more true alerts and fewer false alerts.
|
||||
|
||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
||||
2. Select **Alerts queue**, and then select an alert that is a false positive.
|
||||
@ -98,7 +98,7 @@ If you have alerts that are either false positives or that are true positives bu
|
||||
|
||||
## Part 2: Review remediation actions
|
||||
|
||||
[Remediation actions](manage-auto-investigation.md#remediation-actions), such as sending a file to quarantine or stopping a process, can be taken on entities that are detected as threats. Several types of remediation actions can occur automatically through automated investigation and Microsoft Defender Antivirus. Examples of such actions include:
|
||||
[Remediation actions](manage-auto-investigation.md#remediation-actions), such as sending a file to quarantine or stopping a process, are taken on entities (such as files) that are detected as threats. Several types of remediation actions occur automatically through automated investigation and Microsoft Defender Antivirus:
|
||||
- Quarantine a file
|
||||
- Remove a registry key
|
||||
- Kill a process
|
||||
@ -106,25 +106,25 @@ If you have alerts that are either false positives or that are true positives bu
|
||||
- Disable a driver
|
||||
- Remove a scheduled task
|
||||
|
||||
Other actions, such as starting an antivirus scan or collecting an investigation package, can occur through [Live Response](live-response.md). Those actions cannot be undone.
|
||||
Other actions, such as starting an antivirus scan or collecting an investigation package, occur manually or through [Live Response](live-response.md). Actions taken through Live Response cannot be undone.
|
||||
|
||||
After you have reviewed your alerts, your next step is to [review remediation actions](manage-auto-investigation.md). If any actions were taken as a result of false positives, you can undo most kinds of remediation actions. Specifically, you can:
|
||||
- [undo one action at a time](#undo-an-action);
|
||||
- [undo multiple actions at one time](#undo-multiple-actions-at-one-time); and
|
||||
- [remove a file from quarantine across multiple devices](#remove-a-file-from-quarantine-across-multiple-devices).
|
||||
- [Undo one action at a time](#undo-an-action);
|
||||
- [Undo multiple actions at one time](#undo-multiple-actions-at-one-time); and
|
||||
- [Remove a file from quarantine across multiple devices](#remove-a-file-from-quarantine-across-multiple-devices).
|
||||
|
||||
When you're done reviewing and undoing actions that were taken as a result of false positives, proceed to [review or define exclusions](#part-3-review-or-define-exclusions).
|
||||
|
||||
### Review completed actions
|
||||
|
||||

|
||||
|
||||
1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in.
|
||||
2. Select the **History** tab to view a list of actions that were taken. <br/>
|
||||
2. Select the **History** tab to view a list of actions that were taken.
|
||||
3. Select an item to view more details about the remediation action that was taken.
|
||||
|
||||
### Undo an action
|
||||
|
||||
If you find that a remediation action was taken automatically on an entity that is not actually a threat, you can undo the action. You can undo most remediation actions.
|
||||
|
||||
1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in.
|
||||
2. On the **History** tab, select an action that you want to undo.
|
||||
3. In the flyout pane, select **Undo**. If the action cannot be undone with this method, you will not see an **Undo** button. (To learn more, see [Undo completed actions](manage-auto-investigation.md#undo-completed-actions).)
|
||||
@ -137,14 +137,15 @@ If you find that a remediation action was taken automatically on an entity that
|
||||
|
||||
### Remove a file from quarantine across multiple devices
|
||||
|
||||

|
||||
|
||||
1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in.
|
||||
2. On the **History** tab, select a file that has the Action type **Quarantine file**.
|
||||
3. In the pane on the right side of the screen, select **Apply to X more instances of this file**, and then select **Undo**. <br/>
|
||||
|
||||
3. In the pane on the right side of the screen, select **Apply to X more instances of this file**, and then select **Undo**.
|
||||
|
||||
## Part 3: Review or define exclusions
|
||||
|
||||
An exclusion is an entity that you specify as an exception to remediation actions. The excluded entity might still get detected, but no remediation actions are taken on that entity. That is, the detected file or process won’t be stopped, sent to quarantine, removed, or otherwise changed by Microsoft Defender for Endpoint.
|
||||
An exclusion is an entity, such as a file or URL, that you specify as an exception to remediation actions. The excluded entity can still get detected, but no remediation actions are taken on that entity. That is, the detected file or process won’t be stopped, sent to quarantine, removed, or otherwise changed by Microsoft Defender for Endpoint.
|
||||
|
||||
To define exclusions across Microsoft Defender for Endpoint, perform the following tasks:
|
||||
- [Define exclusions for Microsoft Defender Antivirus](#exclusions-for-microsoft-defender-antivirus)
|
||||
@ -157,7 +158,7 @@ The procedures in this section describe how to define exclusions and indicators.
|
||||
|
||||
### Exclusions for Microsoft Defender Antivirus
|
||||
|
||||
In general, you should not need to define exclusions for Microsoft Defender Antivirus. Make sure that you define exclusions sparingly, and that you only include the files, folders, processes, and process-opened files that are resulting in false positives. In addition, make sure to review your defined exclusions regularly. We recommend using Microsoft Endpoint Manager to define or edit your antivirus exclusions; however, you can use other methods, such as Group Policy as well.
|
||||
In general, you should not need to define exclusions for Microsoft Defender Antivirus. Make sure that you define exclusions sparingly, and that you only include the files, folders, processes, and process-opened files that are resulting in false positives. In addition, make sure to review your defined exclusions regularly. We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview) to define or edit your antivirus exclusions; however, you can use other methods, such as [Group Policy](https://docs.microsoft.com/azure/active-directory-domain-services/manage-group-policy) (see [Manage Microsoft Defender for Endpoint](manage-atp-post-migration.md)).
|
||||
|
||||
> [!TIP]
|
||||
> Need help with antivirus exclusions? See [Configure and validate exclusions for Microsoft Defender Antivirus scans](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus).
|
||||
@ -186,13 +187,13 @@ In general, you should not need to define exclusions for Microsoft Defender Anti
|
||||
|
||||
[Indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators) (specifically, indicators of compromise, or IoCs) enable your security operations team to define the detection, prevention, and exclusion of entities. For example, you can specify certain files to be omitted from scans and remediation actions in Microsoft Defender for Endpoint. Or, indicators can be used to generate alerts for certain files, IP addresses, or URLs.
|
||||
|
||||
To specify entities as exclusions for Microsoft Defender for Endpoint, you can create "allow" indicators for those entities. Such "allow" indicators in Microsoft Defender for Endpoint apply to the following capabilities:
|
||||
To specify entities as exclusions for Microsoft Defender for Endpoint, create "allow" indicators for those entities. Such "allow" indicators in Microsoft Defender for Endpoint apply to the following capabilities:
|
||||
|
||||
- [Next-generation protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10)
|
||||
- [Endpoint detection and response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response)
|
||||
- [Automated investigation & remediation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations)
|
||||
|
||||
You can create indicators for:
|
||||
"Allow" indicators can be created for:
|
||||
|
||||
- [Files](#indicators-for-files)
|
||||
- [IP addresses, URLs, and domains](#indicators-for-ip-addresses-urls-or-domains)
|
||||
@ -205,7 +206,7 @@ You can create indicators for:
|
||||
When you [create an "allow" indicator for a file, such as an executable](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-file), it helps prevent files that your organization is using from being blocked. Files can include portable executable (PE) files, such as `.exe` and `.dll` files.
|
||||
|
||||
Before you create indicators for files, make sure the following requirements are met:
|
||||
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (See [Manage cloud-based protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).)
|
||||
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see [Manage cloud-based protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus))
|
||||
- Antimalware client version is 4.18.1901.x or later
|
||||
- Devices are running Windows 10, version 1703 or later; Windows Server 2016; or Windows Server 2019
|
||||
- The [Block or allow feature is turned on](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-features)
|
||||
@ -215,28 +216,28 @@ Before you create indicators for files, make sure the following requirements are
|
||||
When you [create an "allow" indicator for an IP address, URL, or domain](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain), it helps prevent the sites or IP addresses your organization uses from being blocked.
|
||||
|
||||
Before you create indicators for IP addresses, URLs, or domains, make sure the following requirements are met:
|
||||
- Network protection in Defender for Endpoint is enabled in block mode (See [Enable network protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection))
|
||||
- Network protection in Defender for Endpoint is enabled in block mode (see [Enable network protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection))
|
||||
- Antimalware client version is 4.18.1906.x or later
|
||||
- Devices are running Windows 10, version 1709, or later
|
||||
|
||||
Custom network indicators are turned on in the Microsoft Defender Security Center (See [Advanced features](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-features).)
|
||||
Custom network indicators are turned on in the Microsoft Defender Security Center (see [Advanced features](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-features))
|
||||
|
||||
#### Indicators for application certificates
|
||||
|
||||
When you [create an "allow" indicator for an application certificate](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates), it helps prevent applications, such as internally developed applications, that your organization uses from being blocked. `.CER` or `.PEM` file extensions are supported.
|
||||
|
||||
Before you create indicators for application certificates, make sure the following requirements are met:
|
||||
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (See [Manage cloud-based protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).)
|
||||
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see [Manage cloud-based protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus))
|
||||
- Antimalware client version is 4.18.1901.x or later
|
||||
- Devices are running Windows 10, version 1703 or later; Windows Server 2016; or Windows Server 2019
|
||||
- Virus and threat protection definitions are up to date
|
||||
|
||||
> [!TIP]
|
||||
> When you create indicators, you can define them one by one or import multiple items at once. Keep in mind there's a limit of 15,000 indicators you can have in a single tenant. And, you might need to gather certain details first, such as file hash information. Make sure to review the prerequisites before you [create indicators](manage-indicators.md).
|
||||
> When you create indicators, you can define them one by one, or import multiple items at once. Keep in mind there's a limit of 15,000 indicators for a single tenant. And, you might need to gather certain details first, such as file hash information. Make sure to review the prerequisites before you [create indicators](manage-indicators.md).
|
||||
|
||||
## Part 4: Submit a file for analysis
|
||||
|
||||
You can submit entities, such as files and fileless detections, to Microsoft for analysis. Microsoft security researchers analyze all submissions. When you sign in at the submission site, you can track your submissions.
|
||||
You can submit entities, such as files and fileless detections, to Microsoft for analysis. Microsoft security researchers analyze all submissions, and . When you sign in at the submission site, you can track your submissions.
|
||||
|
||||
### Submit a file for analysis
|
||||
|
||||
|
Reference in New Issue
Block a user