mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 07:17:24 +00:00
Update symantec-to-microsoft-defender-atp-part2.md
This commit is contained in:
parent
cb13504152
commit
e0bbdecc9a
@ -55,8 +55,7 @@ Recommendation:
|
|||||||
Needs to be set to 0 (hex) which means it’s enabled in order to work.
|
Needs to be set to 0 (hex) which means it’s enabled in order to work.
|
||||||
Requires a reboot.
|
Requires a reboot.
|
||||||
|
|
||||||
<Future item: Add a CMPivot query that provides the results of the entry>
|
Future item: Add a CMPivot query that provides the results of the entry
|
||||||
|
|
||||||
|
|
||||||
Reference(s):
|
Reference(s):
|
||||||
Use Group Policy settings to configure and manage Windows Defender Antivirus
|
Use Group Policy settings to configure and manage Windows Defender Antivirus
|
||||||
@ -69,7 +68,6 @@ https://docs.microsoft.com/en-us/intune-user-help/turn-on-defender-windows
|
|||||||
|
|
||||||
*This is from the Word doc - needs revision and clarification*
|
*This is from the Word doc - needs revision and clarification*
|
||||||
|
|
||||||
|
|
||||||
Add Microsoft Defender ATP EDR to the exclusion list for Symantec (or any other security products).
|
Add Microsoft Defender ATP EDR to the exclusion list for Symantec (or any other security products).
|
||||||
|
|
||||||
Adding MDATP (EDR) to the exclusion list to SEP/Trendmicro or any other security product and EDR (RSA Netwitness)
|
Adding MDATP (EDR) to the exclusion list to SEP/Trendmicro or any other security product and EDR (RSA Netwitness)
|
||||||
@ -99,6 +97,9 @@ Note: Where Monitoring Host Temporary Files 6\45 can be different numbered subf
|
|||||||
|
|
||||||
## Add Symantec to your Microsoft Defender ATP EDR exclusion list
|
## Add Symantec to your Microsoft Defender ATP EDR exclusion list
|
||||||
|
|
||||||
|
*This is from the Word doc - needs revision and clarification*
|
||||||
|
|
||||||
|
|
||||||
Add Symantec and your other security solutions to the Microsoft Defender ATP EDR exclusion list.
|
Add Symantec and your other security solutions to the Microsoft Defender ATP EDR exclusion list.
|
||||||
|
|
||||||
For MDATP (AV and EDR), there are two portions to ‘exclude’ 3rd party security products.
|
For MDATP (AV and EDR), there are two portions to ‘exclude’ 3rd party security products.
|
||||||
@ -109,7 +110,109 @@ Process exclusion vs Path exclusion...
|
|||||||
|
|
||||||
2. And add in EDR, go to Indicator – File Hash.
|
2. And add in EDR, go to Indicator – File Hash.
|
||||||
|
|
||||||
|
### MDAV/SCEP
|
||||||
|
|
||||||
|
#### Option 1: In the Intune MDAV policies add the exclusions
|
||||||
|
|
||||||
|
Intune portal (portal.azure.com)
|
||||||
|
Device Configuration -> Profiles -> [Select your profile for AV] -> Properties -> Settings -> Microsoft Defender Antivirus -> Microsoft Defender Antivirus Exclusions
|
||||||
|
|
||||||
|
Files and folders
|
||||||
|
xxxxx
|
||||||
|
|
||||||
|
Processes
|
||||||
|
xxxxx
|
||||||
|
|
||||||
|
|
||||||
|
#### Option 2: In the SCCM MDAV/SCEP policies add the exclusions
|
||||||
|
|
||||||
|
Assets and Compliance -> Endpoint Protection -> Antimalware Policies -> [Select the policy that you want to modify] -> Exclusion Settings
|
||||||
|
Excluded files and folders:
|
||||||
|
xxxxx
|
||||||
|
Excluded processes:
|
||||||
|
xxxxx
|
||||||
|
|
||||||
|
|
||||||
|
#### Option 3: Create a new GPO w/ the MDAV exclusions
|
||||||
|
|
||||||
|
Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender Antivirus -> Exclusions
|
||||||
|
Path Exclusions
|
||||||
|
xxxxx
|
||||||
|
Process Exclusions
|
||||||
|
xxxxx
|
||||||
|
|
||||||
|
#### Option 4: Local gpo
|
||||||
|
|
||||||
|
You could setup the 3rd party security product exclusions (SEP or Tanium) on 1 machine by going to:
|
||||||
|
Computer Configuration -> Administrative Templates -> Windows Components -> Windows Defender Antivirus -> Exclusions
|
||||||
|
Path Exclusions
|
||||||
|
xxxxx
|
||||||
|
Process Exclusions
|
||||||
|
xxxxx
|
||||||
|
|
||||||
|
#### Option 5: Export the following registry key:
|
||||||
|
|
||||||
|
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions
|
||||||
|
|
||||||
|
And import it in as a “regedit.exe /s MDAV_Exclusion.reg”
|
||||||
|
|
||||||
|
### MD ATP (EDR)
|
||||||
|
|
||||||
|
Indicators – Hash
|
||||||
|
Settings -> Indicators ->File hashes tab -> Add indicator
|
||||||
|
In the “Indicator” tab
|
||||||
|
File hash
|
||||||
|
Never
|
||||||
|
Click on Next
|
||||||
|
In the “Action” tab
|
||||||
|
Response Action: Allow
|
||||||
|
Title:
|
||||||
|
Description:
|
||||||
|
Click on Next
|
||||||
|
In the “Scope” tab
|
||||||
|
Machine groups:
|
||||||
|
All machines in my scope
|
||||||
|
or
|
||||||
|
Select from list
|
||||||
|
Click on Next
|
||||||
|
In the “Summary” tab
|
||||||
|
Review
|
||||||
|
Click on “Save”
|
||||||
|
|
||||||
|
*More notes in the Word document:*
|
||||||
|
|
||||||
|
How can I find the file hashes of my 3rd party security products?
|
||||||
|
There are a few methods, in this e-mail, we will talk about the MDATP “Advanced Hunting” functionality and SCCM’s CMPivot.
|
||||||
|
|
||||||
|
MDATP “Advanced Hunting”
|
||||||
|
|
||||||
|
Note: Change the “Last 7 days” to “Last 30 days”
|
||||||
|
|
||||||
|
find in (FileCreationEvents, ProcessCreationEvents, MiscEvents, RegistryEvents, NetworkCommunicationEvents, ImageLoadEvents)
|
||||||
|
where InitiatingProcessFileName has 'notepad.exe'
|
||||||
|
| project EventTime, ComputerName, InitiatingProcessSHA256, InitiatingProcessFolderPath, InitiatingProcessCommandLine
|
||||||
|
| distinct InitiatingProcessSHA256
|
||||||
|
Note: Replace notepad.exe with the 3rd party security product process name.
|
||||||
|
Note 2: We added ‘distinct’ query which shows just the unique SHA256’s.
|
||||||
|
|
||||||
|
SCCM CMPivot
|
||||||
|
|
||||||
|
Pre-req
|
||||||
|
Install CMPivot
|
||||||
|
C:\Program Files\Microsoft Configuration Manager\tools\CMPivot \cmpivot.msi
|
||||||
|
|
||||||
|
Start, CMPivot (Run as admin)
|
||||||
|
Connect to your SCCM server (SCCM_ServerName.DomainName.com)
|
||||||
|
Click on Connect
|
||||||
|
|
||||||
|
Click on the “Query tab”
|
||||||
|
|
||||||
|
Select the “Device Collection” (drop down, All Systems (default)).
|
||||||
|
Type:
|
||||||
|
File(c:\\windows\\notepad.exe)
|
||||||
|
| project Hash
|
||||||
|
|
||||||
|
<br/><br/><br/><br/>
|
||||||
|
|
||||||
**Congratulations**! You have completed part 2 of [migrating from Symantec to Microsoft Defender ATP](symantec-to-microsoft-defender-atp-migration.md#planning-for-migration-the-process-at-a-high-level)!
|
**Congratulations**! You have completed part 2 of [migrating from Symantec to Microsoft Defender ATP](symantec-to-microsoft-defender-atp-migration.md#planning-for-migration-the-process-at-a-high-level)!
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user