remove microsoft-defender-atp
@ -1,128 +0,0 @@
|
|||||||
---
|
|
||||||
title: Onboard Windows 10 multi-session devices in Windows Virtual Desktop
|
|
||||||
description: Read more in this article about Onboarding Windows 10 multi-session devices in Windows Virtual Desktop
|
|
||||||
keywords: Windows Virtual Desktop, WVD, microsoft defender, endpoint, onboard
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: manage
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
audience: ITPro
|
|
||||||
ms.topic: article
|
|
||||||
author: dansimp
|
|
||||||
ms.author: dansimp
|
|
||||||
ms.custom: nextgen
|
|
||||||
ms.date: 02/18/2021
|
|
||||||
ms.reviewer:
|
|
||||||
manager: dansimp
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Onboard Windows 10 multi-session devices in Windows Virtual Desktop
|
|
||||||
|
|
||||||
Applies to:
|
|
||||||
- Windows 10 multi-session running on Windows Virtual Desktop (WVD)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> Welcome to Microsoft Defender for Endpoint, the new name for Microsoft Defender for Endpoint. Read more about this and other updates here. We'll be updating names in products and in the docs in the near future.
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint supports monitoring both VDI as well as Windows Virtual Desktop sessions. Depending on your organization's needs, you might need to implement VDI or Windows Virtual Desktop sessions to help your employees access corporate data and apps from an unmanaged device, remote location, or similar scenario. With Microsoft Defender for Endpoint, you can monitor these virtual machines for anomalous activity.
|
|
||||||
|
|
||||||
## Before you begin
|
|
||||||
|
|
||||||
See [considerations for non-persistent VDI](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1). Although [Windows Virtual Desktop](https://docs.microsoft.com/azure/virtual-desktop/overview) does not provide non-persistence options, it does provide ways to use a Windows image that can be used to provision new hosts and redeploy machines. This increases volatility in the environment, and thus impacts what entries are created and maintained in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)), potentially reducing visibility for your security analysts.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Depending on your choice of onboarding method, devices can appear in Microsoft Defender Security Center as either:
|
|
||||||
> - Single entry for each virtual desktop
|
|
||||||
> - Multiple entries for each virtual desktop
|
|
||||||
|
|
||||||
Microsoft recommends onboarding Windows Virtual Desktop as a single entry per virtual desktop. This ensures that the investigation experience in the Microsoft Defender Security Center is in the context of one device based on the machine name. Organizations that frequently delete and re-deploy WVD hosts should strongly consider using this method as it prevents multiple objects for the same machine from being created in the Microsoft Defender Security Center. This can lead to confusion when investigating incidents. For test or non-volatile environments, you may opt to choose differently.
|
|
||||||
|
|
||||||
Microsoft recommends adding the Microsoft Defender for Endpoint onboarding script to the WVD image. This way, you can be sure that this onboarding script runs immediately at first boot. It is executed as a startup script at first boot on all the WVD machines that are provisioned from the WVD golden image. However, if you are using one of the gallery images without modification, place the script in a shared location and call it from either local or domain group policy.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The placement and configuration of the VDI onboarding startup script on the WVD golden image configures it as a startup script that runs when the WVD starts. It is NOT recommended to onboard the actual WVD golden image. Another consideration is the method used to run the script. It should run as early in the startup/provisioning process as possible to reduce the time between the machine being available to receive sessions and the device onboarding to the service. Below scenarios 1 & 2 take this into account.
|
|
||||||
|
|
||||||
## Scenarios
|
|
||||||
There are several ways to onboard a WVD host machine:
|
|
||||||
|
|
||||||
- Run the script in the golden image (or from a shared location) during startup.
|
|
||||||
- Use a management tool to run the script.
|
|
||||||
|
|
||||||
### Scenario 1: Using local group policy
|
|
||||||
This scenario requires placing the script in a golden image and uses local group policy to run early in the boot process.
|
|
||||||
|
|
||||||
Use the instructions in [Onboard non-persistent virtual desktop infrastructure VDI devices](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi#onboard-non-persistent-virtual-desktop-infrastructure-vdi-devices-1).
|
|
||||||
|
|
||||||
Follow the instructions for a single entry for each device.
|
|
||||||
|
|
||||||
### Scenario 2: Using domain group policy
|
|
||||||
This scenario uses a centrally located script and runs it using a domain-based group policy. You can also place the script in the golden image and run it in the same way.
|
|
||||||
|
|
||||||
#### Download the WindowsDefenderATPOnboardingPackage.zip file from the Windows Defender Security Center
|
|
||||||
1. Open the VDI configuration package .zip file (WindowsDefenderATPOnboardingPackage.zip)
|
|
||||||
- In the Microsoft Defender Security Center navigation pane, select **Settings** > **Onboarding**.
|
|
||||||
- Select Windows 10 as the operating system.
|
|
||||||
- In the **Deployment method** field, select VDI onboarding scripts for non-persistent endpoints.
|
|
||||||
- Click **Download package** and save the .zip file.
|
|
||||||
2. Extract the contents of the .zip file to a shared, read-only location that can be accessed by the device. You should have a folder called **OptionalParamsPolicy** and the files **WindowsDefenderATPOnboardingScript.cmd** and **Onboard-NonPersistentMachine.ps1**.
|
|
||||||
|
|
||||||
#### Use Group Policy management console to run the script when the virtual machine starts
|
|
||||||
1. Open the Group Policy Management Console (GPMC), right-click the Group Policy Object (GPO) you want to configure and click **Edit**.
|
|
||||||
2. In the Group Policy Management Editor, go to **Computer configuration** > **Preferences** > **Control panel settings**.
|
|
||||||
3. Right-click **Scheduled tasks**, click **New**, and then select **Immediate Task** (At least Windows 7).
|
|
||||||
4. In the Task window that opens, go to the **General** tab. Under **Security options** click **Change User or Group** and type SYSTEM. Click **Check Names** and then click OK. `NT AUTHORITY\SYSTEM` appears as the user account under which the task will run.
|
|
||||||
5. Select **Run whether user is logged on or not** and select the **Run with highest privileges** option.
|
|
||||||
6. Go to the **Actions** tab and select **New**. Confirm that **Start a program** is selected in the **Action** field.
|
|
||||||
7. Specify the following: <br/>
|
|
||||||
- Action = **Start a program**
|
|
||||||
- Program/Script = `C:\WINDOWS\system32\WindowsPowerShell\v1.0\powershell.exe`
|
|
||||||
- Add Arguments (optional) = `-ExecutionPolicy Bypass -command "& \\Path\To\Onboard-NonPersistentMachine.ps1"`
|
|
||||||
8. Select **OK** and close any open GPMC windows.
|
|
||||||
|
|
||||||
### Scenario 3: Onboarding using management tools
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> After onboarding the device, you can choose to run a detection test to verify that the device is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Microsoft Defender for Endpoint device](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/run-detection-test).
|
|
||||||
|
|
||||||
If you plan to manage your machines using a management tool, you can onboard devices with Microsoft Endpoint Configuration Manager. For more information, see: [Onboard Windows 10 devices using Configuration Manager](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm)
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> If you plan to use [Attack Surface reduction Rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction), the rule “[Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/attack-surface-reduction#block-process-creations-originating-from-psexec-and-wmi-commands)" should not be used as it is incompatible with management through Microsoft Endpoint Manager because this rule blocks WMI commands the Configuration Manager client uses to function correctly.
|
|
||||||
|
|
||||||
## Tagging your machines when building your image
|
|
||||||
|
|
||||||
As part of your onboarding, you may want to consider setting a machine tag to be able to differentiate WVD machines more easily in the Microsoft Security Center. For more information, see
|
|
||||||
[Add device tags by setting a registry key value](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags#add-device-tags-by-setting-a-registry-key-value).
|
|
||||||
|
|
||||||
## Other recommended configuration settings
|
|
||||||
|
|
||||||
When building your image, you may want to configure initial protection settings as well. For more information, see [Other recommended configuration settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-gp#other-recommended-configuration-settings).
|
|
||||||
|
|
||||||
In addition, if you are using FSlogix user profiles, we recommend you exclude the following files from always-on protection:
|
|
||||||
|
|
||||||
### Exclude Files
|
|
||||||
|
|
||||||
> %ProgramFiles%\FSLogix\Apps\frxdrv.sys <br>
|
|
||||||
> %ProgramFiles%\FSLogix\Apps\frxdrvvt.sys <br>
|
|
||||||
> %ProgramFiles%\FSLogix\Apps\frxccd.sys <br>
|
|
||||||
> %TEMP%\*.VHD <br>
|
|
||||||
> %TEMP%\*.VHDX <br>
|
|
||||||
> %Windir%\TEMP\*.VHD <br>
|
|
||||||
> %Windir%\TEMP\*.VHDX <br>
|
|
||||||
> \\storageaccount.file.core.windows.net\share\*\*.VHD <br>
|
|
||||||
> \\storageaccount.file.core.windows.net\share\*\*.VHDX <br>
|
|
||||||
|
|
||||||
### Exclude Processes
|
|
||||||
|
|
||||||
> %ProgramFiles%\FSLogix\Apps\frxccd.exe <br>
|
|
||||||
> %ProgramFiles%\FSLogix\Apps\frxccds.exe <br>
|
|
||||||
> %ProgramFiles%\FSLogix\Apps\frxsvc.exe <br>
|
|
||||||
|
|
||||||
## Licensing requirements
|
|
||||||
|
|
||||||
Windows 10 Multi-session is a client OS. Licensing requirements for Microsoft Defender for endpoint can be found at: [Licensing requirements](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements).
|
|
@ -1,61 +0,0 @@
|
|||||||
---
|
|
||||||
title: DeviceTvmSoftwareInventory table in the advanced hunting schema
|
|
||||||
description: Learn about the inventory of software in your devices in the DeviceTvmSoftwareInventory table of the advanced hunting schema.
|
|
||||||
keywords: advanced hunting, threat hunting, cyber threat hunting, mdatp, microsoft defender atp, wdatp search, query, telemetry, schema reference, kusto, table, column, data type, description, threat & vulnerability management, TVM, device management, software, inventory, vulnerabilities, CVE ID, OS DeviceTvmSoftwareInventoryVulnerabilities
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: maccruz
|
|
||||||
author: schmurky
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# DeviceTvmSoftwareInventory
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Prerelease information](../../includes/prerelease.md)]
|
|
||||||
|
|
||||||
The `DeviceTvmSoftwareInventory` table in the advanced hunting schema contains the [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) inventory of software currently installed on devices in your network, including end of support information. You can, for instance, hunt for events involving devices that are installed with a currently vulnerable software version. Use this reference to construct queries that return information from the table.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>The `DeviceTvmSoftwareInventory` and `DeviceTvmSoftwareVulnerabilities` tables have replaced the `DeviceTvmSoftwareInventoryVulnerabilities` table. Together, the first two tables include more columns you can use to help inform your vulnerability management activities.
|
|
||||||
|
|
||||||
For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-reference.md).
|
|
||||||
|
|
||||||
| Column name | Data type | Description |
|
|
||||||
|-------------|-----------|-------------|
|
|
||||||
| `DeviceId` | string | Unique identifier for the device in the service |
|
|
||||||
| `DeviceName` | string | Fully qualified domain name (FQDN) of the device |
|
|
||||||
| `OSPlatform` | string | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7. |
|
|
||||||
| `OSVersion` | string | Version of the operating system running on the device |
|
|
||||||
| `OSArchitecture` | string | Architecture of the operating system running on the device |
|
|
||||||
| `SoftwareVendor` | string | Name of the software vendor |
|
|
||||||
| `SoftwareName` | string | Name of the software product |
|
|
||||||
| `SoftwareVersion` | string | Version number of the software product |
|
|
||||||
| `EndOfSupportStatus` | string | Indicates the lifecycle stage of the software product relative to its specified end-of-support (EOS) or end-of-life (EOL) date |
|
|
||||||
| `EndOfSupportDate` | string | End-of-support (EOS) or end-of-life (EOL) date of the software product |
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [Advanced hunting overview](advanced-hunting-overview.md)
|
|
||||||
- [Learn the query language](advanced-hunting-query-language.md)
|
|
||||||
- [Understand the schema](advanced-hunting-schema-reference.md)
|
|
||||||
- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
|
|
||||||
|
|
@ -1,62 +0,0 @@
|
|||||||
---
|
|
||||||
title: DeviceTvmSoftwareVulnerabilities table in the advanced hunting schema
|
|
||||||
description: Learn about software vulnerabilities found on devices and the list of available security updates that address each vulnerability in the DeviceTvmSoftwareVulnerabilities table of the advanced hunting schema.
|
|
||||||
keywords: advanced hunting, threat hunting, cyber threat hunting, mdatp, microsoft defender atp, wdatp search, query, telemetry, schema reference, kusto, table, column, data type, description, threat & vulnerability management, TVM, device management, software, inventory, vulnerabilities, CVE ID, OS DeviceTvmSoftwareInventoryVulnerabilities
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: maccruz
|
|
||||||
author: schmurky
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# DeviceTvmSoftwareVulnerabilities
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Prerelease information](../../includes/prerelease.md)]
|
|
||||||
|
|
||||||
The `DeviceTvmSoftwareVulnerabilities` table in the advanced hunting schema contains the [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) list of vulnerabilities in installed software products. This table also includes operating system information, CVE IDs, and vulnerability severity information. You can use this table, for example, to hunt for events involving devices that have severe vulnerabilities in their software. Use this reference to construct queries that return information from the table.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>The `DeviceTvmSoftwareInventory` and `DeviceTvmSoftwareVulnerabilities` tables have replaced the `DeviceTvmSoftwareInventoryVulnerabilities` table. Together, the first two tables include more columns you can use to help inform your vulnerability management activities.
|
|
||||||
|
|
||||||
For information on other tables in the advanced hunting schema, see [the advanced hunting reference](advanced-hunting-reference.md).
|
|
||||||
|
|
||||||
| Column name | Data type | Description |
|
|
||||||
|-------------|-----------|-------------|
|
|
||||||
| `DeviceId` | string | Unique identifier for the device in the service |
|
|
||||||
| `DeviceName` | string | Fully qualified domain name (FQDN) of the device |
|
|
||||||
| `OSPlatform` | string | Platform of the operating system running on the device. This indicates specific operating systems, including variations within the same family, such as Windows 10 and Windows 7. |
|
|
||||||
| `OSVersion` | string | Version of the operating system running on the device |
|
|
||||||
| `OSArchitecture` | string | Architecture of the operating system running on the device |
|
|
||||||
| `SoftwareVendor` | string | Name of the software vendor |
|
|
||||||
| `SoftwareName` | string | Name of the software product |
|
|
||||||
| `SoftwareVersion` | string | Version number of the software product |
|
|
||||||
| `CveId` | string | Unique identifier assigned to the security vulnerability under the Common Vulnerabilities and Exposures (CVE) system |
|
|
||||||
| `VulnerabilitySeverityLevel` | string | Severity level assigned to the security vulnerability based on the CVSS score and dynamic factors influenced by the threat landscape |
|
|
||||||
| `RecommendedSecurityUpdate` | string | Name or description of the security update provided by the software vendor to address the vulnerability |
|
|
||||||
| `RecommendedSecurityUpdateId` | string | Identifier of the applicable security updates or identifier for the corresponding guidance or knowledge base (KB) articles |
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [Advanced hunting overview](advanced-hunting-overview.md)
|
|
||||||
- [Learn the query language](advanced-hunting-query-language.md)
|
|
||||||
- [Understand the schema](advanced-hunting-schema-reference.md)
|
|
||||||
- [Overview of Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md)
|
|
@ -1,80 +0,0 @@
|
|||||||
---
|
|
||||||
title: Advanced hunting schema reference
|
|
||||||
description: Learn about the tables in the advanced hunting schema to understand the data you can run threat hunting queries on.
|
|
||||||
keywords: advanced hunting, threat hunting, cyber threat hunting, mdatp, microsoft defender atp, wdatp search, query, telemetry, schema reference, kusto, table, data
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: lomayor
|
|
||||||
author: lomayor
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 01/14/2020
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Understand the advanced hunting schema
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhuntingref-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Prerelease information](../../includes/prerelease.md)]
|
|
||||||
|
|
||||||
The [advanced hunting](advanced-hunting-overview.md) schema is made up of multiple tables that provide either event information or information about devices and other entities. To effectively build queries that span multiple tables, you need to understand the tables and the columns in the advanced hunting schema.
|
|
||||||
|
|
||||||
## Get schema information in the security center
|
|
||||||
While constructing queries, use the built-in schema reference to quickly get the following information about each table in the schema:
|
|
||||||
|
|
||||||
- **Tables description**—type of data contained in the table and the source of that data.
|
|
||||||
- **Columns**—all the columns in the table.
|
|
||||||
- **Action types**—possible values in the `ActionType` column representing the event types supported by the table. This is provided only for tables that contain event information.
|
|
||||||
- **Sample query**—example queries that feature how the table can be utilized.
|
|
||||||
|
|
||||||
### Access the schema reference
|
|
||||||
To quickly access the schema reference, select the **View reference** action next to the table name in the schema representation. You can also select **Schema reference** to search for a table.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Learn the schema tables
|
|
||||||
|
|
||||||
The following reference lists all the tables in the advanced hunting schema. Each table name links to a page describing the column names for that table.
|
|
||||||
|
|
||||||
Table and column names are also listed within the Microsoft Defender Security Center, in the schema representation on the advanced hunting screen.
|
|
||||||
|
|
||||||
| Table name | Description |
|
|
||||||
|------------|-------------|
|
|
||||||
| **[DeviceAlertEvents](advanced-hunting-devicealertevents-table.md)** | Alerts on Microsoft Defender Security Center |
|
|
||||||
| **[DeviceInfo](advanced-hunting-deviceinfo-table.md)** | Device information, including OS information |
|
|
||||||
| **[DeviceNetworkInfo](advanced-hunting-devicenetworkinfo-table.md)** | Network properties of devices, including adapters, IP and MAC addresses, as well as connected networks and domains |
|
|
||||||
| **[DeviceProcessEvents](advanced-hunting-deviceprocessevents-table.md)** | Process creation and related events |
|
|
||||||
| **[DeviceNetworkEvents](advanced-hunting-devicenetworkevents-table.md)** | Network connection and related events |
|
|
||||||
| **[DeviceFileEvents](advanced-hunting-devicefileevents-table.md)** | File creation, modification, and other file system events |
|
|
||||||
| **[DeviceRegistryEvents](advanced-hunting-deviceregistryevents-table.md)** | Creation and modification of registry entries |
|
|
||||||
| **[DeviceLogonEvents](advanced-hunting-devicelogonevents-table.md)** | Sign-ins and other authentication events |
|
|
||||||
| **[DeviceImageLoadEvents](advanced-hunting-deviceimageloadevents-table.md)** | DLL loading events |
|
|
||||||
| **[DeviceEvents](advanced-hunting-deviceevents-table.md)** | Multiple event types, including events triggered by security controls such as Microsoft Defender Antivirus and exploit protection |
|
|
||||||
| **[DeviceFileCertificateInfo](advanced-hunting-devicefilecertificateinfo-table.md)** | Certificate information of signed files obtained from certificate verification events on endpoints |
|
|
||||||
| **[DeviceTvmSoftwareInventory](advanced-hunting-devicetvmsoftwareinventory-table.md)** | Inventory of software installed on devices, including their version information and end-of-support status |
|
|
||||||
| **[DeviceTvmSoftwareVulnerabilities](advanced-hunting-devicetvmsoftwarevulnerabilities-table.md)** | Software vulnerabilities found on devices and the list of available security updates that address each vulnerability |
|
|
||||||
| **[DeviceTvmSoftwareVulnerabilitiesKB ](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md)** | Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available |
|
|
||||||
| **[DeviceTvmSecureConfigurationAssessment](advanced-hunting-devicetvmsecureconfigurationassessment-table.md)** | Threat & Vulnerability Management assessment events, indicating the status of various security configurations on devices |
|
|
||||||
| **[DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md)** | Knowledge base of various security configurations used by Threat & Vulnerability Management to assess devices; includes mappings to various standards and benchmarks |
|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
- [Advanced hunting overview](advanced-hunting-overview.md)
|
|
||||||
- [Learn the query language](advanced-hunting-query-language.md)
|
|
||||||
- [Work with query results](advanced-hunting-query-results.md)
|
|
||||||
- [Apply query best practices](advanced-hunting-best-practices.md)
|
|
||||||
- [Custom detections overview](overview-custom-detections.md)
|
|
||||||
- [Advanced hunting data schema changes](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/advanced-hunting-data-schema-changes/ba-p/1043914)
|
|
@ -1,75 +0,0 @@
|
|||||||
---
|
|
||||||
title: Onboard non-Windows devices to the Microsoft Defender for Endpoint service
|
|
||||||
description: Configure non-Windows devices so that they can send sensor data to the Microsoft Defender ATP service.
|
|
||||||
keywords: onboard non-Windows devices, macos, linux, device management, configure Windows ATP devices, configure Microsoft Defender Advanced Threat Protection devices
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Onboard non-Windows devices
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
**Platforms**
|
|
||||||
- macOS
|
|
||||||
- Linux
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-nonwindows-abovefoldlink)
|
|
||||||
|
|
||||||
Defender for Endpoint provides a centralized security operations experience for Windows as well as non-Windows platforms. You'll be able to see alerts from various supported operating systems (OS) in Microsoft Defender Security Center and better protect your organization's network.
|
|
||||||
|
|
||||||
You'll need to know the exact Linux distros and macOS versions that are compatible with Defender for Endpoint for the integration to work. For more information, see:
|
|
||||||
- [Microsoft Defender for Endpoint for Linux system requirements](microsoft-defender-atp-linux.md#system-requirements)
|
|
||||||
- [Microsoft Defender for Endpoint for Mac system requirements](microsoft-defender-atp-mac.md#system-requirements).
|
|
||||||
|
|
||||||
## Onboarding non-Windows devices
|
|
||||||
You'll need to take the following steps to onboard non-Windows devices:
|
|
||||||
1. Select your preferred method of onboarding:
|
|
||||||
|
|
||||||
- For macOS devices, you can choose to onboard through Microsoft Defender ATP or through a third-party solution. For more information, see [Microsoft Defender for Endpoint for Mac](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-mac).
|
|
||||||
- For other non-Windows devices choose **Onboard non-Windows devices through third-party integration**.
|
|
||||||
|
|
||||||
1. In the navigation pane, select **Interoperability** > **Partners**. Make sure the third-party solution is listed.
|
|
||||||
|
|
||||||
2. In the **Partner Applications** tab, select the partner that supports your non-Windows devices.
|
|
||||||
|
|
||||||
3. Select **Open partner page** to open the partner's page. Follow the instructions provided on the page.
|
|
||||||
|
|
||||||
4. After creating an account or subscribing to the partner solution, you should get to a stage where a tenant Global Admin in your organization is asked to accept a permission request from the partner application. Read the permission request carefully to make sure that it is aligned with the service that you require.
|
|
||||||
|
|
||||||
|
|
||||||
2. Run a detection test by following the instructions of the third-party solution.
|
|
||||||
|
|
||||||
## Offboard non-Windows devices
|
|
||||||
|
|
||||||
1. Follow the third-party's documentation to disconnect the third-party solution from Microsoft Defender for Endpoint.
|
|
||||||
|
|
||||||
2. Remove permissions for the third-party solution in your Azure AD tenant.
|
|
||||||
1. Sign in to the [Azure portal](https://portal.azure.com).
|
|
||||||
2. Select **Azure Active Directory > Enterprise Applications**.
|
|
||||||
3. Select the application you'd like to offboard.
|
|
||||||
4. Select the **Delete** button.
|
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
- [Onboard Windows 10 devices](configure-endpoints.md)
|
|
||||||
- [Onboard servers](configure-server-endpoints.md)
|
|
||||||
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
|
|
||||||
- [Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
|
|
@ -1,156 +0,0 @@
|
|||||||
---
|
|
||||||
title: Configure and manage Microsoft Threat Experts capabilities
|
|
||||||
ms.reviewer:
|
|
||||||
description: Register to Microsoft Threats Experts to configure, manage, and use it in your daily security operations and security administration work.
|
|
||||||
keywords: Microsoft Threat Experts, managed threat hunting service, MTE, Microsoft managed hunting service
|
|
||||||
search.product: Windows 10
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: dolmont
|
|
||||||
author: DulceMontemayor
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Configure and manage Microsoft Threat Experts capabilities
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
|
|
||||||
|
|
||||||
## Before you begin
|
|
||||||
> [!NOTE]
|
|
||||||
> Discuss the eligibility requirements with your Microsoft Technical Service provider and account team before you apply to the managed threat hunting service.
|
|
||||||
|
|
||||||
Ensure that you have Defender for Endpoint deployed in your environment with devices enrolled, and not just on a laboratory set-up.
|
|
||||||
|
|
||||||
If you're a Defender for Endpoint customer, you need to apply for Microsoft Threat Experts - Targeted Attack Notifications to get special insights and analysis to help identify the most critical threats, so you can respond to them quickly. Contact your account team or Microsoft representative to subscribe to Microsoft Threat Experts - Experts on Demand to consult with our threat experts on relevant detections and adversaries.
|
|
||||||
|
|
||||||
## Apply for Microsoft Threat Experts - Targeted Attack Notifications service
|
|
||||||
If you're already a Defender for Endpoint customer, you can apply through the Microsoft Defender Security Center.
|
|
||||||
|
|
||||||
1. From the navigation pane, go to **Settings > General > Advanced features > Microsoft Threat Experts - Targeted Attack Notifications**.
|
|
||||||
|
|
||||||
2. Click **Apply**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Enter your name and email address so that Microsoft can get back to you on your application.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Read the [privacy statement](https://privacy.microsoft.com/en-us/privacystatement), then click **Submit** when you're done. You will receive a welcome email once your application is approved.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
When accepted, you will receive a welcome email and you will see the **Apply** button change to a toggle that is “on”. In case you want to take yourself out of the Targeted Attack Notifications service, slide the toggle “off” and click **Save preferences** at the bottom of the page.
|
|
||||||
|
|
||||||
## Where you'll see the targeted attack notifications from Microsoft Threat Experts
|
|
||||||
You can receive targeted attack notification from Microsoft Threat Experts through the following medium:
|
|
||||||
- The Defender for Endpoint portal's **Incidents** page
|
|
||||||
- The Defender for Endpoint portal's **Alerts** dashboard
|
|
||||||
- OData alerting [API](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/get-alerts) and [REST API](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/pull-alerts-using-rest-api)
|
|
||||||
- [DeviceAlertEvents](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-devicealertevents-table) table in Advanced hunting
|
|
||||||
- Your email, if you choose to configure it
|
|
||||||
|
|
||||||
To receive targeted attack notifications through email, create an email notification rule.
|
|
||||||
|
|
||||||
### Create an email notification rule
|
|
||||||
You can create rules to send email notifications for notification recipients. See [Configure alert notifications](configure-email-notifications.md) to create, edit, delete, or troubleshoot email notification, for details.
|
|
||||||
|
|
||||||
## View the targeted attack notification
|
|
||||||
You'll start receiving targeted attack notification from Microsoft Threat Experts in your email after you have configured your system to receive email notification.
|
|
||||||
|
|
||||||
1. Click the link in the email to go to the corresponding alert context in the dashboard tagged with **Threat experts**.
|
|
||||||
|
|
||||||
2. From the dashboard, select the same alert topic that you got from the email, to view the details.
|
|
||||||
|
|
||||||
## Subscribe to Microsoft Threat Experts - Experts on Demand
|
|
||||||
If you're already a Defender for Endpoint customer, you can contact your Microsoft representative to subscribe to Microsoft Threat Experts - Experts on Demand.
|
|
||||||
|
|
||||||
## Consult a Microsoft threat expert about suspicious cybersecurity activities in your organization
|
|
||||||
You can partner with Microsoft Threat Experts who can be engaged directly from within the Microsoft Defender Security Center for timely and accurate response. Experts provide insights to better understand complex threats, targeted attack notifications that you get, or if you need more information about the alerts, a potentially compromised device, or a threat intelligence context that you see on your portal dashboard.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> - Alert inquiries related to your organization's customized threat intelligence data are currently not supported. Consult your security operations or incident response team for details.
|
|
||||||
> - You need to have the **Manage security settings** permission in the Security Center portal to be able to submit a "Consult a threat expert" inquiry.
|
|
||||||
|
|
||||||
1. Navigate to the portal page with the relevant information that you'd like to investigate, for example, the **Incident** page. Ensure that the page for the relevant alert or device is in view before you send an investigation request.
|
|
||||||
|
|
||||||
2. From the upper right-hand menu, click the **?** icon. Then, select **Consult a threat expert**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
A flyout screen opens. The following screen shows when you are on a trial subscription.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
The following screen shows when you are on a full Microsoft Threat Experts - Experts on-Demand subscription.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
The **Inquiry topic** field is pre-populated with the link to the relevant page for your investigation request. For example, a link to the incident, alert, or device details page that you were at when you made the request.
|
|
||||||
|
|
||||||
3. In the next field, provide enough information to give the Microsoft Threat Experts enough context to start the investigation.
|
|
||||||
|
|
||||||
4. Enter the email address that you'd like to use to correspond with Microsoft Threat Experts.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you would like to track the status of your Experts on Demand cases through Microsoft Services Hub, reach out to your Technical Account Manager.
|
|
||||||
|
|
||||||
Watch this video for a quick overview of the Microsoft Services Hub.
|
|
||||||
|
|
||||||
>[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4pk9f]
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Sample investigation topics that you can consult with Microsoft Threat Experts - Experts on Demand
|
|
||||||
|
|
||||||
**Alert information**
|
|
||||||
- We see a new type of alert for a living-off-the-land binary: [AlertID]. Can you tell us something more about this alert and how we can investigate further?
|
|
||||||
- We’ve observed two similar attacks, which try to execute malicious PowerShell scripts but generate different alerts. One is "Suspicious PowerShell command line" and the other is "A malicious file was detected based on indication provided by O365". What is the difference?
|
|
||||||
- I receive an odd alert today for abnormal number of failed logins from a high profile user’s device. I cannot find any further evidence around these sign-in attempts. How can Defender for Endpoint see these attempts? What type of sign-ins are being monitored?
|
|
||||||
- Can you give more context or insights about this alert: “Suspicious behavior by a system utility was observed”.
|
|
||||||
|
|
||||||
**Possible machine compromise**
|
|
||||||
- Can you help answer why we see “Unknown process observed?” This message or alert is seen frequently on many devices. We appreciate any input to clarify whether this message or alert is related to malicious activity.
|
|
||||||
- Can you help validate a possible compromise on the following system on [date] with similar behaviors as the previous [malware name] malware detection on the same system in [month]?
|
|
||||||
|
|
||||||
**Threat intelligence details**
|
|
||||||
- We detected a phishing email that delivered a malicious Word document to a user. The malicious Word document caused a series of suspicious events, which triggered multiple Microsoft Defender alerts for [malware name] malware. Do you have any information on this malware? If yes, can you send me a link?
|
|
||||||
- I recently saw a [social media reference, for example, Twitter or blog] post about a threat that is targeting my industry. Can you help me understand what protection Defender for Endpoint provides against this threat actor?
|
|
||||||
|
|
||||||
**Microsoft Threat Experts’ alert communications**
|
|
||||||
- Can your incident response team help us address the targeted attack notification that we got?
|
|
||||||
- I received this targeted attack notification from Microsoft Threat Experts. We don’t have our own incident response team. What can we do now, and how can we contain the incident?
|
|
||||||
- I received a targeted attack notification from Microsoft Threat Experts. What data can you provide to us that we can pass on to our incident response team?
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Microsoft Threat Experts is a managed cybersecurity hunting service and not an incident response service. However, the experts can seamlessly transition the investigation to Microsoft Cybersecurity Solutions Group (CSG)'s Detection and Response Team (DART) services, when necessary. You can also opt to engage with your own incident response team to address issues that requires an incident response.
|
|
||||||
|
|
||||||
## Scenario
|
|
||||||
|
|
||||||
### Receive a progress report about your managed hunting inquiry
|
|
||||||
Response from Microsoft Threat Experts varies according to your inquiry. They will email a progress report to you about your **Consult a threat expert** inquiry within two days, to communicate the investigation status from the following categories:
|
|
||||||
- More information is needed to continue with the investigation
|
|
||||||
- A file or several file samples are needed to determine the technical context
|
|
||||||
- Investigation requires more time
|
|
||||||
- Initial information was enough to conclude the investigation
|
|
||||||
|
|
||||||
It is crucial to respond in quickly to keep the investigation moving.
|
|
||||||
|
|
||||||
## Related topic
|
|
||||||
- [Microsoft Threat Experts overview](microsoft-threat-experts.md)
|
|
@ -1,225 +0,0 @@
|
|||||||
---
|
|
||||||
title: Configure device proxy and Internet connection settings
|
|
||||||
description: Configure the Microsoft Defender ATP proxy and internet settings to enable communication with the cloud service.
|
|
||||||
keywords: configure, proxy, internet, internet connectivity, settings, proxy settings, netsh, winhttp, proxy server
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Configure device proxy and Internet connectivity settings
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-configureendpointsscript-abovefoldlink)
|
|
||||||
|
|
||||||
The Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Defender for Endpoint service.
|
|
||||||
|
|
||||||
The embedded Defender for Endpoint sensor runs in system context using the LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP) to enable communication with the Defender for Endpoint cloud service.
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>For organizations that use forward proxies as a gateway to the Internet, you can use network protection to investigate behind a proxy. For more information, see [Investigate connection events that occur behind forward proxies](investigate-behind-proxy.md).
|
|
||||||
|
|
||||||
The WinHTTP configuration setting is independent of the Windows Internet (WinINet) Internet browsing proxy settings and can only discover a proxy server by using the following discovery methods:
|
|
||||||
|
|
||||||
- Auto-discovery methods:
|
|
||||||
- Transparent proxy
|
|
||||||
- Web Proxy Auto-discovery Protocol (WPAD)
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings. For more information on Defender for Endpoint URL exclusions in the proxy, see [Enable access to Defender for Endpoint service URLs in the proxy server](#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server).
|
|
||||||
|
|
||||||
- Manual static proxy configuration:
|
|
||||||
- Registry based configuration
|
|
||||||
- WinHTTP configured using netsh command – Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy)
|
|
||||||
|
|
||||||
## Configure the proxy server manually using a registry-based static proxy
|
|
||||||
|
|
||||||
Configure a registry-based static proxy to allow only Defender for Endpoint sensor to report diagnostic data and communicate with Defender for Endpoint services if a computer is not be permitted to connect to the Internet.
|
|
||||||
|
|
||||||
The static proxy is configurable through Group Policy (GP). The group policy can be found under:
|
|
||||||
|
|
||||||
- Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service
|
|
||||||
- Set it to **Enabled** and select **Disable Authenticated Proxy usage**:
|
|
||||||

|
|
||||||
- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**:
|
|
||||||
- Configure the proxy:<br>
|
|
||||||

|
|
||||||
|
|
||||||
The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DataCollection`.
|
|
||||||
|
|
||||||
The registry value `TelemetryProxyServer` takes the following string format:
|
|
||||||
|
|
||||||
```text
|
|
||||||
<server name or ip>:<port>
|
|
||||||
```
|
|
||||||
|
|
||||||
For example: 10.0.0.6:8080
|
|
||||||
|
|
||||||
The registry value `DisableEnterpriseAuthProxy` should be set to 1.
|
|
||||||
|
|
||||||
## Configure the proxy server manually using netsh command
|
|
||||||
|
|
||||||
Use netsh to configure a system-wide static proxy.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> - This will affect all applications including Windows services which use WinHTTP with default proxy.</br>
|
|
||||||
> - Laptops that are changing topology (for example: from office to home) will malfunction with netsh. Use the registry-based static proxy configuration.
|
|
||||||
|
|
||||||
1. Open an elevated command-line:
|
|
||||||
|
|
||||||
a. Go to **Start** and type **cmd**.
|
|
||||||
|
|
||||||
b. Right-click **Command prompt** and select **Run as administrator**.
|
|
||||||
|
|
||||||
2. Enter the following command and press **Enter**:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
netsh winhttp set proxy <proxy>:<port>
|
|
||||||
```
|
|
||||||
|
|
||||||
For example: netsh winhttp set proxy 10.0.0.6:8080
|
|
||||||
|
|
||||||
To reset the winhttp proxy, enter the following command and press **Enter**
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
netsh winhttp reset proxy
|
|
||||||
```
|
|
||||||
|
|
||||||
See [Netsh Command Syntax, Contexts, and Formatting](https://docs.microsoft.com/windows-server/networking/technologies/netsh/netsh-contexts) to learn more.
|
|
||||||
|
|
||||||
## Enable access to Microsoft Defender for Endpoint service URLs in the proxy server
|
|
||||||
|
|
||||||
If a proxy or firewall is blocking all traffic by default and allowing only specific domains through, add the domains listed in the downloadable sheet to the allowed domains list.
|
|
||||||
|
|
||||||
The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them.
|
|
||||||
|
|
||||||
|
|
||||||
|**Spreadsheet of domains list**|**Description**|
|
|
||||||
|:-----|:-----|
|
|
||||||
|<br/> | Spreadsheet of specific DNS records for service locations, geographic locations, and OS. <br><br>[Download the spreadsheet here.](https://download.microsoft.com/download/8/a/5/8a51eee5-cd02-431c-9d78-a58b7f77c070/mde-urls.xlsx)
|
|
||||||
|
|
||||||
|
|
||||||
If a proxy or firewall has HTTPS scanning (SSL inspection) enabled, exclude the domains listed in the above table from HTTPS scanning.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> settings-win.data.microsoft.com is only needed if you have Windows 10 devices running version 1803 or earlier.<br>
|
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> URLs that include v20 in them are only needed if you have Windows 10 devices running version 1803 or later. For example, ```us-v20.events.data.microsoft.com``` is needed for a Windows 10 device running version 1803 or later and onboarded to US Data Storage region.
|
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you are using Microsoft Defender Antivirus in your environment, see [Configure network connections to the Microsoft Defender Antivirus cloud service](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
If a proxy or firewall is blocking anonymous traffic, as Defender for Endpoint sensor is connecting from system context, make sure anonymous traffic is permitted in the previously listed URLs.
|
|
||||||
|
|
||||||
### Microsoft Monitoring Agent (MMA) - proxy and firewall requirements for older versions of Windows client or Windows Server
|
|
||||||
|
|
||||||
The information below list the proxy and firewall configuration information required to communicate with Log Analytics agent (often referred to as Microsoft Monitoring Agent) for the previous versions of Windows such as Windows 7 SP1, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2, and Windows Server 2016.
|
|
||||||
|
|
||||||
|Agent Resource|Ports |Direction |Bypass HTTPS inspection|
|
|
||||||
|------|---------|--------|--------|
|
|
||||||
|*.ods.opinsights.azure.com |Port 443 |Outbound|Yes |
|
|
||||||
|*.oms.opinsights.azure.com |Port 443 |Outbound|Yes |
|
|
||||||
|*.blob.core.windows.net |Port 443 |Outbound|Yes |
|
|
||||||
|*.azure-automation.net |Port 443 |Outbound|Yes |
|
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> As a cloud-based solution, the IP range can change. It's recommended you move to DNS resolving setting.
|
|
||||||
|
|
||||||
## Confirm Microsoft Monitoring Agent (MMA) Service URL Requirements
|
|
||||||
|
|
||||||
Please see the following guidance to eliminate the wildcard (*) requirement for your specific environment when using the Microsoft Monitoring Agent (MMA) for previous versions of Windows.
|
|
||||||
|
|
||||||
1. Onboard a previous operating system with the Microsoft Monitoring Agent (MMA) into Defender for Endpoint (for more information, see [Onboard previous versions of Windows on Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2010326) and [Onboard Windows servers](configure-server-endpoints.md#windows-server-2008-r2-sp1-windows-server-2012-r2-and-windows-server-2016).
|
|
||||||
|
|
||||||
2. Ensure the machine is successfully reporting into the Microsoft Defender Security Center portal.
|
|
||||||
|
|
||||||
3. Run the TestCloudConnection.exe tool from “C:\Program Files\Microsoft Monitoring Agent\Agent” to validate the connectivity and to see the required URLs for your specific workspace.
|
|
||||||
|
|
||||||
4. Check the Microsoft Defender for Endpoint URLs list for the complete list of requirements for your region (please refer to the Service URLs [Spreadsheet](https://download.microsoft.com/download/8/a/5/8a51eee5-cd02-431c-9d78-a58b7f77c070/mde-urls.xlsx)).
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
The wildcards (*) used in *.ods.opinsights.azure.com, *.oms.opinsights.azure.com, and *.agentsvc.azure-automation.net URL endpoints can be replaced with your specific Workspace ID. The Workspace ID is specific to your environment and workspace and can be found in the Onboarding section of your tenant within the Microsoft Defender Security Center portal.
|
|
||||||
|
|
||||||
The *.blob.core.windows.net URL endpoint can be replaced with the URLs shown in the “Firewall Rule: *.blob.core.windows.net” section of the test results.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> In the case of onboarding via Azure Security Center (ASC), multiple workspaces maybe used. You will need to perform the TestCloudConnection.exe procedure above on an onboarded machine from each workspace (to determine if there are any changes to the *.blob.core.windows.net URLs between the workspaces).
|
|
||||||
|
|
||||||
## Verify client connectivity to Microsoft Defender ATP service URLs
|
|
||||||
|
|
||||||
Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Defender for Endpoint service URLs.
|
|
||||||
|
|
||||||
1. Download the [MDATP Client Analyzer tool](https://aka.ms/mdatpanalyzer) to the PC where Defender for Endpoint sensor is running on.
|
|
||||||
|
|
||||||
2. Extract the contents of MDATPClientAnalyzer.zip on the device.
|
|
||||||
|
|
||||||
3. Open an elevated command-line:
|
|
||||||
|
|
||||||
a. Go to **Start** and type **cmd**.
|
|
||||||
|
|
||||||
b. Right-click **Command prompt** and select **Run as administrator**.
|
|
||||||
|
|
||||||
4. Enter the following command and press **Enter**:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
HardDrivePath\MDATPClientAnalyzer.cmd
|
|
||||||
```
|
|
||||||
|
|
||||||
Replace *HardDrivePath* with the path where the MDATPClientAnalyzer tool was downloaded to, for example
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
C:\Work\tools\MDATPClientAnalyzer\MDATPClientAnalyzer.cmd
|
|
||||||
```
|
|
||||||
|
|
||||||
5. Extract the *MDATPClientAnalyzerResult.zip* file created by tool in the folder used in the *HardDrivePath*.
|
|
||||||
|
|
||||||
6. Open *MDATPClientAnalyzerResult.txt* and verify that you have performed the proxy configuration steps to enable server discovery and access to the service URLs. <br><br>
|
|
||||||
The tool checks the connectivity of Defender for Endpoint service URLs that Defender for Endpoint client is configured to interact with. It then prints the results into the *MDATPClientAnalyzerResult.txt* file for each URL that can potentially be used to communicate with the Defender for Endpoint services. For example:
|
|
||||||
|
|
||||||
```text
|
|
||||||
Testing URL : https://xxx.microsoft.com/xxx
|
|
||||||
1 - Default proxy: Succeeded (200)
|
|
||||||
2 - Proxy auto discovery (WPAD): Succeeded (200)
|
|
||||||
3 - Proxy disabled: Succeeded (200)
|
|
||||||
4 - Named proxy: Doesn't exist
|
|
||||||
5 - Command line proxy: Doesn't exist
|
|
||||||
```
|
|
||||||
|
|
||||||
If at least one of the connectivity options returns a (200) status, then the Defender for Endpoint client can communicate with the tested URL properly using this connectivity method. <br><br>
|
|
||||||
|
|
||||||
However, if the connectivity check results indicate a failure, an HTTP error is displayed (see HTTP Status Codes). You can then use the URLs in the table shown in [Enable access to Defender for Endpoint service URLs in the proxy server](#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). The URLs you'll use will depend on the region selected during the onboarding procedure.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The Connectivity Analyzer tool is not compatible with ASR rule [Block process creations originating from PSExec and WMI commands](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction#attack-surface-reduction-rules). You will need to temporarily disable this rule to run the connectivity tool.
|
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> When the TelemetryProxyServer is set, in Registry or via Group Policy, Defender for Endpoint will fall back to direct if it can't access the defined proxy.
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [Onboard Windows 10 devices](configure-endpoints.md)
|
|
||||||
- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
|
|
@ -1,283 +0,0 @@
|
|||||||
---
|
|
||||||
title: Onboard Windows servers to the Microsoft Defender for Endpoint service
|
|
||||||
description: Onboard Windows servers so that they can send sensor data to the Microsoft Defender for Endpoint sensor.
|
|
||||||
keywords: onboard server, server, 2012r2, 2016, 2019, server onboarding, device management, configure Windows ATP servers, onboard Microsoft Defender Advanced Threat Protection servers, onboard Microsoft Defender for Endpoint servers
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
author: mjcaparas
|
|
||||||
ms.author: macapara
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Onboard Windows servers to the Microsoft Defender for Endpoint service
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- Windows Server 2008 R2 SP1
|
|
||||||
- Windows Server 2012 R2
|
|
||||||
- Windows Server 2016
|
|
||||||
- Windows Server (SAC) version 1803 and later
|
|
||||||
- Windows Server 2019 and later
|
|
||||||
- Windows Server 2019 core edition
|
|
||||||
|
|
||||||
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-configserver-abovefoldlink)
|
|
||||||
|
|
||||||
|
|
||||||
Defender for Endpoint extends support to also include the Windows Server operating system. This support provides advanced attack detection and investigation capabilities seamlessly through the Microsoft Defender Security Center console.
|
|
||||||
|
|
||||||
For a practical guidance on what needs to be in place for licensing and infrastructure, see [Protecting Windows Servers with Defender for Endpoint](https://techcommunity.microsoft.com/t5/What-s-New/Protecting-Windows-Server-with-Windows-Defender-ATP/m-p/267114#M128).
|
|
||||||
|
|
||||||
For guidance on how to download and use Windows Security Baselines for Windows servers, see [Windows Security Baselines](https://docs.microsoft.com/windows/device-security/windows-security-baselines).
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Windows Server 2008 R2 SP1, Windows Server 2012 R2, and Windows Server 2016
|
|
||||||
|
|
||||||
You can onboard Windows Server 2008 R2 SP1, Windows Server 2012 R2, and Windows Server 2016 to Defender for Endpoint by using any of the following options:
|
|
||||||
|
|
||||||
- **Option 1**: [Onboard by installing and configuring Microsoft Monitoring Agent (MMA)](#option-1-onboard-by-installing-and-configuring-microsoft-monitoring-agent-mma)
|
|
||||||
- **Option 2**: [Onboard through Azure Security Center](#option-2-onboard-windows-servers-through-azure-security-center)
|
|
||||||
- **Option 3**: [Onboard through Microsoft Endpoint Manager version 2002 and later](#option-3-onboard-windows-servers-through-microsoft-endpoint-manager-version-2002-and-later)
|
|
||||||
|
|
||||||
|
|
||||||
After completing the onboarding steps using any of the provided options, you'll need to [Configure and update System Center Endpoint Protection clients](#configure-and-update-system-center-endpoint-protection-clients).
|
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Defender for Endpoint standalone server license is required, per node, in order to onboard a Windows server through Microsoft Monitoring Agent (Option 1), or through Microsoft Endpoint Manager (Option 3). Alternatively, an Azure Defender for Servers license is required, per node, in order to onboard a Windows server through Azure Security Center (Option 2), see [Supported features available in Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-services).
|
|
||||||
|
|
||||||
|
|
||||||
### Option 1: Onboard by installing and configuring Microsoft Monitoring Agent (MMA)
|
|
||||||
You'll need to install and configure MMA for Windows servers to report sensor data to Defender for Endpoint. For more information, see [Collect log data with Azure Log Analytics agent](https://docs.microsoft.com/azure/azure-monitor/platform/log-analytics-agent).
|
|
||||||
|
|
||||||
If you're already using System Center Operations Manager (SCOM) or Azure Monitor (formerly known as Operations Management Suite (OMS)), attach the Microsoft Monitoring Agent (MMA) to report to your Defender for Endpoint workspace through Multihoming support.
|
|
||||||
|
|
||||||
In general, you'll need to take the following steps:
|
|
||||||
1. Fulfill the onboarding requirements outlined in **Before you begin** section.
|
|
||||||
2. Turn on server monitoring from Microsoft Defender Security center.
|
|
||||||
3. Install and configure MMA for the server to report sensor data to Defender for Endpoint.
|
|
||||||
4. Configure and update System Center Endpoint Protection clients.
|
|
||||||
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> After onboarding the device, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Defender for Endpoint endpoint](run-detection-test.md).
|
|
||||||
|
|
||||||
|
|
||||||
#### Before you begin
|
|
||||||
Perform the following steps to fulfill the onboarding requirements:
|
|
||||||
|
|
||||||
- For Windows Server 2008 R2 SP1 or Windows Server 2012 R2, ensure that you install the following hotfix:
|
|
||||||
- [Update for customer experience and diagnostic telemetry](https://support.microsoft.com/help/3080149/update-for-customer-experience-and-diagnostic-telemetry)
|
|
||||||
|
|
||||||
- In addition, for Windows Server 2008 R2 SP1, ensure that you fulfill the following requirements:
|
|
||||||
- Install the [February monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
|
|
||||||
- Install either [.NET framework 4.5](https://www.microsoft.com/download/details.aspx?id=30653) (or later) or [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework)
|
|
||||||
|
|
||||||
- For Windows Server 2008 R2 SP1 and Windows Server 2012 R2: [Configure and update System Center Endpoint Protection clients](#configure-and-update-system-center-endpoint-protection-clients).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> This step is required only if your organization uses System Center Endpoint Protection (SCEP) and you're onboarding Windows Server 2008 R2 SP1 and Windows Server 2012 R2.
|
|
||||||
|
|
||||||
|
|
||||||
<span id="server-mma"/>
|
|
||||||
|
|
||||||
### Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603).
|
|
||||||
|
|
||||||
2. Using the Workspace ID and Workspace key obtained in the previous procedure, choose any of the following installation methods to install the agent on the Windows server:
|
|
||||||
- [Manually install the agent using setup](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-setup-wizard). <br>
|
|
||||||
On the **Agent Setup Options** page, choose **Connect the agent to Azure Log Analytics (OMS)**.
|
|
||||||
- [Install the agent using the command line](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-command-line).
|
|
||||||
- [Configure the agent using a script](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-dsc-in-azure-automation).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you are a [US Government customer](gov.md), under "Azure Cloud" you'll need to choose "Azure US Government" if using the setup wizard, or if using a command line or a script - set the "OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE" parameter to 1.
|
|
||||||
|
|
||||||
|
|
||||||
<span id="server-proxy"/>
|
|
||||||
|
|
||||||
### Configure Windows server proxy and Internet connectivity settings if needed
|
|
||||||
If your servers need to use a proxy to communicate with Defender for Endpoint, use one of the following methods to configure the MMA to use the proxy server:
|
|
||||||
|
|
||||||
|
|
||||||
- [Configure the MMA to use a proxy server](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#install-agent-using-setup-wizard)
|
|
||||||
|
|
||||||
- [Configure Windows to use a proxy server for all connections](configure-proxy-internet.md)
|
|
||||||
|
|
||||||
If a proxy or firewall is in use, please ensure that servers can access all of the Microsoft Defender for Endpoint service URLs directly and without SSL interception. For more information, see [enable access to Defender for Endpoint service URLs](configure-proxy-internet.md#enable-access-to-microsoft-defender-for-endpoint-service-urls-in-the-proxy-server). Use of SSL interception will prevent the system from communicating with the Defender for Endpoint service.
|
|
||||||
|
|
||||||
Once completed, you should see onboarded Windows servers in the portal within an hour.
|
|
||||||
|
|
||||||
### Option 2: Onboard Windows servers through Azure Security Center
|
|
||||||
1. In the Microsoft Defender Security Center navigation pane, select **Settings** > **Device management** > **Onboarding**.
|
|
||||||
|
|
||||||
2. Select **Windows Server 2008 R2 SP1, 2012 R2 and 2016** as the operating system.
|
|
||||||
|
|
||||||
3. Click **Onboard Servers in Azure Security Center**.
|
|
||||||
|
|
||||||
4. Follow the onboarding instructions in [Microsoft Defender for Endpoint with Azure Security Center](https://docs.microsoft.com/azure/security-center/security-center-wdatp).
|
|
||||||
|
|
||||||
After completing the onboarding steps, you'll need to [Configure and update System Center Endpoint Protection clients](#configure-and-update-system-center-endpoint-protection-clients).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> - For onboarding via Azure Defender for Servers (previously Azure Security Center Standard Edition) to work as expected, the server must have an appropriate workspace and key configured within the Microsoft Monitoring Agent (MMA) settings.
|
|
||||||
> - Once configured, the appropriate cloud management pack is deployed on the machine and the sensor process (MsSenseS.exe) will be deployed and started.
|
|
||||||
> - This is also required if the server is configured to use an OMS Gateway server as proxy.
|
|
||||||
|
|
||||||
### Option 3: Onboard Windows servers through Microsoft Endpoint Manager version 2002 and later
|
|
||||||
You can onboard Windows Server 2012 R2 and Windows Server 2016 by using Microsoft Endpoint Manager version 2002 and later. For more information, see [Microsoft Defender for Endpoint
|
|
||||||
in Microsoft Endpoint Manager current branch](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/defender-advanced-threat-protection).
|
|
||||||
|
|
||||||
After completing the onboarding steps, you'll need to [Configure and update System Center Endpoint Protection clients](#configure-and-update-system-center-endpoint-protection-clients).
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Windows Server (SAC) version 1803, Windows Server 2019, and Windows Server 2019 Core edition
|
|
||||||
You can onboard Windows Server (SAC) version 1803, Windows Server 2019, or Windows Server 2019 Core edition by using the following deployment methods:
|
|
||||||
|
|
||||||
- [Local script](configure-endpoints-script.md)
|
|
||||||
- [Group Policy](configure-endpoints-gp.md)
|
|
||||||
- [Microsoft Endpoint Configuration Manager](configure-endpoints-sccm.md)
|
|
||||||
- [System Center Configuration Manager 2012 / 2012 R2 1511 / 1602](configure-endpoints-sccm.md#onboard-devices-using-system-center-configuration-manager)
|
|
||||||
- [VDI onboarding scripts for non-persistent devices](configure-endpoints-vdi.md)
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> - The Onboarding package for Windows Server 2019 through Microsoft Endpoint Manager currently ships a script. For more information on how to deploy scripts in Configuration Manager, see [Packages and programs in Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/packages-and-programs).
|
|
||||||
> - A local script is suitable for a proof of concept but should not be used for production deployment. For a production deployment, we recommend using Group Policy, or Microsoft Endpoint Configuration Manager.
|
|
||||||
|
|
||||||
Support for Windows Server provides deeper insight into server activities, coverage for kernel and memory attack detection, and enables response actions.
|
|
||||||
|
|
||||||
1. Configure Defender for Endpoint onboarding settings on the Windows server using the same tools and methods for Windows 10 devices. For more information, see [Onboard Windows 10 devices](configure-endpoints.md).
|
|
||||||
|
|
||||||
2. If you're running a third-party antimalware solution, you'll need to apply the following Microsoft Defender AV passive mode settings. Verify that it was configured correctly:
|
|
||||||
|
|
||||||
1. Set the following registry entry:
|
|
||||||
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
|
||||||
- Name: ForceDefenderPassiveMode
|
|
||||||
- Type: REG_DWORD
|
|
||||||
- Value: 1
|
|
||||||
|
|
||||||
1. Run the following PowerShell command to verify that the passive mode was configured:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
Get-WinEvent -FilterHashtable @{ProviderName="Microsoft-Windows-Sense" ;ID=84}
|
|
||||||
```
|
|
||||||
|
|
||||||
1. Confirm that a recent event containing the passive mode event is found:
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Run the following command to check if Microsoft Defender AV is installed:
|
|
||||||
|
|
||||||
```sc.exe query Windefend```
|
|
||||||
|
|
||||||
If the result is 'The specified service doesn't exist as an installed service', then you'll need to install Microsoft Defender AV. For more information, see [Microsoft Defender Antivirus in Windows 10](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10).
|
|
||||||
|
|
||||||
For information on how to use Group Policy to configure and manage Microsoft Defender Antivirus on your Windows servers, see [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Integration with Azure Security Center
|
|
||||||
Defender for Endpoint can integrate with Azure Security Center to provide a comprehensive Windows server protection solution. With this integration, Azure Security Center can use the power of Defender for Endpoint to provide improved threat detection for Windows Servers.
|
|
||||||
|
|
||||||
The following capabilities are included in this integration:
|
|
||||||
- Automated onboarding - Defender for Endpoint sensor is automatically enabled on Windows Servers that are onboarded to Azure Security Center. For more information on Azure Security Center onboarding, see [Onboarding to Azure Security Center Standard for enhanced security](https://docs.microsoft.com/azure/security-center/security-center-onboarding).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Automated onboarding is only applicable for Windows Server 2008 R2 SP1, Windows Server 2012 R2, and Windows Server 2016.
|
|
||||||
|
|
||||||
- Windows servers monitored by Azure Security Center will also be available in Defender for Endpoint - Azure Security Center seamlessly connects to the Defender for Endpoint tenant, providing a single view across clients and servers. In addition, Defender for Endpoint alerts will be available in the Azure Security Center console.
|
|
||||||
- Server investigation - Azure Security Center customers can access Microsoft Defender Security Center to perform detailed investigation to uncover the scope of a potential breach.
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> - When you use Azure Security Center to monitor servers, a Defender for Endpoint tenant is automatically created (in the US for US users, in the EU for European and UK users).<br>
|
|
||||||
Data collected by Defender for Endpoint is stored in the geo-location of the tenant as identified during provisioning.
|
|
||||||
> - If you use Defender for Endpoint before using Azure Security Center, your data will be stored in the location you specified when you created your tenant even if you integrate with Azure Security Center at a later time.
|
|
||||||
> - Once configured, you cannot change the location where your data is stored. If you need to move your data to another location, you need to contact Microsoft Support to reset the tenant. <br>
|
|
||||||
Server endpoint monitoring utilizing this integration has been disabled for Office 365 GCC customers.
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Configure and update System Center Endpoint Protection clients
|
|
||||||
|
|
||||||
Defender for Endpoint integrates with System Center Endpoint Protection. The integration provides visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware.
|
|
||||||
|
|
||||||
The following steps are required to enable this integration:
|
|
||||||
- Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie).
|
|
||||||
|
|
||||||
- Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting.
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Offboard Windows servers
|
|
||||||
You can offboard Windows Server (SAC), Windows Server 2019, and Windows Server 2019 Core edition in the same method available for Windows 10 client devices.
|
|
||||||
|
|
||||||
For other Windows server versions, you have two options to offboard Windows servers from the service:
|
|
||||||
- Uninstall the MMA agent
|
|
||||||
- Remove the Defender for Endpoint workspace configuration
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Offboarding causes the Windows server to stop sending sensor data to the portal but data from the Windows server, including reference to any alerts it has had will be retained for up to 6 months.
|
|
||||||
|
|
||||||
### Uninstall Windows servers by uninstalling the MMA agent
|
|
||||||
To offboard the Windows server, you can uninstall the MMA agent from the Windows server or detach it from reporting to your Defender for Endpoint workspace. After offboarding the agent, the Windows server will no longer send sensor data to Defender for Endpoint.
|
|
||||||
For more information, see [To disable an agent](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#to-disable-an-agent).
|
|
||||||
|
|
||||||
### Remove the Defender for Endpoint workspace configuration
|
|
||||||
To offboard the Windows server, you can use either of the following methods:
|
|
||||||
|
|
||||||
- Remove the Defender for Endpoint workspace configuration from the MMA agent
|
|
||||||
- Run a PowerShell command to remove the configuration
|
|
||||||
|
|
||||||
#### Remove the Defender for Endpoint workspace configuration from the MMA agent
|
|
||||||
|
|
||||||
1. In the **Microsoft Monitoring Agent Properties**, select the **Azure Log Analytics (OMS)** tab.
|
|
||||||
|
|
||||||
2. Select the Defender for Endpoint workspace, and click **Remove**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
#### Run a PowerShell command to remove the configuration
|
|
||||||
|
|
||||||
1. Get your Workspace ID:
|
|
||||||
|
|
||||||
1. In the navigation pane, select **Settings** > **Onboarding**.
|
|
||||||
|
|
||||||
1. Select **Windows Server 2008 R2 SP1, 2012 R2 and 2016** as the operating system and get your Workspace ID:
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Open an elevated PowerShell and run the following command. Use the Workspace ID you obtained and replacing `WorkspaceID`:
|
|
||||||
|
|
||||||
```powershell
|
|
||||||
$ErrorActionPreference = "SilentlyContinue"
|
|
||||||
# Load agent scripting object
|
|
||||||
$AgentCfg = New-Object -ComObject AgentConfigManager.MgmtSvcCfg
|
|
||||||
# Remove OMS Workspace
|
|
||||||
$AgentCfg.RemoveCloudWorkspace("WorkspaceID")
|
|
||||||
# Reload the configuration and apply changes
|
|
||||||
$AgentCfg.ReloadConfiguration()
|
|
||||||
|
|
||||||
```
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
- [Onboard Windows 10 devices](configure-endpoints.md)
|
|
||||||
- [Onboard non-Windows devices](configure-endpoints-non-windows.md)
|
|
||||||
- [Configure proxy and Internet connectivity settings](configure-proxy-internet.md)
|
|
||||||
- [Run a detection test on a newly onboarded Defender for Endpoint device](run-detection-test.md)
|
|
||||||
- [Troubleshooting Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
|
|
@ -1,136 +0,0 @@
|
|||||||
---
|
|
||||||
title: Protect important folders from ransomware from encrypting your files with controlled folder access
|
|
||||||
description: Files in default folders can be protected from being changed by malicious apps. Prevent ransomware from encrypting your files.
|
|
||||||
keywords: controlled folder access, windows 10, windows defender, ransomware, protect, files, folders
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: manage
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: denisebmsft
|
|
||||||
ms.author: deniseb
|
|
||||||
audience: ITPro
|
|
||||||
ms.date: 02/03/2021
|
|
||||||
ms.reviewer: v-maave
|
|
||||||
manager: dansimp
|
|
||||||
ms.custom: asr
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Protect important folders with controlled folder access
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
|
|
||||||
|
|
||||||
## What is controlled folder access?
|
|
||||||
|
|
||||||
Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019 and Windows 10 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Scripting engines are not trusted and you cannot allow them access to controlled protected folders. For example, PowerShell is not trusted by controlled folder access, even if you allow with [certificate and file indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates).
|
|
||||||
|
|
||||||
Controlled folder access works best with [Microsoft Defender for Endpoint](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into controlled folder access events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Controlled folder access blocks don't generate alerts in the [Alerts queue](../microsoft-defender-atp/alerts-queue.md). However, you can view information about controlled folder access blocks in the [device timeline view](../microsoft-defender-atp/investigate-machines.md), while using [advanced hunting](../microsoft-defender-atp/advanced-hunting-overview.md), or with [custom detection rules](../microsoft-defender-atp/custom-detection-rules.md).
|
|
||||||
|
|
||||||
## How does controlled folder access work?
|
|
||||||
|
|
||||||
Controlled folder access works by only allowing trusted apps to access protected folders. Protected folders are specified when controlled folder access is configured. Typically, commonly used folders, such as those used for documents, pictures, downloads, and so on, are included in the list of controlled folders.
|
|
||||||
|
|
||||||
Controlled folder access works with a list of trusted apps. Apps that are included in the list of trusted software work as expected. Apps that are not included in the list are prevented from making any changes to files inside protected folders.
|
|
||||||
|
|
||||||
Apps are added to the list based upon their prevalence and reputation. Apps that are highly prevalent throughout your organization and that have never displayed any behavior deemed malicious are considered trustworthy. Those apps are added to the list automatically.
|
|
||||||
|
|
||||||
Apps can also be added manually to the trusted list by using Configuration Manager or Intune. Additional actions, such as [adding a file indicator](../microsoft-defender-atp/respond-file-alerts.md#add-indicator-to-block-or-allow-a-file) for an app, can be performed from the Security Center Console.
|
|
||||||
|
|
||||||
## Why controlled folder access is important
|
|
||||||
|
|
||||||
Controlled folder access is especially useful in helping to protect your documents and information from [ransomware](https://www.microsoft.com/wdsi/threats/ransomware). In a ransomware attack, your files can get encrypted and held hostage. With controlled folder access in place, a notification appears on the computer where an app attempted to make changes to a file in a protected folder. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.
|
|
||||||
|
|
||||||
The [protected folders](#review-controlled-folder-access-events-in-windows-event-viewer) include common system folders (including boot sectors), and you can [add more folders](customize-controlled-folders.md#protect-additional-folders). You can also [allow apps](customize-controlled-folders.md#allow-specific-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders.
|
|
||||||
|
|
||||||
You can use [audit mode](audit-windows-defender.md) to evaluate how controlled folder access would impact your organization if it were enabled. You can also visit the Windows Defender Test ground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works.
|
|
||||||
|
|
||||||
Controlled folder access is supported on the following versions of Windows:
|
|
||||||
- [Windows 10, version 1709](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1709) and later
|
|
||||||
- [Windows Server 2019](https://docs.microsoft.com/windows-server/get-started-19/whats-new-19)
|
|
||||||
|
|
||||||
## Windows system folders are protected by default
|
|
||||||
|
|
||||||
Windows system folders are protected by default, along with several other folders:
|
|
||||||
|
|
||||||
- `c:\Users\<username>\Documents`
|
|
||||||
- `c:\Users\Public\Documents`
|
|
||||||
- `c:\Users\<username>\Pictures`
|
|
||||||
- `c:\Users\Public\Pictures`
|
|
||||||
- `c:\Users\Public\Videos`
|
|
||||||
- `c:\Users\<username>\Videos`
|
|
||||||
- `c:\Users\<username>\Music`
|
|
||||||
- `c:\Users\Public\Music`
|
|
||||||
- `c:\Users\<username>\Favorites`
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You can configure additional folders as protected, but you cannot remove the Windows system folders that are protected by default.
|
|
||||||
|
|
||||||
## Requirements for controlled folder access
|
|
||||||
|
|
||||||
Controlled folder access requires enabling [Microsoft Defender Antivirus real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md).
|
|
||||||
|
|
||||||
## Review controlled folder access events in the Microsoft Defender Security Center
|
|
||||||
|
|
||||||
Defender for Endpoint provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
|
||||||
|
|
||||||
You can query Microsoft Defender for Endpoint data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender.md), you can use [advanced hunting](advanced-hunting-overview.md) to see how controlled folder access settings would affect your environment if they were enabled.
|
|
||||||
|
|
||||||
Example query:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
DeviceEvents
|
|
||||||
| where ActionType in ('ControlledFolderAccessViolationAudited','ControlledFolderAccessViolationBlocked')
|
|
||||||
```
|
|
||||||
|
|
||||||
## Review controlled folder access events in Windows Event Viewer
|
|
||||||
|
|
||||||
You can review the Windows event log to see events that are created when controlled folder access blocks (or audits) an app:
|
|
||||||
|
|
||||||
1. Download the [Evaluation Package](https://aka.ms/mp7z2w) and extract the file *cfa-events.xml* to an easily accessible location on the device.
|
|
||||||
2. Type **Event viewer** in the Start menu to open the Windows Event Viewer.
|
|
||||||
3. On the left panel, under **Actions**, select **Import custom view...**.
|
|
||||||
4. Navigate to where you extracted *cfa-events.xml* and select it. Alternatively, [copy the XML directly](event-views.md).
|
|
||||||
5. Select **OK**.
|
|
||||||
|
|
||||||
The following table shows events related to controlled folder access:
|
|
||||||
|
|
||||||
|Event ID | Description |
|
|
||||||
|:---|:---|
|
|
||||||
|5007 | Event when settings are changed |
|
|
||||||
|1124 | Audited controlled folder access event |
|
|
||||||
|1123 | Blocked controlled folder access event |
|
|
||||||
|
|
||||||
## View or change the list of protected folders
|
|
||||||
|
|
||||||
You can use the Windows Security app to view the list of folders that are protected by controlled folder access.
|
|
||||||
|
|
||||||
1. On your Windows 10 device, open the Windows Security app.
|
|
||||||
2. Select **Virus & threat protection**.
|
|
||||||
3. Under **Ransomware protection**, select **Manage ransomware protection**.
|
|
||||||
4. If controlled folder access is turned off, you'll need to turn it on. Select **protected folders**.
|
|
||||||
5. Do one of the following steps:
|
|
||||||
- To add a folder, select **+ Add a protected folder**.
|
|
||||||
- To remove a folder, select it, and then select **Remove**.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> [Windows system folders](#windows-system-folders-are-protected-by-default) are protected by default, and you cannot remove them from the list.
|
|
||||||
|
|
||||||
## See also
|
|
||||||
|
|
||||||
- [Evaluate controlled folder access](evaluate-controlled-folder-access.md)
|
|
||||||
- [Customize controlled folder access](customize-controlled-folders.md)
|
|
||||||
- [Protect more folders](customize-controlled-folders.md#protect-additional-folders)
|
|
@ -1,157 +0,0 @@
|
|||||||
---
|
|
||||||
title: Create custom detection rules in Microsoft Defender ATP
|
|
||||||
ms.reviewer:
|
|
||||||
description: Learn how to create custom detection rules based on advanced hunting queries
|
|
||||||
keywords: custom detections, create, manage, alerts, edit, run on demand, frequency, interval, detection rules, advanced hunting, hunt, query, response actions, mdatp, microsoft defender atp
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: lomayor
|
|
||||||
author: lomayor
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 09/20/2020
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Create custom detection rules
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
|
|
||||||
|
|
||||||
Custom detection rules built from [advanced hunting](advanced-hunting-overview.md) queries let you proactively monitor various events and system states, including suspected breach activity and misconfigured devices. You can set them to run at regular intervals, generating alerts and taking response actions whenever there are matches.
|
|
||||||
|
|
||||||
Read this article to learn how to create new custom detection rules. Or [see viewing and managing existing rules](custom-detections-manage.md).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> To create or manage custom detections, [your role](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group) needs to have the **manage security settings** permission.
|
|
||||||
|
|
||||||
## 1. Prepare the query.
|
|
||||||
|
|
||||||
In Microsoft Defender Security Center, go to **Advanced hunting** and select an existing query or create a new query. When using a new query, run the query to identify errors and understand possible results.
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>To prevent the service from returning too many alerts, each rule is limited to generating only 100 alerts whenever it runs. Before creating a rule, tweak your query to avoid alerting for normal, day-to-day activity.
|
|
||||||
|
|
||||||
### Required columns in the query results
|
|
||||||
|
|
||||||
To use a query for a custom detection rule, the query must return the following columns:
|
|
||||||
|
|
||||||
- `Timestamp`
|
|
||||||
- `DeviceId`
|
|
||||||
- `ReportId`
|
|
||||||
|
|
||||||
Simple queries, such as those that don't use the `project` or `summarize` operator to customize or aggregate results, typically return these common columns.
|
|
||||||
|
|
||||||
There are various ways to ensure more complex queries return these columns. For example, if you prefer to aggregate and count by `DeviceId`, you can still return `Timestamp` and `ReportId` by getting them from the most recent event involving each device.
|
|
||||||
|
|
||||||
The sample query below counts the number of unique devices (`DeviceId`) with antivirus detections and uses this to find only those devices with more than five detections. To return the latest `Timestamp` and the corresponding `ReportId`, it uses the `summarize` operator with the `arg_max` function.
|
|
||||||
|
|
||||||
```kusto
|
|
||||||
DeviceEvents
|
|
||||||
| where Timestamp > ago(7d)
|
|
||||||
| where ActionType == "AntivirusDetection"
|
|
||||||
| summarize (Timestamp, ReportId)=arg_max(Timestamp, ReportId), count() by DeviceId
|
|
||||||
| where count_ > 5
|
|
||||||
```
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> For better query performance, set a time filter that matches your intended run frequency for the rule. Since the least frequent run is every 24 hours, filtering for the past day will cover all new data.
|
|
||||||
|
|
||||||
## 2. Create a new rule and provide alert details.
|
|
||||||
|
|
||||||
With the query in the query editor, select **Create detection rule** and specify the following alert details:
|
|
||||||
|
|
||||||
- **Detection name**—name of the detection rule
|
|
||||||
- **Frequency**—interval for running the query and taking action. [See additional guidance below](#rule-frequency)
|
|
||||||
- **Alert title**—title displayed with alerts triggered by the rule
|
|
||||||
- **Severity**—potential risk of the component or activity identified by the rule. [Read about alert severities](alerts-queue.md#severity)
|
|
||||||
- **Category**—type of threat component or activity, if any. [Read about alert categories](alerts-queue.md#understanding-alert-categories)
|
|
||||||
- **MITRE ATT&CK techniques**—one or more attack techniques identified by the rule as documented in the MITRE ATT&CK framework. This section is not available with certain alert categories, such as malware, ransomware, suspicious activity, and unwanted software
|
|
||||||
- **Description**—more information about the component or activity identified by the rule
|
|
||||||
- **Recommended actions**—additional actions that responders might take in response to an alert
|
|
||||||
|
|
||||||
For more information about how alert details are displayed, [read about the alert queue](alerts-queue.md).
|
|
||||||
|
|
||||||
### Rule frequency
|
|
||||||
|
|
||||||
When saved, a new custom detection rule immediately runs and checks for matches from the past 30 days of data. The rule then runs again at fixed intervals and lookback durations based on the frequency you choose:
|
|
||||||
|
|
||||||
- **Every 24 hours**—runs every 24 hours, checking data from the past 30 days
|
|
||||||
- **Every 12 hours**—runs every 12 hours, checking data from the past 24 hours
|
|
||||||
- **Every 3 hours**—runs every 3 hours, checking data from the past 6 hours
|
|
||||||
- **Every hour**—runs hourly, checking data from the past 2 hours
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
>When changing a query that is already scheduled as a Custom Detection, it's next immediate execution will have a lookback window of 30 days, exactly as if a new query was being created.
|
|
||||||
>Changes to a large number of queries, and with time filters higher than the default lookback durantion for the selected frequency, might have an impact in the overall quota consumption of Advanced Hunting and resulting in exhausting the daily quota.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Match the time filters in your query with the lookback duration. Results outside of the lookback duration are ignored.
|
|
||||||
|
|
||||||
Select the frequency that matches how closely you want to monitor detections, and consider your organization's capacity to respond to the alerts.
|
|
||||||
|
|
||||||
## 3. Choose the impacted entities.
|
|
||||||
|
|
||||||
Identify the columns in your query results where you expect to find the main affected or impacted entity. For example, a query might return both device and user IDs. Identifying which of these columns represent the main impacted entity helps the service aggregate relevant alerts, correlate incidents, and target response actions.
|
|
||||||
|
|
||||||
You can select only one column for each entity type. Columns that are not returned by your query can't be selected.
|
|
||||||
|
|
||||||
## 4. Specify actions.
|
|
||||||
|
|
||||||
Your custom detection rule can automatically take actions on files or devices that are returned by the query.
|
|
||||||
|
|
||||||
### Actions on devices
|
|
||||||
|
|
||||||
These actions are applied to devices in the `DeviceId` column of the query results:
|
|
||||||
|
|
||||||
- **Isolate device**—applies full network isolation, preventing the device from connecting to any application or service, except for the Defender for Endpoint service. [Learn more about device isolation](respond-machine-alerts.md#isolate-devices-from-the-network)
|
|
||||||
- **Collect investigation package**—collects device information in a ZIP file. [Learn more about the investigation package](respond-machine-alerts.md#collect-investigation-package-from-devices)
|
|
||||||
- **Run antivirus scan**—performs a full Microsoft Defender Antivirus scan on the device
|
|
||||||
- **Initiate investigation**—starts an [automated investigation](automated-investigations.md) on the device
|
|
||||||
- **Restrict app execution**—sets restrictions on the device to allow only files that are signed with a Microsoft-issued certificate to run. [Learn more about restricting app execution](respond-machine-alerts.md#restrict-app-execution)
|
|
||||||
|
|
||||||
### Actions on files
|
|
||||||
|
|
||||||
These actions are applied to files in the `SHA1` or the `InitiatingProcessSHA1` column of the query results:
|
|
||||||
|
|
||||||
- **Allow/Block**—automatically adds the file to your [custom indicator list](manage-indicators.md) so that it is always allowed to run or blocked from running. You can set the scope of this action so that it is taken only on selected device groups. This scope is independent of the scope of the rule.
|
|
||||||
- **Quarantine file**—deletes the file from its current location and places a copy in quarantine
|
|
||||||
|
|
||||||
### Actions on users
|
|
||||||
|
|
||||||
- **Mark user as compromised**—sets the user's risk level to "high" in Azure Active Directory, triggering the corresponding [identity protection policies](https://docs.microsoft.com/azure/active-directory/identity-protection/overview-identity-protection#risk-levels).
|
|
||||||
|
|
||||||
## 5. Set the rule scope.
|
|
||||||
|
|
||||||
Set the scope to specify which devices are covered by the rule:
|
|
||||||
|
|
||||||
- All devices
|
|
||||||
- Specific device groups
|
|
||||||
|
|
||||||
Only data from devices in scope will be queried. Also, actions will be taken only on those devices.
|
|
||||||
|
|
||||||
## 6. Review and turn on the rule.
|
|
||||||
|
|
||||||
After reviewing the rule, select **Create** to save it. The custom detection rule immediately runs. It runs again based on configured frequency to check for matches, generate alerts, and take response actions.
|
|
||||||
|
|
||||||
You can [view and manage custom detection rules](custom-detections-manage.md), check their previous runs, and review the alerts they have triggered. You can also run a rule on demand and modify it.
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [View and manage custom detection rules](custom-detections-manage.md)
|
|
||||||
- [Custom detections overview](overview-custom-detections.md)
|
|
||||||
- [Advanced hunting overview](advanced-hunting-overview.md)
|
|
||||||
- [Learn the advanced hunting query language](advanced-hunting-query-language.md)
|
|
||||||
- [View and organize alerts](alerts-queue.md)
|
|
@ -1,171 +0,0 @@
|
|||||||
---
|
|
||||||
title: Customize controlled folder access
|
|
||||||
description: Add other folders that should be protected by controlled folder access, or allow apps that are incorrectly blocking changes to important files.
|
|
||||||
keywords: Controlled folder access, windows 10, windows defender, ransomware, protect, files, folders, customize, add folder, add app, allow, add executable
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: manage
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
audience: ITPro
|
|
||||||
author: denisebmsft
|
|
||||||
ms.author: deniseb
|
|
||||||
ms.reviewer: jcedola, dbodorin, vladiso, nixanm, anvascon
|
|
||||||
manager: dansimp
|
|
||||||
ms.date: 01/06/2021
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Customize controlled folder access
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-assignaccess-abovefoldlink)
|
|
||||||
|
|
||||||
|
|
||||||
Controlled folder access helps you protect valuable data from malicious apps and threats, such as ransomware. Controlled folder access is supported on Windows Server 2019 and Windows 10 clients.
|
|
||||||
|
|
||||||
This article describes how to customize controlled folder access capabilities, and includes the following sections:
|
|
||||||
|
|
||||||
- [Protect additional folders](#protect-additional-folders)
|
|
||||||
- [Add apps that should be allowed to access protected folders](#allow-specific-apps-to-make-changes-to-controlled-folders)
|
|
||||||
- [Allow signed executable files to access protected folders](#allow-signed-executable-files-to-access-protected-folders)
|
|
||||||
- [Customize the notification](#customize-the-notification)
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> Controlled folder access monitors apps for activities that are detected as malicious. Sometimes, legitimate apps are blocked from making changes to your files. If controlled folder access impacts your organization's productivity, you might consider running this feature in [audit mode](audit-windows-defender.md) to fully assess the impact.
|
|
||||||
|
|
||||||
## Protect additional folders
|
|
||||||
|
|
||||||
Controlled folder access applies to many system folders and default locations, including folders such as **Documents**, **Pictures**, and **Movies**. You can add additional folders to be protected, but you cannot remove the default folders in the default list.
|
|
||||||
|
|
||||||
Adding other folders to controlled folder access can be helpful for cases when you don't store files in the default Windows libraries, or you've changed the default location of your libraries.
|
|
||||||
|
|
||||||
You can also specify network shares and mapped drives. Environment variables and wildcards are supported. For information about using wildcards, see [Use wildcards in the file name and folder path or extension exclusion lists](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists).
|
|
||||||
|
|
||||||
You can use the Windows Security app, Group Policy, PowerShell cmdlets, or mobile device management configuration service providers to add and remove additional protected folders.
|
|
||||||
|
|
||||||
### Use the Windows Security app to protect additional folders
|
|
||||||
|
|
||||||
1. Open the Windows Security app by selecting the shield icon in the task bar or searching the start menu for **Security**.
|
|
||||||
|
|
||||||
2. Select **Virus & threat protection**, and then scroll down to the **Ransomware protection** section.
|
|
||||||
|
|
||||||
3. Select **Manage ransomware protection** to open the **Ransomware protection** pane.
|
|
||||||
|
|
||||||
4. Under the **Controlled folder access** section, select **Protected folders**.
|
|
||||||
|
|
||||||
5. Choose **Yes** on the **User Access Control** prompt. The **Protected folders** pane displays.
|
|
||||||
|
|
||||||
4. Select **Add a protected folder** and follow the prompts to add folders.
|
|
||||||
|
|
||||||
### Use Group Policy to protect additional folders
|
|
||||||
|
|
||||||
1. On your Group Policy management computer, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)?preserve=true), right-click the Group Policy Object you want to configure, and then and select **Edit**.
|
|
||||||
|
|
||||||
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
|
|
||||||
|
|
||||||
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Windows Defender Exploit Guard** > **Controlled folder access**.
|
|
||||||
|
|
||||||
4. Double-click **Configured protected folders** and set the option to **Enabled**. Select **Show** and enter each folder.
|
|
||||||
|
|
||||||
### Use PowerShell to protect additional folders
|
|
||||||
|
|
||||||
1. Type **PowerShell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**
|
|
||||||
|
|
||||||
2. Enter the following cmdlet:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
Add-MpPreference -ControlledFolderAccessProtectedFolders "<the folder to be protected>"
|
|
||||||
```
|
|
||||||
3. Repeat step 2 until you have added all the folders you want to protect. Folders that are added are visible in the Windows Security app.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
|
|
||||||
|
|
||||||
### Use MDM CSPs to protect additional folders
|
|
||||||
|
|
||||||
Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-guardedfolderslist) configuration service provider (CSP) to allow apps to make changes to protected folders.
|
|
||||||
|
|
||||||
## Allow specific apps to make changes to controlled folders
|
|
||||||
|
|
||||||
You can specify if certain apps are always considered safe and give write access to files in protected folders. Allowing apps can be useful if a particular app you know and trust is being blocked by the controlled folder access feature.
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> By default, Windows adds apps that are considered friendly to the allowed list. Such apps that are added automatically are not recorded in the list shown in the Windows Security app or by using the associated PowerShell cmdlets. You shouldn't need to add most apps. Only add apps if they are being blocked and you can verify their trustworthiness.
|
|
||||||
|
|
||||||
When you add an app, you have to specify the app's location. Only the app in that location will be permitted access to the protected folders. If the app (with the same name) is in a different location, it will not be added to the allow list and may be blocked by controlled folder access.
|
|
||||||
|
|
||||||
An allowed application or service only has write access to a controlled folder after it starts. For example, an update service will continue to trigger events after it's allowed until it is stopped and restarted.
|
|
||||||
|
|
||||||
### Use the Windows Defender Security app to allow specific apps
|
|
||||||
|
|
||||||
1. Open the Windows Security app by searching the start menu for **Security**.
|
|
||||||
|
|
||||||
2. Select the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then select **Manage ransomware protection**.
|
|
||||||
|
|
||||||
3. Under the **Controlled folder access** section, select **Allow an app through Controlled folder access**
|
|
||||||
|
|
||||||
4. Select **Add an allowed app** and follow the prompts to add apps.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Use Group Policy to allow specific apps
|
|
||||||
|
|
||||||
1. On your Group Policy management device, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)?preserve=true), right-click the Group Policy Object you want to configure and select **Edit**.
|
|
||||||
|
|
||||||
2. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
|
|
||||||
|
|
||||||
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Windows Defender Exploit Guard** > **Controlled folder access**.
|
|
||||||
|
|
||||||
4. Double-click the **Configure allowed applications** setting and set the option to **Enabled**. Select **Show** and enter each app.
|
|
||||||
|
|
||||||
### Use PowerShell to allow specific apps
|
|
||||||
|
|
||||||
1. Type **PowerShell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**
|
|
||||||
2. Enter the following cmdlet:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
Add-MpPreference -ControlledFolderAccessAllowedApplications "<the app that should be allowed, including the path>"
|
|
||||||
```
|
|
||||||
|
|
||||||
For example, to add the executable *test.exe* located in the folder *C:\apps*, the cmdlet would be as follows:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
Add-MpPreference -ControlledFolderAccessAllowedApplications "c:\apps\test.exe"
|
|
||||||
```
|
|
||||||
|
|
||||||
Continue to use `Add-MpPreference -ControlledFolderAccessAllowedApplications` to add more apps to the list. Apps added using this cmdlet will appear in the Windows Security app.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> Use `Add-MpPreference` to append or add apps to the list. Using the `Set-MpPreference` cmdlet will overwrite the existing list.
|
|
||||||
|
|
||||||
### Use MDM CSPs to allow specific apps
|
|
||||||
|
|
||||||
Use the [./Vendor/MSFT/Policy/Config/Defender/GuardedFoldersAllowedApplications](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-guardedfoldersallowedapplications) configuration service provider (CSP) to allow apps to make changes to protected folders.
|
|
||||||
|
|
||||||
## Allow signed executable files to access protected folders
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint certificate and file indicators can allow signed executable files to access protected folders. For implementation details, see [Create indicators based on certificates](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates).
|
|
||||||
|
|
||||||
> [!Note]
|
|
||||||
> This does no apply to scripting engines, including Powershell
|
|
||||||
|
|
||||||
## Customize the notification
|
|
||||||
|
|
||||||
For more information about customizing the notification when a rule is triggered and blocks an app or file, see [Configure alert notifications in Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications).
|
|
||||||
|
|
||||||
## See also
|
|
||||||
|
|
||||||
- [Protect important folders with controlled folder access](controlled-folders.md)
|
|
||||||
- [Enable controlled folder access](enable-controlled-folders.md)
|
|
||||||
- [Evaluate attack surface reduction rules](evaluate-attack-surface-reduction.md)
|
|
@ -1,365 +0,0 @@
|
|||||||
---
|
|
||||||
title: Address false positives/negatives in Microsoft Defender for Endpoint
|
|
||||||
description: Learn how to handle false positives or false negatives in Microsoft Defender for Endpoint.
|
|
||||||
keywords: alert, exclusion, defender atp, false positive, false negative
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.technology: mde
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: deniseb
|
|
||||||
author: denisebmsft
|
|
||||||
ms.date: 02/11/2021
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
- m365solution-scenario
|
|
||||||
- m365scenario-fpfn
|
|
||||||
ms.topic: how-to
|
|
||||||
ms.reviewer: ramarom, evaldm, isco, mabraitm, chriggs, yonghree, jcedola
|
|
||||||
ms.custom: FPFN
|
|
||||||
---
|
|
||||||
|
|
||||||
# Address false positives/negatives in Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146806)
|
|
||||||
|
|
||||||
In endpoint protection solutions, a false positive is an entity, such as a file or a process, that was detected and identified as malicious, even though the entity isn't actually a threat. A false negative is an entity that was not detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including [Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection).
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Fortunately, steps can be taken to address and reduce these kinds of issues. If you're seeing false positives/negatives in your [Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/use), your security operations can take steps to address them by using the following process:
|
|
||||||
|
|
||||||
1. [Review and classify alerts](#part-1-review-and-classify-alerts)
|
|
||||||
2. [Review remediation actions that were taken](#part-2-review-remediation-actions)
|
|
||||||
3. [Review and define exclusions](#part-3-review-or-define-exclusions)
|
|
||||||
4. [Submit an entity for analysis](#part-4-submit-a-file-for-analysis)
|
|
||||||
5. [Review and adjust your threat protection settings](#part-5-review-and-adjust-your-threat-protection-settings)
|
|
||||||
|
|
||||||
And, you can [get help if you still have issues with false positives/negatives](#still-need-help) after performing the tasks described in this article.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> This article is intended as guidance for security operators and security administrators who are using [Microsoft Defender for Endpoint](microsoft-defender-advanced-threat-protection.md).
|
|
||||||
|
|
||||||
## Part 1: Review and classify alerts
|
|
||||||
|
|
||||||
If you see an [alert](alerts.md) that was triggered because something was detected as malicious or suspicious that should not have been, you can suppress the alert for that entity. You can also suppress alerts that are not necessarily false positives, but are unimportant. We recommend that you classify alerts as well.
|
|
||||||
|
|
||||||
Managing your alerts and classifying true/false positives helps to train your threat protection solution and can reduce the number of false positives or false negatives over time. Taking these steps also helps reduce noise in your security operations dashboard so that your security team can focus on higher priority work items.
|
|
||||||
|
|
||||||
### Determine whether an alert is accurate
|
|
||||||
|
|
||||||
Before you classify or suppress an alert, determine whether the alert is accurate, a false positive, or benign.
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
|
||||||
2. In the navigation pane, choose **Alerts queue**.
|
|
||||||
3. Select an alert to more details about the alert. (See [Review alerts](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/review-alerts).)
|
|
||||||
4. Depending on the alert status, take the steps described in the following table:
|
|
||||||
|
|
||||||
| Alert status | What to do |
|
|
||||||
|:---|:---|
|
|
||||||
| The alert is accurate | Assign the alert, and then [investigate it](investigate-alerts.md) further. |
|
|
||||||
| The alert is a false positive | 1. [Classify the alert](#classify-an-alert) as a false positive. <br/>2. [Suppress the alert](#suppress-an-alert). <br/> 3. [Create an indicator](#indicators-for-microsoft-defender-for-endpoint) for Microsoft Defender for Endpoint. <br/> 4. [Submit a file to Microsoft for analysis](#part-4-submit-a-file-for-analysis). |
|
|
||||||
| The alert is accurate, but benign (unimportant) | [Classify the alert](#classify-an-alert) as a true positive, and then [suppress the alert](#suppress-an-alert). |
|
|
||||||
|
|
||||||
### Classify an alert
|
|
||||||
|
|
||||||
Alerts can be classified as false positives or true positives in the Microsoft Defender Security Center. Classifying alerts helps train Microsoft Defender for Endpoint so that, over time, you'll see more true alerts and fewer false alerts.
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
|
||||||
2. Select **Alerts queue**, and then select an alert.
|
|
||||||
3. For the selected alert, select **Actions** > **Manage alert**. A flyout pane opens.
|
|
||||||
4. In the **Manage alert** section, select either **True alert** or **False alert**. (Use **False alert** to classify a false positive.)
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> For more information about suppressing alerts, see [Manage Microsoft Defender for Endpoint alerts](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-alerts). And, if your organization is using a security information and event management (SIEM) server, make sure to define a suppression rule there, too.
|
|
||||||
|
|
||||||
### Suppress an alert
|
|
||||||
|
|
||||||
If you have alerts that are either false positives or that are true positives but for unimportant events, you can suppress those alerts in the Microsoft Defender Security Center. Suppressing alerts helps reduce noise in your security operations dashboard.
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
|
||||||
2. In the navigation pane, select **Alerts queue**.
|
|
||||||
3. Select an alert that you want to suppress to open its **Details** pane.
|
|
||||||
4. In the **Details** pane, choose the ellipsis (**...**), and then **Create a suppression rule**.
|
|
||||||
5. Specify all the settings for your suppression rule, and then choose **Save**.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Need help with suppression rules? See [Suppress an alert and create a new suppression rule](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-alerts#suppress-an-alert-and-create-a-new-suppression-rule).
|
|
||||||
|
|
||||||
## Part 2: Review remediation actions
|
|
||||||
|
|
||||||
[Remediation actions](manage-auto-investigation.md#remediation-actions), such as sending a file to quarantine or stopping a process, are taken on entities (such as files) that are detected as threats. Several types of remediation actions occur automatically through automated investigation and Microsoft Defender Antivirus:
|
|
||||||
- Quarantine a file
|
|
||||||
- Remove a registry key
|
|
||||||
- Kill a process
|
|
||||||
- Stop a service
|
|
||||||
- Disable a driver
|
|
||||||
- Remove a scheduled task
|
|
||||||
|
|
||||||
Other actions, such as starting an antivirus scan or collecting an investigation package, occur manually or through [Live Response](live-response.md). Actions taken through Live Response cannot be undone.
|
|
||||||
|
|
||||||
After you have reviewed your alerts, your next step is to [review remediation actions](manage-auto-investigation.md). If any actions were taken as a result of false positives, you can undo most kinds of remediation actions. Specifically, you can:
|
|
||||||
- [Undo one action at a time](#undo-an-action);
|
|
||||||
- [Undo multiple actions at one time](#undo-multiple-actions-at-one-time); and
|
|
||||||
- [Remove a file from quarantine across multiple devices](#remove-a-file-from-quarantine-across-multiple-devices).
|
|
||||||
|
|
||||||
When you're done reviewing and undoing actions that were taken as a result of false positives, proceed to [review or define exclusions](#part-3-review-or-define-exclusions).
|
|
||||||
|
|
||||||
### Review completed actions
|
|
||||||
|
|
||||||
1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in.
|
|
||||||
2. Select the **History** tab to view a list of actions that were taken.
|
|
||||||
3. Select an item to view more details about the remediation action that was taken.
|
|
||||||
|
|
||||||
### Undo an action
|
|
||||||
|
|
||||||
1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in.
|
|
||||||
2. On the **History** tab, select an action that you want to undo.
|
|
||||||
3. In the flyout pane, select **Undo**. If the action cannot be undone with this method, you will not see an **Undo** button. (To learn more, see [Undo completed actions](manage-auto-investigation.md#undo-completed-actions).)
|
|
||||||
|
|
||||||
### Undo multiple actions at one time
|
|
||||||
|
|
||||||
1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in.
|
|
||||||
2. On the **History** tab, select the actions that you want to undo.
|
|
||||||
3. In the pane on the right side of the screen, select **Undo**.
|
|
||||||
|
|
||||||
### Remove a file from quarantine across multiple devices
|
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
|
||||||
> 
|
|
||||||
|
|
||||||
1. Go to the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and sign in.
|
|
||||||
2. On the **History** tab, select a file that has the Action type **Quarantine file**.
|
|
||||||
3. In the pane on the right side of the screen, select **Apply to X more instances of this file**, and then select **Undo**.
|
|
||||||
|
|
||||||
## Part 3: Review or define exclusions
|
|
||||||
|
|
||||||
An exclusion is an entity, such as a file or URL, that you specify as an exception to remediation actions. The excluded entity can still get detected, but no remediation actions are taken on that entity. That is, the detected file or process won’t be stopped, sent to quarantine, removed, or otherwise changed by Microsoft Defender for Endpoint.
|
|
||||||
|
|
||||||
To define exclusions across Microsoft Defender for Endpoint, perform the following tasks:
|
|
||||||
- [Define exclusions for Microsoft Defender Antivirus](#exclusions-for-microsoft-defender-antivirus)
|
|
||||||
- [Create “allow” indicators for Microsoft Defender for Endpoint](#indicators-for-microsoft-defender-for-endpoint)
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Microsoft Defender Antivirus exclusions apply only to antivirus protection, not across other Microsoft Defender for Endpoint capabilities. To exclude files broadly, use exclusions for Microsoft Defender Antivirus and [custom indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators) for Microsoft Defender for Endpoint.
|
|
||||||
|
|
||||||
The procedures in this section describe how to define exclusions and indicators.
|
|
||||||
|
|
||||||
### Exclusions for Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
In general, you should not need to define exclusions for Microsoft Defender Antivirus. Make sure that you define exclusions sparingly, and that you only include the files, folders, processes, and process-opened files that are resulting in false positives. In addition, make sure to review your defined exclusions regularly. We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview) to define or edit your antivirus exclusions; however, you can use other methods, such as [Group Policy](https://docs.microsoft.com/azure/active-directory-domain-services/manage-group-policy) (see [Manage Microsoft Defender for Endpoint](manage-atp-post-migration.md)).
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Need help with antivirus exclusions? See [Configure and validate exclusions for Microsoft Defender Antivirus scans](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
#### Use Microsoft Endpoint Manager to manage antivirus exclusions (for existing policies)
|
|
||||||
|
|
||||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
|
||||||
2. Choose **Endpoint security** > **Antivirus**, and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to [the next procedure](#use-microsoft-endpoint-manager-to-create-a-new-antivirus-policy-with-exclusions)).
|
|
||||||
3. Choose **Properties**, and next to **Configuration settings**, choose **Edit**.
|
|
||||||
4. Expand **Microsoft Defender Antivirus Exclusions** and then specify your exclusions.
|
|
||||||
5. Choose **Review + save**, and then choose **Save**.
|
|
||||||
|
|
||||||
#### Use Microsoft Endpoint Manager to create a new antivirus policy with exclusions
|
|
||||||
|
|
||||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
|
||||||
2. Choose **Endpoint security** > **Antivirus** > **+ Create Policy**.
|
|
||||||
3. Select a platform (such as **Windows 10 and later**, **macOS**, or **Windows 10 and Windows Server**).
|
|
||||||
4. For **Profile**, select **Microsoft Defender Antivirus exclusions**, and then choose **Create**.
|
|
||||||
5. Specify a name and description for the profile, and then choose **Next**.
|
|
||||||
6. On the **Configuration settings** tab, specify your antivirus exclusions, and then choose **Next**.
|
|
||||||
7. On the **Scope tags** tab, if you are using scope tags in your organization, specify scope tags for the policy you are creating. (See [Scope tags](https://docs.microsoft.com/mem/intune/fundamentals/scope-tags).)
|
|
||||||
8. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](https://docs.microsoft.com/mem/intune/configuration/device-profile-assign).)
|
|
||||||
9. On the **Review + create** tab, review the settings, and then choose **Create**.
|
|
||||||
|
|
||||||
### Indicators for Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
[Indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators) (specifically, indicators of compromise, or IoCs) enable your security operations team to define the detection, prevention, and exclusion of entities. For example, you can specify certain files to be omitted from scans and remediation actions in Microsoft Defender for Endpoint. Or, indicators can be used to generate alerts for certain files, IP addresses, or URLs.
|
|
||||||
|
|
||||||
To specify entities as exclusions for Microsoft Defender for Endpoint, create "allow" indicators for those entities. Such "allow" indicators in Microsoft Defender for Endpoint apply to [next-generation protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10), [endpoint detection and response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response), and [automated investigation & remediation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations).
|
|
||||||
|
|
||||||
"Allow" indicators can be created for:
|
|
||||||
|
|
||||||
- [Files](#indicators-for-files)
|
|
||||||
- [IP addresses, URLs, and domains](#indicators-for-ip-addresses-urls-or-domains)
|
|
||||||
- [Application certificates](#indicators-for-application-certificates)
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
#### Indicators for files
|
|
||||||
|
|
||||||
When you [create an "allow" indicator for a file, such as an executable](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-file), it helps prevent files that your organization is using from being blocked. Files can include portable executable (PE) files, such as `.exe` and `.dll` files.
|
|
||||||
|
|
||||||
Before you create indicators for files, make sure the following requirements are met:
|
|
||||||
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see [Manage cloud-based protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus))
|
|
||||||
- Antimalware client version is 4.18.1901.x or later
|
|
||||||
- Devices are running Windows 10, version 1703 or later; Windows Server 2016; or Windows Server 2019
|
|
||||||
- The [Block or allow feature is turned on](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-features)
|
|
||||||
|
|
||||||
#### Indicators for IP addresses, URLs, or domains
|
|
||||||
|
|
||||||
When you [create an "allow" indicator for an IP address, URL, or domain](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-ip-domain), it helps prevent the sites or IP addresses your organization uses from being blocked.
|
|
||||||
|
|
||||||
Before you create indicators for IP addresses, URLs, or domains, make sure the following requirements are met:
|
|
||||||
- Network protection in Defender for Endpoint is enabled in block mode (see [Enable network protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-network-protection))
|
|
||||||
- Antimalware client version is 4.18.1906.x or later
|
|
||||||
- Devices are running Windows 10, version 1709, or later
|
|
||||||
|
|
||||||
Custom network indicators are turned on in the Microsoft Defender Security Center (see [Advanced features](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-features))
|
|
||||||
|
|
||||||
#### Indicators for application certificates
|
|
||||||
|
|
||||||
When you [create an "allow" indicator for an application certificate](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/indicator-certificates), it helps prevent applications, such as internally developed applications, that your organization uses from being blocked. `.CER` or `.PEM` file extensions are supported.
|
|
||||||
|
|
||||||
Before you create indicators for application certificates, make sure the following requirements are met:
|
|
||||||
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see [Manage cloud-based protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus))
|
|
||||||
- Antimalware client version is 4.18.1901.x or later
|
|
||||||
- Devices are running Windows 10, version 1703 or later; Windows Server 2016; or Windows Server 2019
|
|
||||||
- Virus and threat protection definitions are up to date
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> When you create indicators, you can define them one by one, or import multiple items at once. Keep in mind there's a limit of 15,000 indicators for a single tenant. And, you might need to gather certain details first, such as file hash information. Make sure to review the prerequisites before you [create indicators](manage-indicators.md).
|
|
||||||
|
|
||||||
## Part 4: Submit a file for analysis
|
|
||||||
|
|
||||||
You can submit entities, such as files and fileless detections, to Microsoft for analysis. Microsoft security researchers analyze all submissions, and their results help inform Microsoft Defender for Endpoint threat protection capabilities. When you sign in at the submission site, you can track your submissions.
|
|
||||||
|
|
||||||
### Submit a file for analysis
|
|
||||||
|
|
||||||
If you have a file that was either wrongly detected as malicious or was missed, follow these steps to submit the file for analysis.
|
|
||||||
|
|
||||||
1. Review the guidelines here: [Submit files for analysis](https://docs.microsoft.com/windows/security/threat-protection/intelligence/submission-guide).
|
|
||||||
2. Visit the Microsoft Security Intelligence submission site ([https://www.microsoft.com/wdsi/filesubmission](https://www.microsoft.com/wdsi/filesubmission)), and submit your file(s).
|
|
||||||
|
|
||||||
### Submit a fileless detection for analysis
|
|
||||||
|
|
||||||
If something was detected as malware based on behavior, and you don’t have a file, you can submit your `Mpsupport.cab` file for analysis. You can get the *.cab* file by using the Microsoft Malware Protection Command-Line Utility (MPCmdRun.exe) tool on Windows 10.
|
|
||||||
|
|
||||||
1. Go to ` C:\ProgramData\Microsoft\Windows Defender\Platform\<version>`, and then run `MpCmdRun.exe` as an administrator.
|
|
||||||
2. Type `mpcmdrun.exe -GetFiles`, and then press **Enter**.
|
|
||||||
A .cab file is generated that contains various diagnostic logs. The location of the file is specified in the output of the command prompt. By default, the location is `C:\ProgramData\Microsoft\Microsoft Defender\Support\MpSupportFiles.cab`.
|
|
||||||
3. Review the guidelines here: [Submit files for analysis](https://docs.microsoft.com/windows/security/threat-protection/intelligence/submission-guide).
|
|
||||||
4. Visit the Microsoft Security Intelligence submission site ([https://www.microsoft.com/wdsi/filesubmission](https://www.microsoft.com/wdsi/filesubmission)), and submit your .cab files.
|
|
||||||
|
|
||||||
### What happens after a file is submitted?
|
|
||||||
|
|
||||||
Your submission is immediately scanned by our systems to give you the latest determination even before an analyst starts handling your case. It’s possible that a file might have already been submitted and processed by an analyst. In those cases, a determination is made quickly.
|
|
||||||
|
|
||||||
For submissions that were not already processed, they are prioritized for analysis as follows:
|
|
||||||
|
|
||||||
- Prevalent files with the potential to impact large numbers of computers are given a higher priority.
|
|
||||||
- Authenticated customers, especially enterprise customers with valid [Software Assurance IDs (SAIDs)](https://www.microsoft.com/licensing/licensing-programs/software-assurance-default.aspx), are given a higher priority.
|
|
||||||
- Submissions flagged as high priority by SAID holders are given immediate attention.
|
|
||||||
|
|
||||||
To check for updates regarding your submission, sign in at the [Microsoft Security Intelligence submission site](https://www.microsoft.com/wdsi/filesubmission).
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> To learn more, see [Submit files for analysis](https://docs.microsoft.com/windows/security/threat-protection/intelligence/submission-guide#how-does-microsoft-prioritize-submissions).
|
|
||||||
|
|
||||||
## Part 5: Review and adjust your threat protection settings
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint offers a wide variety of options, including the ability to fine-tune settings for various features and capabilities. If you’re getting numerous false positives, make sure to review your organization’s threat protection settings. You might need to make some adjustments to:
|
|
||||||
|
|
||||||
- [Cloud-delivered protection](#cloud-delivered-protection)
|
|
||||||
- [Remediation for potentially unwanted applications](#remediation-for-potentially-unwanted-applications)
|
|
||||||
- [Automated investigation and remediation](#automated-investigation-and-remediation)
|
|
||||||
|
|
||||||
### Cloud-delivered protection
|
|
||||||
|
|
||||||
Check your cloud-delivered protection level for Microsoft Defender Antivirus. By default, cloud-delivered protection is set to **Not configured**, which corresponds to a normal level of protection for most organizations. If your cloud-delivered protection is set to **High**, **High +**, or **Zero tolerance**, you might experience a higher number of false positives.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> To learn more about configuring your cloud-delivered protection, see [Specify the cloud-delivered protection level](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview) to edit or set your cloud-delivered protection settings; however, you can use other methods, such as [Group Policy](https://docs.microsoft.com/azure/active-directory-domain-services/manage-group-policy) (see [Manage Microsoft Defender for Endpoint](manage-atp-post-migration.md)).
|
|
||||||
|
|
||||||
#### Use Microsoft Endpoint Manager to review and edit cloud-delivered protection settings (for existing policies)
|
|
||||||
|
|
||||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
|
||||||
2. Choose **Endpoint security** > **Antivirus** and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to [the next procedure](#use-microsoft-endpoint-manager-to-set-cloud-delivered-protection-settings-for-a-new-policy)).
|
|
||||||
3. Under **Manage**, select **Properties**. Then, next to **Configuration settings**, choose **Edit**.
|
|
||||||
4. Expand **Cloud protection**, and review your current setting in the **Cloud-delivered protection level** row. We recommend setting cloud-delivered protection to **Not configured**, which provides strong protection while reducing the chances of getting false positives.
|
|
||||||
5. Choose **Review + save**, and then **Save**.
|
|
||||||
|
|
||||||
#### Use Microsoft Endpoint Manager to set cloud-delivered protection settings (for a new policy)
|
|
||||||
|
|
||||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
|
||||||
2. Choose **Endpoint security** > **Antivirus** > **+ Create policy**.
|
|
||||||
3. For **Platform**, select an option, and then for **Profile**, select **Antivirus** or **Microsoft Defender Antivirus** (the specific option depends on what you selected for **Platform**.) Then choose **Create**.
|
|
||||||
4. On the **Basics** tab, specify a name and description for the policy. Then choose **Next**.
|
|
||||||
5. On the **Configuration settings** tab, expand **Cloud protection**, and specify the following settings:
|
|
||||||
- Set **Turn on cloud-delivered protection** to **Yes**.
|
|
||||||
- Set **Cloud-delivered protection level** to **Not configured**. (This level provides a strong level of protection by default while reducing the chances of getting false positives.)
|
|
||||||
6. On the **Scope tags** tab, if you are using scope tags in your organization, specify scope tags for the policy. (See [Scope tags](https://docs.microsoft.com/mem/intune/fundamentals/scope-tags).)
|
|
||||||
8. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](https://docs.microsoft.com/mem/intune/configuration/device-profile-assign).)
|
|
||||||
9. On the **Review + create** tab, review the settings, and then choose **Create**.
|
|
||||||
|
|
||||||
### Remediation for potentially unwanted applications
|
|
||||||
|
|
||||||
Potentially unwanted applications (PUA) are a category of software that can cause devices to run slowly, display unexpected ads, or install other software that might be unexpected or unwanted. Examples of PUA include advertising software, bundling software, and evasion software that behaves differently with security products. Although PUA is not considered malware, some kinds of software are PUA based on their behavior and reputation.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> To learn more about PUA, see [Detect and block potentially unwanted applications](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
Depending on the apps your organization is using, you might be getting false positives as a result of your PUA protection settings. If necessary, consider running PUA protection in audit mode for a while, or apply PUA protection to a subset of devices in your organization. PUA protection can be configured for the Microsoft Edge browser and for Microsoft Defender Antivirus.
|
|
||||||
|
|
||||||
We recommend using [Microsoft Endpoint Manager](https://docs.microsoft.com/mem/endpoint-manager-overview) to edit or set PUA protection settings; however, you can use other methods, such as [Group Policy](https://docs.microsoft.com/azure/active-directory-domain-services/manage-group-policy) (see [Manage Microsoft Defender for Endpoint](manage-atp-post-migration.md)).
|
|
||||||
|
|
||||||
#### Use Microsoft Endpoint Manager to edit PUA protection (for existing configuration profiles)
|
|
||||||
|
|
||||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
|
||||||
2. Choose **Devices** > **Configuration profiles**, and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to [the next procedure](#use-microsoft-endpoint-manager-to-set-pua-protection-for-a-new-configuration-profile).)
|
|
||||||
3. Under **Manage**, choose **Properties**, and then, next to **Configuration settings**, choose **Edit**.
|
|
||||||
4. On the **Configuration settings** tab, scroll down and expand **Microsoft Defender Antivirus**.
|
|
||||||
5. Set **Detect potentially unwanted applications** to **Audit**. (You can turn it off, but by using audit mode, you will be able to see detections.)
|
|
||||||
6. Choose **Review + save**, and then choose **Save**.
|
|
||||||
|
|
||||||
#### Use Microsoft Endpoint Manager to set PUA protection (for a new configuration profile)
|
|
||||||
|
|
||||||
1. Go to the Microsoft Endpoint Manager admin center ([https://endpoint.microsoft.com](https://endpoint.microsoft.com)) and sign in.
|
|
||||||
2. Choose **Devices** > **Configuration profiles** > **+ Create profile**.
|
|
||||||
3. For the **Platform**, choose **Windows 10 and later**, and for **Profile**, select **Device restrictions**.
|
|
||||||
4. On the **Basics** tab, specify a name and description for your policy. Then choose **Next**.
|
|
||||||
5. On the **Configuration settings** tab, scroll down and expand **Microsoft Defender Antivirus**.
|
|
||||||
6. Set **Detect potentially unwanted applications** to **Audit**, and then choose **Next**. (You can turn off PUA protection, but by using audit mode, you will be able to see detections.)
|
|
||||||
7. On the **Assignments** tab, specify the users and groups to whom your policy should be applied, and then choose **Next**. (If you need help with assignments, see [Assign user and device profiles in Microsoft Intune](https://docs.microsoft.com/mem/intune/configuration/device-profile-assign).)
|
|
||||||
8. On the **Applicability Rules** tab, specify the OS editions or versions to include or exclude from the policy. For example, you can set the policy to be applied to all devices certain editions of Windows 10. Then choose **Next**.
|
|
||||||
9. On the **Review + create** tab, review your settings, and, and then choose **Create**.
|
|
||||||
|
|
||||||
### Automated investigation and remediation
|
|
||||||
|
|
||||||
[Automated investigation and remediation](automated-investigations.md) (AIR) capabilities are designed to examine alerts and take immediate action to resolve breaches. As alerts are triggered, and an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *No threats found*.
|
|
||||||
|
|
||||||
Depending on the [level of automation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automation-levels) set for your organization and other security settings, remediation actions are taken on artifacts that are considered to be *Malicious* or *Suspicious*. In some cases, remediation actions occur automatically; in other cases, remediation actions are taken manually or only upon approval by your security operations team.
|
|
||||||
|
|
||||||
- [Learn more about automation levels](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automation-levels); and then
|
|
||||||
- [Configure AIR capabilities in Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-automated-investigations-remediation).
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> We recommend using *Full automation* for automated investigation and remediation. Don't turn these capabilities off because of a false positive. Instead, use ["allow" indicators to define exceptions](#indicators-for-microsoft-defender-for-endpoint), and keep automated investigation and remediation set to take appropriate actions automatically. Following [this guidance](automation-levels.md#levels-of-automation) helps reduce the number of alerts your security operations team must handle.
|
|
||||||
|
|
||||||
## Still need help?
|
|
||||||
|
|
||||||
If you have worked through all the steps in this article and still need help, contact technical support.
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
|
||||||
2. In the upper right corner, select the question mark (**?**), and then select **Microsoft support**.
|
|
||||||
3. In the Support Assistant window, describe your issue, and then send your message. From there, you can open a service request.
|
|
||||||
|
|
||||||
## See also
|
|
||||||
|
|
||||||
[Manage Microsoft Defender for Endpoint](manage-atp-post-migration.md)
|
|
||||||
|
|
||||||
[Overview of Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/use)
|
|
@ -1,114 +0,0 @@
|
|||||||
---
|
|
||||||
title: See how Exploit protection works in a demo
|
|
||||||
description: See how Exploit Protection can prevent suspicious behaviors from occurring on specific apps.
|
|
||||||
keywords: Exploit protection, exploits, kernel, events, evaluate, demo, try, mitigation
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: manage
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
audience: ITPro
|
|
||||||
author: denisebmsft
|
|
||||||
ms.author: deniseb
|
|
||||||
ms.date: 01/06/2021
|
|
||||||
ms.reviewer:
|
|
||||||
manager: dansimp
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Evaluate exploit protection
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-enablesiem-abovefoldlink)
|
|
||||||
|
|
||||||
|
|
||||||
[Exploit protection](exploit-protection.md) helps protect devices from malware that uses exploits to spread and infect other devices. Mitigation can be applied to either the operating system or to an individual app. Many of the features that were part of the Enhanced Mitigation Experience Toolkit (EMET) are included in exploit protection. (The EMET has reached its end of support.)
|
|
||||||
|
|
||||||
In audit, you can see how mitigation works for certain apps in a test environment. This shows what *would* have happened if you enabled exploit protection in your production environment. This way, you can verify that exploit protection doesn't adversely affect your line-of-business apps, and see which suspicious or malicious events occur.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> You can also visit the Microsoft Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to see how exploit protection works.
|
|
||||||
|
|
||||||
## Enable exploit protection for testing
|
|
||||||
|
|
||||||
You can set mitigations in a testing mode for specific programs by using the Windows Security app or Windows PowerShell.
|
|
||||||
|
|
||||||
### Windows Security app
|
|
||||||
|
|
||||||
1. Open the Windows Security app. Select the shield icon in the task bar or search the start menu for **Defender**.
|
|
||||||
|
|
||||||
2. Select the **App & browser control** tile (or the app icon on the left menu bar) and then select **Exploit protection**.
|
|
||||||
|
|
||||||
3. Go to **Program settings** and choose the app you want to apply protection to:
|
|
||||||
|
|
||||||
1. If the app you want to configure is already listed, select it and then select **Edit**
|
|
||||||
2. If the app is not listed at the top of the list select **Add program to customize**. Then, choose how you want to add the app.
|
|
||||||
- Use **Add by program name** to have the mitigation applied to any running process with that name. Specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location.
|
|
||||||
- Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want.
|
|
||||||
|
|
||||||
4. After selecting the app, you'll see a list of all the mitigations that can be applied. Choosing **Audit** will apply the mitigation in audit mode only. You'll be notified if you need to restart the process, app, or Windows.
|
|
||||||
|
|
||||||
5. Repeat this procedure for all the apps and mitigations you want to configure. Select **Apply** when you're done setting up your configuration.
|
|
||||||
|
|
||||||
### PowerShell
|
|
||||||
|
|
||||||
To set app-level mitigations to audit mode, use `Set-ProcessMitigation` with the **Audit mode** cmdlet.
|
|
||||||
|
|
||||||
Configure each mitigation in the following format:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
Set-ProcessMitigation -<scope> <app executable> -<action> <mitigation or options>,<mitigation or options>,<mitigation or options>
|
|
||||||
```
|
|
||||||
|
|
||||||
Where:
|
|
||||||
```
|
|
||||||
* \<Scope>:
|
|
||||||
* `-Name` to indicate the mitigations should be applied to a specific app. Specify the app's executable after this flag.
|
|
||||||
* \<Action>:
|
|
||||||
* `-Enable` to enable the mitigation
|
|
||||||
* `-Disable` to disable the mitigation
|
|
||||||
* \<Mitigation>:
|
|
||||||
* The mitigation's cmdlet as defined in the following table. Each mitigation is separated with a comma.
|
|
||||||
```
|
|
||||||
|Mitigation | Audit mode cmdlet |
|
|
||||||
|---|---|
|
|
||||||
|Arbitrary Code Guard (ACG) | `AuditDynamicCode` |
|
|
||||||
|Block low integrity images | `AuditImageLoad`
|
|
||||||
|Block untrusted fonts | `AuditFont`, `FontAuditOnly` |
|
|
||||||
|Code integrity guard | `AuditMicrosoftSigned`, `AuditStoreSigned` |
|
|
||||||
|Disable Win32k system calls | `AuditSystemCall` |
|
|
||||||
|Do not allow child processes | `AuditChildProcess` |
|
|
||||||
|
|
||||||
For example, to enable Arbitrary Code Guard (ACG) in audit mode for an app named *testing.exe*, run the following command:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
Set-ProcessMitigation -Name c:\apps\lob\tests\testing.exe -Enable AuditDynamicCode
|
|
||||||
```
|
|
||||||
|
|
||||||
You can disable **audit mode** by replacing `-Enable` with `-Disable`.
|
|
||||||
|
|
||||||
## Review exploit protection audit events
|
|
||||||
|
|
||||||
To review which apps would have been blocked, open Event Viewer and filter for the following events in the Security-Mitigations log.
|
|
||||||
|
|
||||||
| Feature | Provider/source | Event ID | Description |
|
|
||||||
|---|---|--|---|
|
|
||||||
| Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 1 | ACG audit |
|
|
||||||
| Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 3 | Do not allow child processes audit |
|
|
||||||
| Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 5 | Block low integrity images audit |
|
|
||||||
| Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 7 | Block remote images audit |
|
|
||||||
| Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 9 | Disable win32k system calls audit |
|
|
||||||
| Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 11 | Code integrity guard audit |
|
|
||||||
|
|
||||||
## See also
|
|
||||||
|
|
||||||
- [Enable exploit protection](enable-exploit-protection.md)
|
|
||||||
- [Configure and audit exploit protection mitigations](customize-exploit-protection.md)
|
|
||||||
- [Import, export, and deploy exploit protection configurations](import-export-exploit-protection-emet-xml.md)
|
|
||||||
- [Troubleshoot exploit protection](troubleshoot-exploit-protection-mitigations.md)
|
|
@ -1,221 +0,0 @@
|
|||||||
---
|
|
||||||
title: Create an app to access Microsoft Defender for Endpoint without a user
|
|
||||||
ms.reviewer:
|
|
||||||
description: Learn how to design a web app to get programmatic access to Microsoft Defender for Endpoint without a user.
|
|
||||||
keywords: apis, graph api, supported apis, actor, alerts, device, user, domain, ip, file, advanced hunting, query
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Create an app to access Microsoft Defender for Endpoint without a user
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:** [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
|
|
||||||
- Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!include[Microsoft Defender for Endpoint API URIs for US Government](../../includes/microsoft-defender-api-usgov.md)]
|
|
||||||
|
|
||||||
[!include[Improve request performance](../../includes/improve-request-performance.md)]
|
|
||||||
|
|
||||||
This page describes how to create an application to get programmatic access to Defender for Endpoint without a user. If you need programmatic access to Defender for Endpoint on behalf of a user, see [Get access with user context](exposed-apis-create-app-nativeapp.md). If you are not sure which access you need, see [Get started](apis-intro.md).
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint exposes much of its data and actions through a set of programmatic APIs. Those APIs will help you automate work flows and innovate based on Defender for Endpoint capabilities. The API access requires OAuth2.0 authentication. For more information, see [OAuth 2.0 Authorization Code Flow](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-code).
|
|
||||||
|
|
||||||
In general, you’ll need to take the following steps to use the APIs:
|
|
||||||
- Create an Azure Active Directory (Azure AD) application.
|
|
||||||
- Get an access token using this application.
|
|
||||||
- Use the token to access Defender for Endpoint API.
|
|
||||||
|
|
||||||
This article explains how to create an Azure AD application, get an access token to Microsoft Defender for Endpoint, and validate the token.
|
|
||||||
|
|
||||||
## Create an app
|
|
||||||
|
|
||||||
1. Log on to [Azure](https://portal.azure.com) with a user that has the **Global Administrator** role.
|
|
||||||
|
|
||||||
2. Navigate to **Azure Active Directory** > **App registrations** > **New registration**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. In the registration form, choose a name for your application, and then select **Register**.
|
|
||||||
|
|
||||||
4. To enable your app to access Defender for Endpoint and assign it **'Read all alerts'** permission, on your application page, select **API Permissions** > **Add permission** > **APIs my organization uses** >, type **WindowsDefenderATP**, and then select **WindowsDefenderATP**.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> *WindowsDefenderATP* does not appear in the original list. Start writing its name in the text box to see it appear.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- Select **Application permissions** > **Alert.Read.All**, and then select **Add permissions**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
You need to select the relevant permissions. 'Read All Alerts' is only an example. For instance:
|
|
||||||
|
|
||||||
- To [run advanced queries](run-advanced-query-api.md), select the 'Run advanced queries' permission.
|
|
||||||
- To [isolate a device](isolate-machine.md), select the 'Isolate machine' permission.
|
|
||||||
- To determine which permission you need, look at the **Permissions** section in the API you are interested to call.
|
|
||||||
|
|
||||||
5. Select **Grant consent**.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Every time you add a permission, you must select **Grant consent** for the new permission to take effect.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. To add a secret to the application, select **Certificates & secrets**, add a description to the secret, and then select **Add**.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> After you select **Add**, select **copy the generated secret value**. You won't be able to retrieve this value after you leave.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Write down your application ID and your tenant ID. On your application page, go to **Overview** and copy the following.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
8. **For Microsoft Defender for Endpoint Partners only**. Set your app to be multi-tenanted (available in all tenants after consent). This is **required** for third-party apps (for example, if you create an app that is intended to run in multiple customers' tenant). This is **not required** if you create a service that you want to run in your tenant only (for example, if you create an application for your own usage that will only interact with your own data). To set your app to be multi-tenanted:
|
|
||||||
|
|
||||||
- Go to **Authentication**, and add `https://portal.azure.com` as the **Redirect URI**.
|
|
||||||
|
|
||||||
- On the bottom of the page, under **Supported account types**, select the **Accounts in any organizational directory** application consent for your multi-tenant app.
|
|
||||||
|
|
||||||
You need your application to be approved in each tenant where you intend to use it. This is because your application interacts Defender for Endpoint on behalf of your customer.
|
|
||||||
|
|
||||||
You (or your customer if you are writing a third-party app) need to select the consent link and approve your app. The consent should be done with a user who has administrative privileges in Active Directory.
|
|
||||||
|
|
||||||
The consent link is formed as follows:
|
|
||||||
|
|
||||||
```
|
|
||||||
https://login.microsoftonline.com/common/oauth2/authorize?prompt=consent&client_id=00000000-0000-0000-0000-000000000000&response_type=code&sso_reload=true
|
|
||||||
```
|
|
||||||
|
|
||||||
Where 00000000-0000-0000-0000-000000000000 is replaced with your application ID.
|
|
||||||
|
|
||||||
|
|
||||||
**Done!** You have successfully registered an application! See examples below for token acquisition and validation.
|
|
||||||
|
|
||||||
## Get an access token
|
|
||||||
|
|
||||||
For more information on Azure AD tokens, see the [Azure AD tutorial](https://docs.microsoft.com/azure/active-directory/develop/active-directory-v2-protocols-oauth-client-creds).
|
|
||||||
|
|
||||||
### Use PowerShell
|
|
||||||
|
|
||||||
```powershell
|
|
||||||
# This script acquires the App Context Token and stores it in the variable $token for later use in the script.
|
|
||||||
# Paste your Tenant ID, App ID, and App Secret (App key) into the indicated quotes below.
|
|
||||||
|
|
||||||
$tenantId = '' ### Paste your tenant ID here
|
|
||||||
$appId = '' ### Paste your Application ID here
|
|
||||||
$appSecret = '' ### Paste your Application key here
|
|
||||||
|
|
||||||
$resourceAppIdUri = 'https://api.securitycenter.microsoft.com'
|
|
||||||
$oAuthUri = "https://login.microsoftonline.com/$TenantId/oauth2/token"
|
|
||||||
$authBody = [Ordered] @{
|
|
||||||
resource = "$resourceAppIdUri"
|
|
||||||
client_id = "$appId"
|
|
||||||
client_secret = "$appSecret"
|
|
||||||
grant_type = 'client_credentials'
|
|
||||||
}
|
|
||||||
$authResponse = Invoke-RestMethod -Method Post -Uri $oAuthUri -Body $authBody -ErrorAction Stop
|
|
||||||
$token = $authResponse.access_token
|
|
||||||
```
|
|
||||||
|
|
||||||
### Use C#:
|
|
||||||
|
|
||||||
The following code was tested with NuGet Microsoft.IdentityModel.Clients.ActiveDirectory 3.19.8.
|
|
||||||
|
|
||||||
1. Create a new console application.
|
|
||||||
1. Install NuGet [Microsoft.IdentityModel.Clients.ActiveDirectory](https://www.nuget.org/packages/Microsoft.IdentityModel.Clients.ActiveDirectory/).
|
|
||||||
1. Add the following:
|
|
||||||
|
|
||||||
```
|
|
||||||
using Microsoft.IdentityModel.Clients.ActiveDirectory;
|
|
||||||
```
|
|
||||||
|
|
||||||
1. Copy and paste the following code in your app (don't forget to update the three variables: ```tenantId, appId, appSecret```):
|
|
||||||
|
|
||||||
```
|
|
||||||
string tenantId = "00000000-0000-0000-0000-000000000000"; // Paste your own tenant ID here
|
|
||||||
string appId = "11111111-1111-1111-1111-111111111111"; // Paste your own app ID here
|
|
||||||
string appSecret = "22222222-2222-2222-2222-222222222222"; // Paste your own app secret here for a test, and then store it in a safe place!
|
|
||||||
|
|
||||||
const string authority = "https://login.microsoftonline.com";
|
|
||||||
const string wdatpResourceId = "https://api.securitycenter.microsoft.com";
|
|
||||||
|
|
||||||
AuthenticationContext auth = new AuthenticationContext($"{authority}/{tenantId}/");
|
|
||||||
ClientCredential clientCredential = new ClientCredential(appId, appSecret);
|
|
||||||
AuthenticationResult authenticationResult = auth.AcquireTokenAsync(wdatpResourceId, clientCredential).GetAwaiter().GetResult();
|
|
||||||
string token = authenticationResult.AccessToken;
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
### Use Python
|
|
||||||
|
|
||||||
See [Get token using Python](run-advanced-query-sample-python.md#get-token).
|
|
||||||
|
|
||||||
### Use Curl
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The following procedure assumes that Curl for Windows is already installed on your computer.
|
|
||||||
|
|
||||||
1. Open a command prompt, and set CLIENT_ID to your Azure application ID.
|
|
||||||
1. Set CLIENT_SECRET to your Azure application secret.
|
|
||||||
1. Set TENANT_ID to the Azure tenant ID of the customer that wants to use your app to access Defender for Endpoint.
|
|
||||||
1. Run the following command:
|
|
||||||
|
|
||||||
```
|
|
||||||
curl -i -X POST -H "Content-Type:application/x-www-form-urlencoded" -d "grant_type=client_credentials" -d "client_id=%CLIENT_ID%" -d "scope=https://securitycenter.onmicrosoft.com/windowsatpservice/.default" -d "client_secret=%CLIENT_SECRET%" "https://login.microsoftonline.com/%TENANT_ID%/oauth2/v2.0/token" -k
|
|
||||||
```
|
|
||||||
|
|
||||||
You will get an answer in the following form:
|
|
||||||
|
|
||||||
```
|
|
||||||
{"token_type":"Bearer","expires_in":3599,"ext_expires_in":0,"access_token":"eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIn <truncated> aWReH7P0s0tjTBX8wGWqJUdDA"}
|
|
||||||
```
|
|
||||||
|
|
||||||
## Validate the token
|
|
||||||
|
|
||||||
Ensure that you got the correct token:
|
|
||||||
|
|
||||||
1. Copy and paste the token you got in the previous step into [JWT](https://jwt.ms) in order to decode it.
|
|
||||||
1. Validate that you get a 'roles' claim with the desired permissions
|
|
||||||
1. In the following image, you can see a decoded token acquired from an app with permissions to all of Microsoft Defender for Endpoint's roles:
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Use the token to access Microsoft Defender for Endpoint API
|
|
||||||
|
|
||||||
1. Choose the API you want to use. For more information, see [Supported Defender for Endpoint APIs](exposed-apis-list.md).
|
|
||||||
1. Set the authorization header in the http request you send to "Bearer {token}" (Bearer is the authorization scheme).
|
|
||||||
1. The expiration time of the token is one hour. You can send more than one request with the same token.
|
|
||||||
|
|
||||||
The following is an example of sending a request to get a list of alerts **using C#**:
|
|
||||||
```
|
|
||||||
var httpClient = new HttpClient();
|
|
||||||
|
|
||||||
var request = new HttpRequestMessage(HttpMethod.Get, "https://api.securitycenter.microsoft.com/api/alerts");
|
|
||||||
|
|
||||||
request.Headers.Authorization = new AuthenticationHeaderValue("Bearer", token);
|
|
||||||
|
|
||||||
var response = httpClient.SendAsync(request).GetAwaiter().GetResult();
|
|
||||||
|
|
||||||
// Do something useful with the response
|
|
||||||
```
|
|
||||||
|
|
||||||
## See also
|
|
||||||
- [Supported Microsoft Defender for Endpoint APIs](exposed-apis-list.md)
|
|
||||||
- [Access Microsoft Defender for Endpoint on behalf of a user](exposed-apis-create-app-nativeapp.md)
|
|
@ -1,165 +0,0 @@
|
|||||||
---
|
|
||||||
title: Microsoft Defender for Endpoint for US Government customers
|
|
||||||
description: Learn about the Microsoft Defender for Endpoint for US Government customers requirements and capabilities available
|
|
||||||
keywords: government, gcc, high, requirements, capabilities, defender, defender atp, mdatp, endpoint, dod
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Microsoft Defender for Endpoint for US Government customers
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint for US Government customers, built in the US Azure Government environment, uses the same underlying technologies as Defender for Endpoint in Azure Commercial.
|
|
||||||
|
|
||||||
This offering is available to GCC, GCC High, and DoD customers and is based on the same prevention, detection, investigation, and remediation as the commercial version. However, there are some differences in the availability of capabilities for this offering.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you are a GCC customer using Defender for Endpoint in Commercial, please refer to the public documentation pages.
|
|
||||||
|
|
||||||
## Licensing requirements
|
|
||||||
Microsoft Defender for Endpoint for US Government customers requires one of the following Microsoft volume licensing offers:
|
|
||||||
|
|
||||||
### Desktop licensing
|
|
||||||
GCC | GCC High | DoD
|
|
||||||
:---|:---|:---
|
|
||||||
Windows 10 Enterprise E5 GCC | Windows 10 Enterprise E5 for GCC High | Windows 10 Enterprise E5 for DOD
|
|
||||||
| | Microsoft 365 E5 for GCC High |
|
|
||||||
| | Microsoft 365 G5 Security for GCC High |
|
|
||||||
Microsoft Defender for Endpoint - GCC | Microsoft Defender for Endpoint for GCC High | Microsoft Defender for Endpoint for DOD
|
|
||||||
|
|
||||||
### Server licensing
|
|
||||||
GCC | GCC High | DoD
|
|
||||||
:---|:---|:---
|
|
||||||
Microsoft Defender for Endpoint Server GCC | Microsoft Defender for Endpoint Server for GCC High | Microsoft Defender for Endpoint Server for DOD
|
|
||||||
Azure Defender for Servers | Azure Defender for Servers - Government | Azure Defender for Servers - Government
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> DoD licensing will only be available at DoD general availability.
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Portal URLs
|
|
||||||
The following are the Microsoft Defender for Endpoint portal URLs for US Government customers:
|
|
||||||
|
|
||||||
Customer type | Portal URL
|
|
||||||
:---|:---
|
|
||||||
GCC | https://gcc.securitycenter.microsoft.us
|
|
||||||
GCC High | https://securitycenter.microsoft.us
|
|
||||||
DoD (PREVIEW) | https://securitycenter.microsoft.us
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Endpoint versions
|
|
||||||
|
|
||||||
### Standalone OS versions
|
|
||||||
The following OS versions are supported:
|
|
||||||
|
|
||||||
OS version | GCC | GCC High | DoD (PREVIEW)
|
|
||||||
:---|:---|:---|:---
|
|
||||||
Windows 10, version 20H2 (with [KB4586853](https://support.microsoft.com/help/4586853)) |  |  | 
|
|
||||||
Windows 10, version 2004 (with [KB4586853](https://support.microsoft.com/help/4586853)) |  |  | 
|
|
||||||
Windows 10, version 1909 (with [KB4586819](https://support.microsoft.com/help/4586819)) |  |  | 
|
|
||||||
Windows 10, version 1903 (with [KB4586819](https://support.microsoft.com/help/4586819)) |  |  | 
|
|
||||||
Windows 10, version 1809 (with [KB4586839](https://support.microsoft.com/help/4586839)) |  |  | 
|
|
||||||
Windows 10, version 1803 (with [KB4598245](https://support.microsoft.com/help/4598245)) |  |  | 
|
|
||||||
Windows 10, version 1709 | <br>Note: Won't be supported |  With [KB4499147](https://support.microsoft.com/help/4499147)<br>Note: [Deprecated](https://docs.microsoft.com/lifecycle/announcements/revised-end-of-service-windows-10-1709), please upgrade | <br>Note: Won't be supported
|
|
||||||
Windows 10, version 1703 and earlier | <br>Note: Won't be supported | <br>Note: Won't be supported | <br>Note: Won't be supported
|
|
||||||
Windows Server 2019 (with [KB4586839](https://support.microsoft.com/help/4586839)) |  |  | 
|
|
||||||
Windows Server 2016 |  |  | 
|
|
||||||
Windows Server 2012 R2 |  |  | 
|
|
||||||
Windows Server 2008 R2 SP1 |  |  | 
|
|
||||||
Windows 8.1 Enterprise |  |  | 
|
|
||||||
Windows 8 Pro |  |  | 
|
|
||||||
Windows 7 SP1 Enterprise |  |  | 
|
|
||||||
Windows 7 SP1 Pro |  |  | 
|
|
||||||
Linux |  In development |  In development |  In development
|
|
||||||
macOS |  In development |  In development |  In development
|
|
||||||
Android |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
iOS |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Where a patch is specified, it must be deployed prior to device onboarding in order to configure Defender for Endpoint to the correct environment.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Trying to onboard Windows devices older than Windows 10 or Windows Server 2019 using [Microsoft Monitoring Agent](configure-server-endpoints.md#option-1-onboard-by-installing-and-configuring-microsoft-monitoring-agent-mma)? You'll need to choose "Azure US Government" under "Azure Cloud" if using the [setup wizard](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-setup-wizard), or if using a [command line](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-command-line) or a [script](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-dsc-in-azure-automation) - set the "OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE" parameter to 1.
|
|
||||||
|
|
||||||
### OS versions when using Azure Defender for Servers
|
|
||||||
The following OS versions are supported when using [Azure Defender for Servers](https://docs.microsoft.com/azure/security-center/security-center-wdatp):
|
|
||||||
|
|
||||||
OS version | GCC | GCC High | DoD (PREVIEW)
|
|
||||||
:---|:---|:---|:---
|
|
||||||
Windows Server 2016 |  |  | 
|
|
||||||
Windows Server 2012 R2 |  |  | 
|
|
||||||
Windows Server 2008 R2 SP1 |  |  | 
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Required connectivity settings
|
|
||||||
If a proxy or firewall is blocking all traffic by default and allowing only specific domains through, add the domains listed in the downloadable sheet to the allowed domains list.
|
|
||||||
|
|
||||||
The following downloadable spreadsheet lists the services and their associated URLs your network must be able to connect to. Verify there are no firewall or network filtering rules that would deny access to these URLs, or create an *allow* rule specifically for them.
|
|
||||||
|
|
||||||
Spreadsheet of domains list | Description
|
|
||||||
:-----|:-----
|
|
||||||
<br/> | Spreadsheet of specific DNS records for service locations, geographic locations, and OS. <br><br>[Download the spreadsheet here.](https://download.microsoft.com/download/8/a/5/8a51eee5-cd02-431c-9d78-a58b7f77c070/mde-urls.xlsx)
|
|
||||||
|
|
||||||
For more information, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The spreadsheet contains commercial URLs as well, make sure you check the "US Gov" tabs. <br> When filtering look for the records labeled as "US Gov" and your specific cloud under the geography column.
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## API
|
|
||||||
Instead of the public URIs listed in our [API documentation](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/apis-intro), you'll need to use the following URIs:
|
|
||||||
|
|
||||||
Endpoint type | GCC | GCC High & DoD (PREVIEW)
|
|
||||||
:---|:---|:---
|
|
||||||
Login | `https://login.microsoftonline.com` | `https://login.microsoftonline.us`
|
|
||||||
Defender for Endpoint API | `https://api-gcc.securitycenter.microsoft.us` | `https://api-gov.securitycenter.microsoft.us`
|
|
||||||
SIEM | `https://wdatp-alertexporter-us.gcc.securitycenter.windows.us` | `https://wdatp-alertexporter-us.securitycenter.windows.us`
|
|
||||||
|
|
||||||
<br>
|
|
||||||
|
|
||||||
## Feature parity with commercial
|
|
||||||
Defender for Endpoint doesn't have complete parity with the commercial offering. While our goal is to deliver all commercial features and functionality to our US Government customers, there are some capabilities not yet available we want to highlight.
|
|
||||||
|
|
||||||
These are the known gaps as of February 2021:
|
|
||||||
|
|
||||||
Feature name | GCC | GCC High | DoD (PREVIEW)
|
|
||||||
:---|:---|:---|:---
|
|
||||||
Automated investigation and remediation: Live response |  |  | 
|
|
||||||
Automated investigation and remediation: Response to Office 365 alerts |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
Email notifications |  Rolling out |  Rolling out |  Rolling out
|
|
||||||
Evaluation lab |  |  | 
|
|
||||||
Management and APIs: Device health and compliance report |  |  | 
|
|
||||||
Management and APIs: Integration with third-party products |  In development |  In development |  In development
|
|
||||||
Management and APIs: Streaming API |  |  In development |  In development
|
|
||||||
Management and APIs: Threat protection report |  |  | 
|
|
||||||
Threat & vulnerability management |  |  | 
|
|
||||||
Threat analytics |  |  | 
|
|
||||||
Web content filtering |  In development |  In development |  In development
|
|
||||||
Integrations: Azure Sentinel |  |  In development |  In development
|
|
||||||
Integrations: Microsoft Cloud App Security |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
Integrations: Microsoft Compliance Center |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
Integrations: Microsoft Defender for Identity |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
Integrations: Microsoft Defender for Office 365 |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
Integrations: Microsoft Endpoint DLP |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
||||||
Integrations: Microsoft Intune |  |  In development |  In development
|
|
||||||
Integrations: Microsoft Power Automate & Azure Logic Apps |  |  In development |  In development
|
|
||||||
Integrations: Skype for Business / Teams |  |  | 
|
|
||||||
Microsoft Threat Experts |  On engineering backlog |  On engineering backlog |  On engineering backlog
|
|
Before Width: | Height: | Size: 124 KiB |
Before Width: | Height: | Size: 6.4 KiB |
Before Width: | Height: | Size: 129 KiB |
Before Width: | Height: | Size: 107 KiB |
Before Width: | Height: | Size: 22 KiB |
Before Width: | Height: | Size: 12 KiB |
Before Width: | Height: | Size: 125 KiB |
Before Width: | Height: | Size: 136 KiB |
Before Width: | Height: | Size: 23 KiB |
Before Width: | Height: | Size: 23 KiB |
Before Width: | Height: | Size: 38 KiB |
Before Width: | Height: | Size: 70 KiB |
Before Width: | Height: | Size: 73 KiB |
Before Width: | Height: | Size: 2.8 KiB |
@ -1,95 +0,0 @@
|
|||||||
---
|
|
||||||
title: Troubleshoot missing events or alerts issues for Microsoft Defender ATP for Linux
|
|
||||||
description: Troubleshoot missing events or alerts issues in Microsoft Defender ATP for Linux.
|
|
||||||
keywords: microsoft, defender, atp, linux, events
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: dansimp
|
|
||||||
author: dansimp
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
mms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Troubleshoot missing events or alerts issues for Microsoft Defender for Endpoint for Linux
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint for Linux](microsoft-defender-atp-linux.md)
|
|
||||||
|
|
||||||
This article provides some general steps to mitigate missing events or alerts in the [security center](https://securitycenter.windows.com/) portal.
|
|
||||||
|
|
||||||
Once **Microsoft Defender for Endpoint** has been installed properly on a device, a _device page_ will be generated in the portal. You can review all recorded events in the timeline tab in the device page, or in advanced hunting page. This section troubleshoots the case of some or all expected events are missing.
|
|
||||||
For instance, if all _CreatedFile_ events are missing.
|
|
||||||
|
|
||||||
## Missing network and login events
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint utilized `audit` framework from linux to track network and login activity.
|
|
||||||
|
|
||||||
1. Make sure audit framework is working.
|
|
||||||
|
|
||||||
```bash
|
|
||||||
service auditd status
|
|
||||||
```
|
|
||||||
|
|
||||||
expected output:
|
|
||||||
|
|
||||||
```output
|
|
||||||
● auditd.service - Security Auditing Service
|
|
||||||
Loaded: loaded (/usr/lib/systemd/system/auditd.service; enabled; vendor preset: enabled)
|
|
||||||
Active: active (running) since Mon 2020-12-21 10:48:02 IST; 2 weeks 0 days ago
|
|
||||||
Docs: man:auditd(8)
|
|
||||||
https://github.com/linux-audit/audit-documentation
|
|
||||||
Process: 16689 ExecStartPost=/sbin/augenrules --load (code=exited, status=1/FAILURE)
|
|
||||||
Process: 16665 ExecStart=/sbin/auditd (code=exited, status=0/SUCCESS)
|
|
||||||
Main PID: 16666 (auditd)
|
|
||||||
Tasks: 25
|
|
||||||
CGroup: /system.slice/auditd.service
|
|
||||||
├─16666 /sbin/auditd
|
|
||||||
├─16668 /sbin/audispd
|
|
||||||
├─16670 /usr/sbin/sedispatch
|
|
||||||
└─16671 /opt/microsoft/mdatp/sbin/mdatp_audisp_plugin -d
|
|
||||||
```
|
|
||||||
|
|
||||||
2. If `auditd` is marked as stopped, start it.
|
|
||||||
|
|
||||||
```bash
|
|
||||||
service auditd start
|
|
||||||
```
|
|
||||||
|
|
||||||
**On SLES** systems, SYSCALL auditing in `auditd` might be disabled by default and can be accounted for missing events.
|
|
||||||
|
|
||||||
1. To validate that SYSCALL auditing is not disabled, list the current audit rules:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
sudo auditctl -l
|
|
||||||
```
|
|
||||||
|
|
||||||
if the following line is present, remove it or edit it to enable Microsoft Defender for Endpoint to track specific SYSCALLs.
|
|
||||||
|
|
||||||
```output
|
|
||||||
-a task, never
|
|
||||||
```
|
|
||||||
|
|
||||||
audit rules are located at `/etc/audit/rules.d/audit.rules`.
|
|
||||||
|
|
||||||
## Missing file events
|
|
||||||
|
|
||||||
File events are collected with `fanotify` framework. In case some or all file events are missing, make sure `fanotify` is enabled on the device and that the file system is [supported](microsoft-defender-atp-linux.md#system-requirements).
|
|
||||||
|
|
||||||
List the filesystems on the machine with:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
df -Th
|
|
||||||
```
|
|
@ -1,93 +0,0 @@
|
|||||||
---
|
|
||||||
title: Create and manage device groups in Microsoft Defender ATP
|
|
||||||
description: Create device groups and set automated remediation levels on them by confiring the rules that apply on the group
|
|
||||||
keywords: device groups, groups, remediation, level, rules, aad group, role, assign, rank
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Create and manage device groups
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- Azure Active Directory
|
|
||||||
- Office 365
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
|
|
||||||
In an enterprise scenario, security operation teams are typically assigned a set of devices. These devices are grouped together based on a set of attributes such as their domains, computer names, or designated tags.
|
|
||||||
|
|
||||||
In Microsoft Defender for Endpoint, you can create device groups and use them to:
|
|
||||||
- Limit access to related alerts and data to specific Azure AD user groups with [assigned RBAC roles](rbac.md)
|
|
||||||
- Configure different auto-remediation settings for different sets of devices
|
|
||||||
- Assign specific remediation levels to apply during automated investigations
|
|
||||||
- In an investigation, filter the **Devices list** to just specific device groups by using the **Group** filter.
|
|
||||||
|
|
||||||
You can create device groups in the context of role-based access (RBAC) to control who can take specific action or see information by assigning the device group(s) to a user group. For more information, see [Manage portal access using role-based access control](rbac.md).
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
> For a comprehensive look into RBAC application, read: [Is your SOC running flat with RBAC](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Is-your-SOC-running-flat-with-limited-RBAC/ba-p/320015).
|
|
||||||
|
|
||||||
As part of the process of creating a device group, you'll:
|
|
||||||
- Set the automated remediation level for that group. For more information on remediation levels, see [Use Automated investigation to investigate and remediate threats](automated-investigations.md).
|
|
||||||
- Specify the matching rule that determines which device group belongs to the group based on the device name, domain, tags, and OS platform. If a device is also matched to other groups, it is added only to the highest ranked device group.
|
|
||||||
- Select the Azure AD user group that should have access to the device group.
|
|
||||||
- Rank the device group relative to other groups after it is created.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>A device group is accessible to all users if you don’t assign any Azure AD groups to it.
|
|
||||||
|
|
||||||
## Create a device group
|
|
||||||
|
|
||||||
1. In the navigation pane, select **Settings** > **Device groups**.
|
|
||||||
|
|
||||||
2. Click **Add device group**.
|
|
||||||
|
|
||||||
3. Enter the group name and automation settings and specify the matching rule that determines which devices belong to the group. See [How the automated investigation starts](automated-investigations.md#how-the-automated-investigation-starts).
|
|
||||||
|
|
||||||
>[!TIP]
|
|
||||||
>If you want to group devices by organizational unit, you can configure the registry key for the group affiliation. For more information on device tagging, see [Create and manage device tags](machine-tags.md).
|
|
||||||
|
|
||||||
4. Preview several devices that will be matched by this rule. If you are satisfied with the rule, click the **User access** tab.
|
|
||||||
|
|
||||||
5. Assign the user groups that can access the device group you created.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>You can only grant access to Azure AD user groups that have been assigned to RBAC roles.
|
|
||||||
|
|
||||||
6. Click **Close**. The configuration changes are applied.
|
|
||||||
|
|
||||||
## Manage device groups
|
|
||||||
|
|
||||||
You can promote or demote the rank of a device group so that it is given higher or lower priority during matching. When a device is matched to more than one group, it is added only to the highest ranked group. You can also edit and delete groups.
|
|
||||||
|
|
||||||
>[!WARNING]
|
|
||||||
>Deleting a device group may affect email notification rules. If a device group is configured under an email notification rule, it will be removed from that rule. If the device group is the only group configured for an email notification, that email notification rule will be deleted along with the device group.
|
|
||||||
|
|
||||||
By default, device groups are accessible to all users with portal access. You can change the default behavior by assigning Azure AD user groups to the device group.
|
|
||||||
|
|
||||||
Devices that are not matched to any groups are added to Ungrouped devices (default) group. You cannot change the rank of this group or delete it. However, you can change the remediation level of this group, and define the Azure AD user groups that can access this group.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> Applying changes to device group configuration may take up to several minutes.
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [Manage portal access using role-based based access control](rbac.md)
|
|
||||||
- [Create and manage device tags](machine-tags.md)
|
|
||||||
- [Get list of tenant device groups using Graph API](get-machinegroups-collection.md)
|
|
@ -1,270 +0,0 @@
|
|||||||
---
|
|
||||||
title: McAfee to Microsoft Defender for Endpoint - Setup
|
|
||||||
description: This is phase 2, Setup, for migrating from McAfee to Microsoft Defender for Endpoint.
|
|
||||||
keywords: migration, windows defender advanced threat protection, atp, edr
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.technology: mde
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: deniseb
|
|
||||||
author: denisebmsft
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- M365-security-compliance
|
|
||||||
- m365solution-mcafeemigrate
|
|
||||||
- m365solution-scenario
|
|
||||||
ms.topic: article
|
|
||||||
ms.custom: migrationguides
|
|
||||||
ms.date: 02/18/2021
|
|
||||||
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho
|
|
||||||
---
|
|
||||||
|
|
||||||
# Migrate from McAfee - Phase 2: Set up Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
|[](mcafee-to-microsoft-defender-prepare.md)<br/>[Phase 1: Prepare](mcafee-to-microsoft-defender-prepare.md) |<br/>Phase 2: Set up |[](mcafee-to-microsoft-defender-onboard.md)<br/>[Phase 3: Onboard](mcafee-to-microsoft-defender-onboard.md) |
|
|
||||||
|--|--|--|
|
|
||||||
||*You are here!* | |
|
|
||||||
|
|
||||||
|
|
||||||
**Welcome to the Setup phase of [migrating from McAfee Endpoint Security (McAfee) to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-migration.md#the-migration-process)**. This phase includes the following steps:
|
|
||||||
1. [Enable Microsoft Defender Antivirus and confirm it's in passive mode](#enable-microsoft-defender-antivirus-and-confirm-its-in-passive-mode).
|
|
||||||
2. [Get updates for Microsoft Defender Antivirus](#get-updates-for-microsoft-defender-antivirus).
|
|
||||||
3. [Add Microsoft Defender for Endpoint to the exclusion list for McAfee](#add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-mcafee).
|
|
||||||
4. [Add McAfee to the exclusion list for Microsoft Defender Antivirus](#add-mcafee-to-the-exclusion-list-for-microsoft-defender-antivirus).
|
|
||||||
5. [Add McAfee to the exclusion list for Microsoft Defender for Endpoint](#add-mcafee-to-the-exclusion-list-for-microsoft-defender-for-endpoint).
|
|
||||||
6. [Set up your device groups, device collections, and organizational units](#set-up-your-device-groups-device-collections-and-organizational-units).
|
|
||||||
7. [Configure antimalware policies and real-time protection](#configure-antimalware-policies-and-real-time-protection).
|
|
||||||
|
|
||||||
## Enable Microsoft Defender Antivirus and confirm it's in passive mode
|
|
||||||
|
|
||||||
On certain versions of Windows, such as Windows Server, Microsoft Defender Antivirus might have been uninstalled or disabled when your McAfee solution was installed. This is because Microsoft Defender Antivirus does not enter passive or disabled mode when you install a third-party antivirus product, such as McAfee. (To learn more about this, see [Microsoft Defender Antivirus compatibility](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).)
|
|
||||||
|
|
||||||
This step of the migration process includes the following tasks:
|
|
||||||
- [Setting DisableAntiSpyware to false on Windows Server](#set-disableantispyware-to-false-on-windows-server)
|
|
||||||
- [Reinstalling Microsoft Defender Antivirus on Windows Server](#reinstall-microsoft-defender-antivirus-on-windows-server);
|
|
||||||
- [Setting Microsoft Defender Antivirus to passive mode on Windows Server](#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server)
|
|
||||||
- [Enabling Microsoft Defender Antivirus on your Windows client devices](#enable-microsoft-defender-antivirus-on-your-windows-client-devices); and
|
|
||||||
- [Confirming that Microsoft Defender Antivirus is set to passive mode](#confirm-that-microsoft-defender-antivirus-is-in-passive-mode).
|
|
||||||
|
|
||||||
### Set DisableAntiSpyware to false on Windows Server
|
|
||||||
|
|
||||||
The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) registry key was used in the past to disable Microsoft Defender Antivirus, and deploy another antivirus product, such as McAfee. In general, you should not have this registry key on your Windows devices and endpoints; however, if you do have `DisableAntiSpyware` configured, here's how to set its value to false:
|
|
||||||
|
|
||||||
1. On your Windows Server device, open Registry Editor.
|
|
||||||
|
|
||||||
2. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`.
|
|
||||||
|
|
||||||
3. In that folder, look for a DWORD entry called **DisableAntiSpyware**.
|
|
||||||
|
|
||||||
- If you do not see that entry, you're all set.
|
|
||||||
|
|
||||||
- If you do see **DisableAntiSpyware**, proceed to step 4.
|
|
||||||
|
|
||||||
4. Right-click the DisableAntiSpyware DWORD, and then choose **Modify**.
|
|
||||||
|
|
||||||
5. Set the value to `0`. (This sets the registry key's value to *false*.)
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> To learn more about this registry key, see [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware).
|
|
||||||
|
|
||||||
### Reinstall Microsoft Defender Antivirus on Windows Server
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The following procedure applies only to endpoints or devices that are running the following versions of Windows:
|
|
||||||
> - Windows Server 2019
|
|
||||||
> - Windows Server, version 1803 (core-only mode)
|
|
||||||
> - Windows Server 2016
|
|
||||||
|
|
||||||
1. As a local administrator on the endpoint or device, open Windows PowerShell.
|
|
||||||
|
|
||||||
2. Run the following PowerShell cmdlets: <br/>
|
|
||||||
|
|
||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` <br/>
|
|
||||||
|
|
||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` <br/>
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required.
|
|
||||||
> Example:<br/>
|
|
||||||
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`<br/>
|
|
||||||
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`<br/>
|
|
||||||
|
|
||||||
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet: <br/>
|
|
||||||
|
|
||||||
`Get-Service -Name windefend`
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Need help? See [Microsoft Defender Antivirus on Windows Server 2016 and 2019](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016).
|
|
||||||
|
|
||||||
### Set Microsoft Defender Antivirus to passive mode on Windows Server
|
|
||||||
|
|
||||||
Because your organization is still using McAfee, you must set Microsoft Defender Antivirus to passive mode. That way, McAfee and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
|
||||||
|
|
||||||
1. Open Registry Editor, and then navigate to <br/>
|
|
||||||
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
|
|
||||||
|
|
||||||
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
|
||||||
|
|
||||||
- Set the DWORD's value to **1**.
|
|
||||||
|
|
||||||
- Under **Base**, select **Hexadecimal**.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You can use other methods to set the registry key, such as the following:
|
|
||||||
>- [Group Policy Preference](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn581922(v=ws.11))
|
|
||||||
>- [Local Group Policy Object tool](https://docs.microsoft.com/windows/security/threat-protection/security-compliance-toolkit-10#what-is-the-local-group-policy-object-lgpo-tool)
|
|
||||||
>- [A package in Configuration Manager](https://docs.microsoft.com/mem/configmgr/apps/deploy-use/packages-and-programs)
|
|
||||||
|
|
||||||
### Enable Microsoft Defender Antivirus on your Windows client devices
|
|
||||||
|
|
||||||
Because your organization has been using McAfee as your primary antivirus solution, Microsoft Defender Antivirus is most likely disabled on your organization's Windows devices. This step of the migration process involves enabling Microsoft Defender Antivirus.
|
|
||||||
|
|
||||||
To enable Microsoft Defender Antivirus, we recommend using Intune. However, you can any of the methods that are listed in the following table:
|
|
||||||
|
|
||||||
|Method |What to do |
|
|
||||||
|---------|---------|
|
|
||||||
|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) <br/><br/>**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.<br/><br/>2. Select **Devices** > **Configuration profiles**, and then select the profile type you want to configure. <br/>If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).<br/><br/>3. Select **Properties**, and then select **Configuration settings: Edit**.<br/><br/>4. Expand **Microsoft Defender Antivirus**. <br/><br/>5. Enable **Cloud-delivered protection**.<br/><br/>6. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.<br/><br/>7. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.<br/><br/>8. Select **Review + save**, and then choose **Save**.<br/><br/>For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles).|
|
|
||||||
|Control Panel in Windows |Follow the guidance here: [Turn on Microsoft Defender Antivirus](https://docs.microsoft.com/mem/intune/user-help/turn-on-defender-windows). <br/><br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. |
|
|
||||||
|[Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm/) <br/>or<br/>[Group Policy Management Console](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus) |1. Go to `Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus`. <br/><br/>2. Look for a policy called **Turn off Microsoft Defender Antivirus**.<br/> <br/>3. Choose **Edit policy setting**, and make sure that policy is disabled. This enables Microsoft Defender Antivirus. <br/><br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. |
|
|
||||||
|
|
||||||
### Confirm that Microsoft Defender Antivirus is in passive mode
|
|
||||||
|
|
||||||
Microsoft Defender Antivirus can run alongside McAfee if you set Microsoft Defender Antivirus to passive mode. You can use either Command Prompt or PowerShell to perform this task, as described in the following table:
|
|
||||||
|
|
||||||
|Method |What to do |
|
|
||||||
|---------|---------|
|
|
||||||
|Command Prompt |1. On a Windows device, open Command Prompt as an administrator. <br/><br/>2. Type `sc query windefend`, and then press Enter.<br/><br/>3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode. |
|
|
||||||
|PowerShell |1. On a Windows device, open Windows PowerShell as an administrator.<br/><br/>2. Run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/Get-MpComputerStatus) cmdlet. <br/><br/>3. In the list of results, look for either **AMRunningMode: Passive Mode** or **AMRunningMode: SxS Passive Mode**.|
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.
|
|
||||||
|
|
||||||
## Get updates for Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques, even if Microsoft Defender Antivirus is running in [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
|
|
||||||
|
|
||||||
There are two types of updates related to keeping Microsoft Defender Antivirus up to date:
|
|
||||||
- Security intelligence updates
|
|
||||||
- Product updates
|
|
||||||
|
|
||||||
To get your updates, follow the guidance in [Manage Microsoft Defender Antivirus updates and apply baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
## Add Microsoft Defender for Endpoint to the exclusion list for McAfee
|
|
||||||
|
|
||||||
This step of the setup process involves adding Microsoft Defender for Endpoint to the exclusion list for McAfee and any other security products your organization is using.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> To get help configuring exclusions, refer to McAfee documentation, such as the following article: [McAfee Endpoint Security 10.5.0 - Threat Prevention Module Product Guide (McAfee ePolicy Orchestrator) - Windows: Configuring exclusions](https://docs.mcafee.com/bundle/endpoint-security-10.5.0-threat-prevention-product-guide-epolicy-orchestrator-windows/page/GUID-71C5FB4B-A143-43E6-8BF0-8B2C16ABE6DA.html).
|
|
||||||
|
|
||||||
The specific exclusions to configure depend on which version of Windows your endpoints or devices are running, and are listed in the following table:
|
|
||||||
|
|
||||||
|OS |Exclusions |
|
|
||||||
|--|--|
|
|
||||||
|- Windows 10, [version 1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later (See [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information))<br/>- Windows 10, version 1703 or [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709) with [KB4493441](https://support.microsoft.com/help/4493441) installed <br/>- [Windows Server 2019](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019)<br/>- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`<br/><br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`<br/> |
|
|
||||||
|- [Windows 8.1](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2) <br/>- [Windows 7](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)<br/>- [Windows Server 2016](https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/>- [Windows Server 2012 R2](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/>- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`<br/><br/>**NOTE**: Where Monitoring Host Temporary Files 6\45 can be different numbered subfolders.<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`<br/><br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` |
|
|
||||||
|
|
||||||
## Add McAfee to the exclusion list for Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
During this step of the setup process, you add McAfee and your other security solutions to the Microsoft Defender Antivirus exclusion list.
|
|
||||||
|
|
||||||
When you add [exclusions to Microsoft Defender Antivirus scans](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions. Keep the following points in mind:
|
|
||||||
- Path exclusions exclude specific files and whatever those files access.
|
|
||||||
- Process exclusions exclude whatever a process touches, but does not exclude the process itself.
|
|
||||||
- If you list each executable (.exe) as both a path exclusion and a process exclusion, the process and whatever it touches are excluded.
|
|
||||||
- List your process exclusions using their full path and not by their name only. (The name-only method is less secure.)
|
|
||||||
|
|
||||||
You can choose from several methods to add your exclusions to Microsoft Defender Antivirus, as listed in the following table:
|
|
||||||
|
|
||||||
|Method | What to do|
|
|
||||||
|--|--|
|
|
||||||
|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) <br/><br/>**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.<br/><br/>2. Select **Devices** > **Configuration profiles**, and then select the profile that you want to configure.<br/><br/>3. Under **Manage**, select **Properties**. <br/><br/>4. Select **Configuration settings: Edit**.<br/><br/>5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.<br/><br/>6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).<br/><br/>7. Choose **Review + save**, and then choose **Save**. |
|
|
||||||
|[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/) |1. Using the [Configuration Manager console](https://docs.microsoft.com/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** > **Endpoint Protection** > **Antimalware Policies**, and then select the policy that you want to modify. <br/><br/>2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. |
|
|
||||||
|[Group Policy Object](https://docs.microsoft.com/previous-versions/windows/desktop/Policy/group-policy-objects) | 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.<br/><br/>2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.<br/><br/>3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Exclusions**.<br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.<br/><br/>4. Double-click the **Path Exclusions** setting and add the exclusions.<br/>- Set the option to **Enabled**.<br/>- Under the **Options** section, click **Show...**.<br/>- Specify each folder on its own line under the **Value name** column.<br/>- If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.<br/><br/>5. Click **OK**.<br/><br/>6. Double-click the **Extension Exclusions** setting and add the exclusions.<br/>- Set the option to **Enabled**.<br/>- Under the **Options** section, click **Show...**.<br/>- Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.<br/><br/>7. Click **OK**. |
|
|
||||||
|Local group policy object |1. On the endpoint or device, open the Local Group Policy Editor. <br/><br/>2. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Exclusions**. <br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.<br/><br/>3. Specify your path and process exclusions. |
|
|
||||||
|Registry key |1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.<br/><br/>2. Import the registry key. Here are two examples:<br/>- Local path: `regedit.exe /s c:\temp\ MDAV_Exclusion.reg` <br/>- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg` |
|
|
||||||
|
|
||||||
## Add McAfee to the exclusion list for Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
To add exclusions to Microsoft Defender for Endpoint, you create [indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators#create-indicators-for-files).
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)) and sign in.
|
|
||||||
|
|
||||||
2. In the navigation pane, choose **Settings** > **Rules** > **Indicators**.
|
|
||||||
|
|
||||||
3. On the **File hashes** tab, choose **Add indicator**.
|
|
||||||
|
|
||||||
3. On the **Indicator** tab, specify the following settings:
|
|
||||||
- File hash (Need help? See [Find a file hash using CMPivot](#find-a-file-hash-using-cmpivot) in this article.)
|
|
||||||
- Under **Expires on (UTC)**, choose **Never**.
|
|
||||||
|
|
||||||
4. On the **Action** tab, specify the following settings:
|
|
||||||
- **Response Action**: **Allow**
|
|
||||||
- Title and description
|
|
||||||
|
|
||||||
5. On the **Scope** tab, under **Device groups**, select either **All devices in my scope** or **Select from list**.
|
|
||||||
|
|
||||||
6. On the **Summary** tab, review the settings, and then click **Save**.
|
|
||||||
|
|
||||||
### Find a file hash using CMPivot
|
|
||||||
|
|
||||||
CMPivot is an in-console utility for Configuration Manager. CMPivot provides access to the real-time state of devices in your environment. It immediately runs a query on all currently connected devices in the target collection and returns the results. To learn more, see [CMPivot overview](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot-overview).
|
|
||||||
|
|
||||||
To use CMPivot to get your file hash, follow these steps:
|
|
||||||
|
|
||||||
1. Review the [prerequisites](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#prerequisites).
|
|
||||||
|
|
||||||
2. [Start CMPivot](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#start-cmpivot).
|
|
||||||
|
|
||||||
3. Connect to Configuration Manager (`SCCM_ServerName.DomainName.com`).
|
|
||||||
|
|
||||||
4. Select the **Query** tab.
|
|
||||||
|
|
||||||
5. In the **Device Collection** list, and choose **All Systems (default)**.
|
|
||||||
|
|
||||||
6. In the query box, type the following query:<br/>
|
|
||||||
|
|
||||||
```kusto
|
|
||||||
File(c:\\windows\\notepad.exe)
|
|
||||||
| project Hash
|
|
||||||
```
|
|
||||||
> [!NOTE]
|
|
||||||
> In the query above, replace *notepad.exe* with the your third-party security product process name.
|
|
||||||
|
|
||||||
## Set up your device groups, device collections, and organizational units
|
|
||||||
|
|
||||||
| Collection type | What to do |
|
|
||||||
|--|--|
|
|
||||||
|[Device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groups) (formerly called machine groups) enable your security operations team to configure security capabilities, such as automated investigation and remediation.<br/><br/> Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed. <br/><br/>Device groups are created in the Microsoft Defender Security Center. |1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)).<br/><br/>2. In the navigation pane on the left, choose **Settings** > **Permissions** > **Device groups**. <br/><br/>3. Choose **+ Add device group**.<br/><br/>4. Specify a name and description for the device group.<br/><br/>5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated).<br/><br/>6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags). <br/><br/>7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group. <br/><br/>8. Choose **Done**. |
|
|
||||||
|[Device collections](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization. <br/><br/>Device collections are created by using [Configuration Manager](https://docs.microsoft.com/mem/configmgr/). |Follow the steps in [Create a collection](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create). |
|
|
||||||
|[Organizational units](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings.<br/><br/> Organizational units are defined in [Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services). | Follow the steps in [Create an Organizational Unit in an Azure Active Directory Domain Services managed domain](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou). |
|
|
||||||
|
|
||||||
## Configure antimalware policies and real-time protection
|
|
||||||
|
|
||||||
Using Configuration Manager and your device collection(s), configure your antimalware policies.
|
|
||||||
|
|
||||||
- See [Create and deploy antimalware policies for Endpoint Protection in Configuration Manager](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies).
|
|
||||||
|
|
||||||
- While you create and configure your antimalware policies, make sure to review the [real-time protection settings](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) and [enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> You can deploy the policies before your organization's devices on onboarded.
|
|
||||||
|
|
||||||
## Next step
|
|
||||||
|
|
||||||
**Congratulations**! You have completed the Setup phase of [migrating from McAfee to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-migration.md#the-migration-process)!
|
|
||||||
|
|
||||||
- [Proceed to Phase 3: Onboard to Microsoft Defender for Endpoint](mcafee-to-microsoft-defender-onboard.md)
|
|
@ -1,84 +0,0 @@
|
|||||||
---
|
|
||||||
title: Microsoft Defender ATP for iOS overview
|
|
||||||
ms.reviewer:
|
|
||||||
description: Describes how to install and use Microsoft Defender ATP for iOS
|
|
||||||
keywords: microsoft, defender, atp, ios, overview, installation, deploy, uninstallation, intune
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Microsoft Defender for Endpoint for iOS
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
**Microsoft Defender for Endpoint for iOS** will offer protection against phishing and unsafe network connections from websites, emails, and apps. All alerts will be available through a single pane of glass in the Microsoft Defender Security Center. The portal gives security teams a centralized view of threats on
|
|
||||||
iOS devices along with other platforms.
|
|
||||||
|
|
||||||
> [!CAUTION]
|
|
||||||
> Running other third-party endpoint protection products alongside Defender for Endpoint for iOS is likely to cause performance problems and unpredictable system errors.
|
|
||||||
|
|
||||||
## Pre-requisites
|
|
||||||
|
|
||||||
**For End Users**
|
|
||||||
|
|
||||||
- Microsoft Defender for Endpoint license assigned to the end user(s) of the app. See [Microsoft Defender for Endpoint licensing requirements](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements#licensing-requirements).
|
|
||||||
|
|
||||||
- Device(s) are [enrolled](https://docs.microsoft.com/mem/intune/user-help/enroll-your-device-in-intune-ios) via the Intune Company Portal app to enforce Intune device compliance policies. This requires the end user to be assigned a Microsoft Intune license.
|
|
||||||
- Intune Company Portal app can be downloaded from the [Apple App Store](https://apps.apple.com/us/app/intune-company-portal/id719171358).
|
|
||||||
- Note that Apple does not allow redirecting users to download other apps from the app store and hence this step needs to be done by the user before onboarding to Microsoft Defender for Endpoint app.
|
|
||||||
|
|
||||||
- For more information on how to assign licenses, see [Assign licenses to users](https://docs.microsoft.com/azure/active-directory/users-groups-roles/licensing-groups-assign).
|
|
||||||
|
|
||||||
**For Administrators**
|
|
||||||
|
|
||||||
- Access to the Microsoft Defender Security Center portal.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Microsoft Intune is the only supported Mobile Device Management (MDM) solution for deploying Microsoft Defender for Endpoint for iOS. Currently only enrolled devices are supported for enforcing Defender for Endpoint for iOS related device compliance policies in Intune.
|
|
||||||
|
|
||||||
- Access to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), to deploy the app to enrolled user groups in your organization.
|
|
||||||
|
|
||||||
**System Requirements**
|
|
||||||
|
|
||||||
- iOS devices running iOS 11.0 and above. iPad devices are officially supported from version 1.1.15010101 onward.
|
|
||||||
|
|
||||||
- Device is enrolled with the [Intune Company Portal app](https://apps.apple.com/us/app/intune-company-portal/id719171358).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> **Microsoft Defender ATP (Microsoft Defender for Endpoint) for iOS is now available on [Apple App Store](https://aka.ms/mdatpiosappstore).**
|
|
||||||
|
|
||||||
## Installation instructions
|
|
||||||
|
|
||||||
Deployment of Microsoft Defender for Endpoint for iOS is via Microsoft Intune (MDM) and both supervised and unsupervised devices are supported.
|
|
||||||
For more information, see [Deploy Microsoft Defender for Endpoint for iOS](ios-install.md).
|
|
||||||
|
|
||||||
## Resources
|
|
||||||
|
|
||||||
- Stay informed about upcoming releases by visiting our [blog](https://techcommunity.microsoft.com/t5/microsoft-defender-atp/bg-p/MicrosoftDefenderATPBlog/label-name/iOS).
|
|
||||||
|
|
||||||
- Provide feedback through in-app feedback system or through [SecOps portal](https://securitycenter.microsoft.com)
|
|
||||||
|
|
||||||
## Next steps
|
|
||||||
|
|
||||||
- [Deploy Microsoft Defender for Endpoint for iOS](ios-install.md)
|
|
||||||
- [Configure Microsoft Defender for Endpoint for iOS features](ios-configure-features.md)
|
|
@ -1,140 +0,0 @@
|
|||||||
---
|
|
||||||
title: Microsoft Defender ATP for Linux
|
|
||||||
ms.reviewer:
|
|
||||||
description: Describes how to install and use Microsoft Defender ATP for Linux.
|
|
||||||
keywords: microsoft, defender, atp, linux, installation, deploy, uninstallation, puppet, ansible, linux, redhat, ubuntu, debian, sles, suse, centos
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: dansimp
|
|
||||||
author: dansimp
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Microsoft Defender for Endpoint for Linux
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
This topic describes how to install, configure, update, and use Microsoft Defender for Endpoint for Linux.
|
|
||||||
|
|
||||||
> [!CAUTION]
|
|
||||||
> Running other third-party endpoint protection products alongside Microsoft Defender for Endpoint for Linux is likely to cause performance problems and unpredictable system errors.
|
|
||||||
|
|
||||||
## How to install Microsoft Defender for Endpoint for Linux
|
|
||||||
|
|
||||||
### Prerequisites
|
|
||||||
|
|
||||||
- Access to the Microsoft Defender Security Center portal
|
|
||||||
- Linux distribution using the [systemd](https://systemd.io/) system manager
|
|
||||||
- Beginner-level experience in Linux and BASH scripting
|
|
||||||
- Administrative privileges on the device (in case of manual deployment)
|
|
||||||
|
|
||||||
### Installation instructions
|
|
||||||
|
|
||||||
There are several methods and deployment tools that you can use to install and configure Microsoft Defender for Endpoint for Linux.
|
|
||||||
|
|
||||||
In general you need to take the following steps:
|
|
||||||
|
|
||||||
- Ensure that you have a Microsoft Defender for Endpoint subscription, and that you have access to the [Microsoft Defender for Endpoint portal](microsoft-defender-security-center.md).
|
|
||||||
- Deploy Microsoft Defender for Endpoint for Linux using one of the following deployment methods:
|
|
||||||
- The command-line tool:
|
|
||||||
- [Manual deployment](linux-install-manually.md)
|
|
||||||
- Third-party management tools:
|
|
||||||
- [Deploy using Puppet configuration management tool](linux-install-with-puppet.md)
|
|
||||||
- [Deploy using Ansible configuration management tool](linux-install-with-ansible.md)
|
|
||||||
|
|
||||||
If you experience any installation failures, refer to [Troubleshooting installation failures in Microsoft Defender for Endpoint for Linux](linux-support-install.md).
|
|
||||||
|
|
||||||
### System requirements
|
|
||||||
|
|
||||||
- Supported Linux server distributions and versions:
|
|
||||||
|
|
||||||
- Red Hat Enterprise Linux 7.2 or higher
|
|
||||||
- CentOS 7.2 or higher
|
|
||||||
- Ubuntu 16.04 LTS or higher LTS
|
|
||||||
- Debian 9 or higher
|
|
||||||
- SUSE Linux Enterprise Server 12 or higher
|
|
||||||
- Oracle Linux 7.2 or higher
|
|
||||||
|
|
||||||
- Minimum kernel version 3.10.0-327
|
|
||||||
- The `fanotify` kernel option must be enabled
|
|
||||||
> [!CAUTION]
|
|
||||||
> Running Defender for Endpoint for Linux side by side with other `fanotify`-based security solutions is not supported. It can lead to unpredictable results, including hanging the operating system.
|
|
||||||
|
|
||||||
- Disk space: 1GB
|
|
||||||
- The solution currently provides real-time protection for the following file system types:
|
|
||||||
|
|
||||||
- `btrfs`
|
|
||||||
- `ecryptfs`
|
|
||||||
- `ext2`
|
|
||||||
- `ext3`
|
|
||||||
- `ext4`
|
|
||||||
- `fuse`
|
|
||||||
- `fuseblk`
|
|
||||||
- `jfs`
|
|
||||||
- `nfs`
|
|
||||||
- `overlay`
|
|
||||||
- `ramfs`
|
|
||||||
- `reiserfs`
|
|
||||||
- `tmpfs`
|
|
||||||
- `udf`
|
|
||||||
- `vfat`
|
|
||||||
- `xfs`
|
|
||||||
|
|
||||||
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
|
|
||||||
|
|
||||||
- Audit framework (`auditd`) must be enabled.
|
|
||||||
>[!NOTE]
|
|
||||||
> System events captured by rules added to `audit.logs` will add to audit logs and might affect host auditing and upstream collection. Events added by Microsoft Defender for Endopoint for Linux will be tagged with `mdatp` key.
|
|
||||||
|
|
||||||
### Network connections
|
|
||||||
|
|
||||||
The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs. If there are, you may need to create an *allow* rule specifically for them.
|
|
||||||
|
|
||||||
|**Spreadsheet of domains list**|**Description**|
|
|
||||||
|:-----|:-----|
|
|
||||||
|<br/> | Spreadsheet of specific DNS records for service locations, geographic locations, and OS. <br><br>[Download the spreadsheet here.](https://download.microsoft.com/download/8/a/5/8a51eee5-cd02-431c-9d78-a58b7f77c070/mde-urls.xlsx)
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> For a more specific URL list, see [Configure proxy and internet connectivity settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server).
|
|
||||||
|
|
||||||
Defender for Endpoint can discover a proxy server by using the following discovery methods:
|
|
||||||
- Transparent proxy
|
|
||||||
- Manual static proxy configuration
|
|
||||||
|
|
||||||
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs. For transparent proxies, no additional configuration is needed for Defender for Endpoint. For static proxy, follow the steps in [Manual Static Proxy Configuration](linux-static-proxy-configuration.md).
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> PAC, WPAD, and authenticated proxies are not supported. Ensure that only a static proxy or transparent proxy is being used.
|
|
||||||
>
|
|
||||||
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Defender for Endpoint for Linux to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
|
|
||||||
|
|
||||||
For troubleshooting steps, see [Troubleshoot cloud connectivity issues for Microsoft Defender for Endpoint for Linux](linux-support-connectivity.md).
|
|
||||||
|
|
||||||
## How to update Microsoft Defender for Endpoint for Linux
|
|
||||||
|
|
||||||
Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender for Endpoint for Linux, refer to [Deploy updates for Microsoft Defender for Endpoint for Linux](linux-updates.md).
|
|
||||||
|
|
||||||
## How to configure Microsoft Defender for Endpoint for Linux
|
|
||||||
|
|
||||||
Guidance for how to configure the product in enterprise environments is available in [Set preferences for Microsoft Defender for Endpoint for Linux](linux-preferences.md).
|
|
||||||
|
|
||||||
## Resources
|
|
||||||
|
|
||||||
- For more information about logging, uninstalling, or other topics, see [Resources](linux-resources.md).
|
|
@ -1,159 +0,0 @@
|
|||||||
---
|
|
||||||
title: Microsoft Defender ATP for Mac
|
|
||||||
ms.reviewer:
|
|
||||||
description: Learn how to install, configure, update, and use Microsoft Defender Advanced Threat Protection for Mac.
|
|
||||||
keywords: microsoft, defender, atp, mac, installation, deploy, uninstallation, intune, jamf, macos, catalina, mojave, high sierra
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: dansimp
|
|
||||||
author: dansimp
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Microsoft Defender for Endpoint for Mac
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
This topic describes how to install, configure, update, and use Defender for Endpoint for Mac.
|
|
||||||
|
|
||||||
> [!CAUTION]
|
|
||||||
> Running other third-party endpoint protection products alongside Defender for Endpoint for Mac is likely to lead to performance problems and unpredictable side effects. If non-Microsoft endpoint protection is an absolute requirement in your environment, you can still safely take advantage of MDATP for Mac EDR functionality after configuring MDATP for Mac antivirus functionality to run in [Passive mode](mac-preferences.md#enable--disable-passive-mode).
|
|
||||||
|
|
||||||
## What’s new in the latest release
|
|
||||||
|
|
||||||
[What's new in Microsoft Defender for Endpoint](whats-new-in-microsoft-defender-atp.md)
|
|
||||||
|
|
||||||
[What's new in Microsoft Defender for Endpoint for Mac](mac-whatsnew.md)
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> If you have any feedback that you would like to share, submit it by opening Microsoft Defender for Endpoint for Mac on your device and navigating to **Help** > **Send feedback**.
|
|
||||||
|
|
||||||
To get the latest features, including preview capabilities (such as endpoint detection and response for your Mac devices), configure your macOS device running Microsoft Defender for Endpoint to be an "Insider" device.
|
|
||||||
|
|
||||||
## How to install Microsoft Defender for Endpoint for Mac
|
|
||||||
|
|
||||||
### Prerequisites
|
|
||||||
|
|
||||||
- A Defender for Endpoint subscription and access to the Microsoft Defender Security Center portal
|
|
||||||
- Beginner-level experience in macOS and BASH scripting
|
|
||||||
- Administrative privileges on the device (in case of manual deployment)
|
|
||||||
|
|
||||||
### Installation instructions
|
|
||||||
|
|
||||||
There are several methods and deployment tools that you can use to install and configure Defender for Endpoint for Mac.
|
|
||||||
|
|
||||||
- Third-party management tools:
|
|
||||||
- [Microsoft Intune-based deployment](mac-install-with-intune.md)
|
|
||||||
- [JAMF-based deployment](mac-install-with-jamf.md)
|
|
||||||
- [Other MDM products](mac-install-with-other-mdm.md)
|
|
||||||
|
|
||||||
- Command-line tool:
|
|
||||||
- [Manual deployment](mac-install-manually.md)
|
|
||||||
|
|
||||||
### System requirements
|
|
||||||
|
|
||||||
The three most recent major releases of macOS are supported.
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> On macOS 11 (Big Sur), Microsoft Defender for Endpoint requires additional configuration profiles. If you are an existing customer upgrading from earlier versions of macOS, make sure to deploy the additional configuration profiles listed on [New configuration profiles for macOS Catalina and newer versions of macOS](mac-sysext-policies.md).
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> Support for macOS 10.13 (High Sierra) will be discontinued on February 15th, 2021.
|
|
||||||
|
|
||||||
- 11 (Big Sur), 10.15 (Catalina), 10.14 (Mojave), 10.13 (High Sierra)
|
|
||||||
- Disk space: 1GB
|
|
||||||
|
|
||||||
Beta versions of macOS are not supported.
|
|
||||||
|
|
||||||
After you've enabled the service, you may need to configure your network or firewall to allow outbound connections between it and your endpoints.
|
|
||||||
|
|
||||||
### Licensing requirements
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint for Mac requires one of the following Microsoft Volume Licensing offers:
|
|
||||||
|
|
||||||
- Microsoft 365 E5 (M365 E5)
|
|
||||||
- Microsoft 365 E5 Security
|
|
||||||
- Microsoft 365 A5 (M365 A5)
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Eligible licensed users may use Microsoft Defender for Endpoint on up to five concurrent devices.
|
|
||||||
> Microsoft Defender for Endpoint is also available for purchase from a Cloud Solution Provider (CSP). When purchased via a CSP, it does not require Microsoft Volume Licensing offers listed.
|
|
||||||
|
|
||||||
### Network connections
|
|
||||||
|
|
||||||
The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. You should ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|**Spreadsheet of domains list**|**Description**|
|
|
||||||
|:-----|:-----|
|
|
||||||
|<br/> | Spreadsheet of specific DNS records for service locations, geographic locations, and OS. <br><br>Download the spreadsheet here: [mdatp-urls.xlsx](https://download.microsoft.com/download/8/a/5/8a51eee5-cd02-431c-9d78-a58b7f77c070/mde-urls.xlsx).
|
|
||||||
|
|
||||||
Microsoft Defender for Endpoint can discover a proxy server by using the following discovery methods:
|
|
||||||
- Proxy autoconfig (PAC)
|
|
||||||
- Web Proxy Autodiscovery Protocol (WPAD)
|
|
||||||
- Manual static proxy configuration
|
|
||||||
|
|
||||||
If a proxy or firewall is blocking anonymous traffic, make sure that anonymous traffic is permitted in the previously listed URLs.
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> Authenticated proxies are not supported. Ensure that only PAC, WPAD, or a static proxy is being used.
|
|
||||||
>
|
|
||||||
> SSL inspection and intercepting proxies are also not supported for security reasons. Configure an exception for SSL inspection and your proxy server to directly pass through data from Microsoft Defender for Endpoint for Mac to the relevant URLs without interception. Adding your interception certificate to the global store will not allow for interception.
|
|
||||||
|
|
||||||
To test that a connection is not blocked, open [https://x.cp.wd.microsoft.com/api/report](https://x.cp.wd.microsoft.com/api/report) and [https://cdn.x.cp.wd.microsoft.com/ping](https://cdn.x.cp.wd.microsoft.com/ping) in a browser.
|
|
||||||
|
|
||||||
If you prefer the command line, you can also check the connection by running the following command in Terminal:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
curl -w ' %{url_effective}\n' 'https://x.cp.wd.microsoft.com/api/report' 'https://cdn.x.cp.wd.microsoft.com/ping'
|
|
||||||
```
|
|
||||||
|
|
||||||
The output from this command should be similar to the following:
|
|
||||||
|
|
||||||
`OK https://x.cp.wd.microsoft.com/api/report`
|
|
||||||
|
|
||||||
`OK https://cdn.x.cp.wd.microsoft.com/ping`
|
|
||||||
|
|
||||||
> [!CAUTION]
|
|
||||||
> We recommend that you keep [System Integrity Protection](https://support.apple.com/en-us/HT204899) (SIP) enabled on client devices. SIP is a built-in macOS security feature that prevents low-level tampering with the OS, and is enabled by default.
|
|
||||||
|
|
||||||
Once Microsoft Defender for Endpoint is installed, connectivity can be validated by running the following command in Terminal:
|
|
||||||
```bash
|
|
||||||
mdatp connectivity test
|
|
||||||
```
|
|
||||||
|
|
||||||
## How to update Microsoft Defender for Endpoint for Mac
|
|
||||||
|
|
||||||
Microsoft regularly publishes software updates to improve performance, security, and to deliver new features. To update Microsoft Defender for Endpoint for Mac, a program named Microsoft AutoUpdate (MAU) is used. To learn more, see [Deploy updates for Microsoft Defender for Endpoint for Mac](mac-updates.md).
|
|
||||||
|
|
||||||
## How to configure Microsoft Defender for Endpoint for Mac
|
|
||||||
|
|
||||||
Guidance for how to configure the product in enterprise environments is available in [Set preferences for Microsoft Defender for Endpoint for Mac](mac-preferences.md).
|
|
||||||
|
|
||||||
## macOS kernel and system extensions
|
|
||||||
|
|
||||||
In alignment with macOS evolution, we are preparing a Microsoft Defender for Endpoint for Mac update that leverages system extensions instead of kernel extensions. For relevant details, see [What's new in Microsoft Defender for Endpoint for Mac](mac-whatsnew.md).
|
|
||||||
|
|
||||||
## Resources
|
|
||||||
|
|
||||||
- For more information about logging, uninstalling, or other topics, see [Resources for Microsoft Defender for Endpoint for Mac](mac-resources.md).
|
|
||||||
|
|
||||||
- [Privacy for Microsoft Defender for Endpoint for Mac](mac-privacy.md).
|
|
@ -1,85 +0,0 @@
|
|||||||
---
|
|
||||||
title: Microsoft Threat Experts
|
|
||||||
ms.reviewer:
|
|
||||||
description: Microsoft Threat Experts provides an additional layer of expertise to Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).
|
|
||||||
keywords: managed threat hunting service, managed threat hunting, managed detection and response (MDR) service, MTE, Microsoft Threat Experts, MTE-TAN, targeted attack notification, Targeted Attack Notification
|
|
||||||
search.product: Windows 10
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Microsoft Threat Experts
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
|
|
||||||
Microsoft Threat Experts is a managed threat hunting service that provides your Security Operation Centers (SOCs) with expert level monitoring and analysis to help them ensure that critical threats in your unique environments don’t get missed.
|
|
||||||
|
|
||||||
This managed threat hunting service provides expert-driven insights and data through these two capabilities: targeted attack notification and access to experts on demand.
|
|
||||||
|
|
||||||
## Before you begin
|
|
||||||
> [!NOTE]
|
|
||||||
> Discuss the eligibility requirements with your Microsoft Technical Service provider and account team before you apply to the managed threat hunting service.
|
|
||||||
|
|
||||||
If you're a Microsoft Defender for Endpoint customer, you need to apply for Microsoft Threat Experts - Targeted Attack Notifications to get special insights and analysis that help identify the most critical threats so you can respond to them quickly. Contact your account team or Microsoft representative to subscribe to Microsoft Threat Experts - Experts on Demand to consult with our threat experts on relevant detections and adversaries.
|
|
||||||
|
|
||||||
To enroll to Microsoft Threat Experts - Targeted Attack Notifications benefits, go to **Settings** > **General** > **Advanced features** > **Microsoft Threat Experts - Targeted Attack Notifications** to apply. Once accepted, you will get the benefits of Targeted Attack Notifications.
|
|
||||||
|
|
||||||
See [Configure Microsoft Threat Experts capabilities](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-microsoft-threat-experts#before-you-begin) for details.
|
|
||||||
|
|
||||||
## Targeted attack notification
|
|
||||||
Microsoft Threat Experts provides proactive hunting for the most important threats to your network, including human adversary intrusions, hands-on-keyboard attacks, or advanced attacks like cyberespionage. These notifications shows up as a new alert. The managed hunting service includes:
|
|
||||||
- Threat monitoring and analysis, reducing dwell time and risk to the business
|
|
||||||
- Hunter-trained artificial intelligence to discover and prioritize both known and unknown attacks
|
|
||||||
- Identifying the most important risks, helping SOCs maximize time and energy
|
|
||||||
- Scope of compromise and as much context as can be quickly delivered to enable fast SOC response.
|
|
||||||
|
|
||||||
## Collaborate with experts, on demand
|
|
||||||
Customers can engage our security experts directly from within Microsoft Defender Security Center for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised devices, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns. With this capability, you can:
|
|
||||||
- Get additional clarification on alerts including root cause or scope of the incident
|
|
||||||
- Gain clarity into suspicious device behavior and next steps if faced with an advanced attacker
|
|
||||||
- Determine risk and protection regarding threat actors, campaigns, or emerging attacker techniques
|
|
||||||
|
|
||||||
The option to **Consult a threat expert** is available in several places in the portal so you can engage with experts in the context of your investigation:
|
|
||||||
|
|
||||||
- <i>**Help and support menu**</i><BR>
|
|
||||||

|
|
||||||
|
|
||||||
- <i>**Device page actions menu**</i><BR>
|
|
||||||

|
|
||||||
|
|
||||||
- <i>**Alerts page actions menu**</i><BR>
|
|
||||||

|
|
||||||
|
|
||||||
- <i>**File page actions menu**</i><BR>
|
|
||||||

|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you would like to track the status of your Experts on Demand cases through Microsoft Services Hub, reach out to your Technical Account Manager.
|
|
||||||
|
|
||||||
Watch this video for a quick overview of the Microsoft Services Hub.
|
|
||||||
|
|
||||||
>[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4pk9f]
|
|
||||||
|
|
||||||
|
|
||||||
## Related topic
|
|
||||||
- [Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md)
|
|
@ -1,57 +0,0 @@
|
|||||||
---
|
|
||||||
title: Offboard devices from the Microsoft Defender ATP service
|
|
||||||
description: Onboard Windows 10 devices, servers, non-Windows devices from the Microsoft Defender ATP service
|
|
||||||
keywords: offboarding, microsoft defender advanced threat protection offboarding, windows atp offboarding
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Offboard devices from the Microsoft Defender for Endpoint service
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
**Platforms**
|
|
||||||
- macOS
|
|
||||||
- Linux
|
|
||||||
- Windows Server 2012 R2
|
|
||||||
- Windows Server 2016
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-offboarddevices-abovefoldlink)
|
|
||||||
|
|
||||||
Follow the corresponding instructions depending on your preferred deployment method.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
> The status of a device will be switched to [Inactive](fix-unhealthy-sensors.md#inactive-devices) 7 days after offboarding. <br>
|
|
||||||
> Offboarded devices' data (such as Timeline, Alerts, Vulnerabilities, etc.) will remain in the portal until the configured [retention period](data-storage-privacy.md#how-long-will-microsoft-store-my-data-what-is-microsofts-data-retention-policy) expires. <br>
|
|
||||||
> The device's profile (without data) will remain in the [Devices List](machines-view-overview.md) for no longer than 180 days.
|
|
||||||
> In addition, devices that are not active in the last 30 days are not factored in on the data that reflects your organization's threat and vulnerability management [exposure score](tvm-exposure-score.md) and Microsoft Secure Score for Devices. <br>
|
|
||||||
> To view only active devices, you can filter by [health state](machines-view-overview.md#health-state), [device tags](machine-tags.md) or [machine groups](machine-groups.md).
|
|
||||||
|
|
||||||
## Offboard Windows 10 devices
|
|
||||||
- [Offboard devices using a local script](configure-endpoints-script.md#offboard-devices-using-a-local-script)
|
|
||||||
- [Offboard devices using Group Policy](configure-endpoints-gp.md#offboard-devices-using-group-policy)
|
|
||||||
- [Offboard devices using Mobile Device Management tools](configure-endpoints-mdm.md#offboard-and-monitor-devices-using-mobile-device-management-tools)
|
|
||||||
|
|
||||||
## Offboard Servers
|
|
||||||
- [Offboard servers](configure-server-endpoints.md#offboard-windows-servers)
|
|
||||||
|
|
||||||
## Offboard non-Windows devices
|
|
||||||
- [Offboard non-Windows devices](configure-endpoints-non-windows.md#offboard-non-windows-devices)
|
|
||||||
|
|
@ -1,109 +0,0 @@
|
|||||||
---
|
|
||||||
title: Onboard previous versions of Windows on Microsoft Defender ATP
|
|
||||||
description: Onboard supported previous versions of Windows devices so that they can send sensor data to the Microsoft Defender ATP sensor
|
|
||||||
keywords: onboard, windows, 7, 81, oms, sp1, enterprise, pro, down level
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Onboard previous versions of Windows
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
**Platforms**
|
|
||||||
- Windows 7 SP1 Enterprise
|
|
||||||
- Windows 7 SP1 Pro
|
|
||||||
- Windows 8.1 Pro
|
|
||||||
- Windows 8.1 Enterprise
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Defender for Endpoint? [Sign up for a free trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-downlevel-abovefoldlink).
|
|
||||||
|
|
||||||
Defender for Endpoint extends support to include down-level operating systems, providing advanced attack detection and investigation capabilities on supported Windows versions.
|
|
||||||
|
|
||||||
To onboard down-level Windows client endpoints to Defender for Endpoint, you'll need to:
|
|
||||||
- Configure and update System Center Endpoint Protection clients.
|
|
||||||
- Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Defender for Endpoint as instructed below.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> After onboarding the device, you can choose to run a detection test to verify that it is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Defender for Endpoint endpoint](run-detection-test.md).
|
|
||||||
|
|
||||||
## Configure and update System Center Endpoint Protection clients
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> This step is required only if your organization uses System Center Endpoint Protection (SCEP).
|
|
||||||
|
|
||||||
Defender for Endpoint integrates with System Center Endpoint Protection to provide visibility to malware detections and to stop propagation of an attack in your organization by banning potentially malicious files or suspected malware.
|
|
||||||
|
|
||||||
The following steps are required to enable this integration:
|
|
||||||
- Install the [January 2017 anti-malware platform update for Endpoint Protection clients](https://support.microsoft.com/help/3209361/january-2017-anti-malware-platform-update-for-endpoint-protection-clie)
|
|
||||||
- Configure the SCEP client Cloud Protection Service membership to the **Advanced** setting
|
|
||||||
- Configure your network to allow connections to the Microsoft Defender Antivirus cloud. For more information, see [Allow connections to the Microsoft Defender Antivirus cloud](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus#allow-connections-to-the-microsoft-defender-antivirus-cloud)
|
|
||||||
|
|
||||||
## Install and configure Microsoft Monitoring Agent (MMA) to report sensor data to Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
### Before you begin
|
|
||||||
Review the following details to verify minimum system requirements:
|
|
||||||
- Install the [February 2018 monthly update rollup](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
|
||||||
|
|
||||||
- Install the [Update for customer experience and diagnostic telemetry](https://support.microsoft.com/help/3080149/update-for-customer-experience-and-diagnostic-telemetry)
|
|
||||||
|
|
||||||
- Install either [.NET framework 4.5](https://www.microsoft.com/download/details.aspx?id=30653) (or later) or [KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework)
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Only applicable for Windows 7 SP1 Enterprise and Windows 7 SP1 Pro.
|
|
||||||
> Don't install .NET Framework 4.0.x, since it will negate the above installation.
|
|
||||||
|
|
||||||
- Meet the Azure Log Analytics agent minimum system requirements. For more information, see [Collect data from computers in you environment with Log Analytics](https://docs.microsoft.com/azure/log-analytics/log-analytics-concept-hybrid#prerequisites)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
1. Download the agent setup file: [Windows 64-bit agent](https://go.microsoft.com/fwlink/?LinkId=828603) or [Windows 32-bit agent](https://go.microsoft.com/fwlink/?LinkId=828604).
|
|
||||||
|
|
||||||
2. Obtain the workspace ID:
|
|
||||||
- In the Defender for Endpoint navigation pane, select **Settings > Device management > Onboarding**
|
|
||||||
- Select **Windows 7 SP1 and 8.1** as the operating system
|
|
||||||
- Copy the workspace ID and workspace key
|
|
||||||
|
|
||||||
3. Using the Workspace ID and Workspace key choose any of the following installation methods to install the agent:
|
|
||||||
- [Manually install the agent using setup](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-setup-wizard). <br>
|
|
||||||
On the **Agent Setup Options** page, select **Connect the agent to Azure Log Analytics (OMS)**
|
|
||||||
- [Install the agent using the command line](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-command-line).
|
|
||||||
- [Configure the agent using a script](https://docs.microsoft.com/azure/log-analytics/log-analytics-windows-agents#install-agent-using-dsc-in-azure-automation).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you are a [US Government customer](gov.md), under "Azure Cloud" you'll need to choose "Azure US Government" if using the setup wizard, or if using a command line or a script - set the "OPINSIGHTS_WORKSPACE_AZURE_CLOUD_TYPE" parameter to 1.
|
|
||||||
|
|
||||||
4. If you're using a proxy to connect to the Internet see the Configure proxy settings section.
|
|
||||||
|
|
||||||
Once completed, you should see onboarded endpoints in the portal within an hour.
|
|
||||||
|
|
||||||
### Configure proxy and Internet connectivity settings
|
|
||||||
|
|
||||||
- Each Windows endpoint must be able to connect to the Internet using HTTPS. This connection can be direct, using a proxy, or through the [OMS Gateway](https://docs.microsoft.com/azure/log-analytics/log-analytics-oms-gateway).
|
|
||||||
- If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that you [enable access to Defender for Endpoint service URLs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-proxy-internet#enable-access-to-microsoft-defender-atp-service-urls-in-the-proxy-server).
|
|
||||||
|
|
||||||
## Offboard client endpoints
|
|
||||||
To offboard, you can uninstall the MMA agent from the endpoint or detach it from reporting to your Defender for Endpoint workspace. After offboarding the agent, the endpoint will no longer send sensor data to Defender for Endpoint.
|
|
||||||
|
|
||||||
> Want to experience Defender for Endpoint? [Sign up for a free trial](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-downlevele-belowfoldlink).
|
|
||||||
|
|
@ -1,253 +0,0 @@
|
|||||||
---
|
|
||||||
title: Set up Microsoft Defender ATP deployment
|
|
||||||
description: Learn how to setup the deployment for Microsoft Defender ATP
|
|
||||||
keywords: deploy, setup, licensing validation, tenant configuration, network configuration
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- M365-security-compliance
|
|
||||||
- m365solution-endpointprotect
|
|
||||||
- m365solution-scenario
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Set up Microsoft Defender for Endpoint deployment
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
Deploying Defender for Endpoint is a three-phase process:
|
|
||||||
|
|
||||||
| [](prepare-deployment.md)<br>[Phase 1: Prepare](prepare-deployment.md) | <br>Phase 2: Setup | [](onboarding.md)<br>[Phase 3: Onboard](onboarding.md) |
|
|
||||||
| ----- | ----- | ----- |
|
|
||||||
| | *You are here!*||
|
|
||||||
|
|
||||||
You are currently in the set-up phase.
|
|
||||||
|
|
||||||
In this deployment scenario, you'll be guided through the steps on:
|
|
||||||
- Licensing validation
|
|
||||||
- Tenant configuration
|
|
||||||
- Network configuration
|
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>For the purpose of guiding you through a typical deployment, this scenario will only cover the use of Microsoft Endpoint Configuration Manager. Defender for Endpoint supports the use of other onboarding tools but will not cover those scenarios in the deployment guide. For more information, see [Onboard devices to Microsoft Defender for Endpoint](onboard-configure.md).
|
|
||||||
|
|
||||||
## Check license state
|
|
||||||
|
|
||||||
Checking for the license state and whether it got properly provisioned, can be done through the admin center or through the **Microsoft Azure portal**.
|
|
||||||
|
|
||||||
1. To view your licenses, go to the **Microsoft Azure portal** and navigate to the [Microsoft Azure portal license section](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products).
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
1. Alternately, in the admin center, navigate to **Billing** > **Subscriptions**.
|
|
||||||
|
|
||||||
On the screen, you will see all the provisioned licenses and their current **Status**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
## Cloud Service Provider validation
|
|
||||||
|
|
||||||
To gain access into which licenses are provisioned to your company, and to check the state of the licenses, go to the admin center.
|
|
||||||
|
|
||||||
1. From the **Partner portal**, select **Administer services > Office 365**.
|
|
||||||
|
|
||||||
2. Clicking on the **Partner portal** link will open the **Admin on behalf** option and will give you access to the customer admin center.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Tenant Configuration
|
|
||||||
|
|
||||||
When accessing Microsoft Defender Security Center for the first time, a wizard that will guide you through some initial steps. At the end of the setup wizard, there will be a dedicated cloud instance of Defender for Endpoint created. The easiest method is to perform these steps from a Windows 10 client device.
|
|
||||||
|
|
||||||
1. From a web browser, navigate to <https://securitycenter.windows.com>.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. If going through a TRIAL license, go to the link (<https://signup.microsoft.com/Signup?OfferId=6033e4b5-c320-4008-a936-909c2825d83c&dl=WIN_DEF_ATP&pc=xxxxxxx-xxxxxx-xxx-x>)
|
|
||||||
|
|
||||||
Once the authorization step is completed, the **Welcome** screen will be displayed.
|
|
||||||
3. Go through the authorization steps.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Set up preferences.
|
|
||||||
|
|
||||||
**Data storage location** - It's important to set this up correctly. Determine where the customer wants to be primarily hosted: US, EU, or UK. You cannot change the location after this set up and Microsoft will not transfer the data from the specified geolocation.
|
|
||||||
|
|
||||||
**Data retention** - The default is six months.
|
|
||||||
|
|
||||||
**Enable preview features** - The default is on, can be changed later.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Select **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Select **Continue**.
|
|
||||||
|
|
||||||
|
|
||||||
## Network configuration
|
|
||||||
If the organization does not require the endpoints to use a Proxy to access the
|
|
||||||
Internet, skip this section.
|
|
||||||
|
|
||||||
The Microsoft Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to
|
|
||||||
report sensor data and communicate with the Microsoft Defender for Endpoint service. The
|
|
||||||
embedded Microsoft Defender for Endpoint sensor runs in the system context using the
|
|
||||||
LocalSystem account. The sensor uses Microsoft Windows HTTP Services (WinHTTP)
|
|
||||||
to enable communication with the Microsoft Defender for Endpoint cloud service. The
|
|
||||||
WinHTTP configuration setting is independent of the Windows Internet (WinINet)
|
|
||||||
internet browsing proxy settings and can only discover a proxy server by using
|
|
||||||
the following discovery methods:
|
|
||||||
|
|
||||||
**Autodiscovery methods:**
|
|
||||||
|
|
||||||
- Transparent proxy
|
|
||||||
|
|
||||||
- Web Proxy Autodiscovery Protocol (WPAD)
|
|
||||||
|
|
||||||
If a Transparent proxy or WPAD has been implemented in the network topology,
|
|
||||||
there is no need for special configuration settings. For more information on
|
|
||||||
Microsoft Defender for Endpoint URL exclusions in the proxy, see the
|
|
||||||
Appendix section in this document for the URLs allow list or on
|
|
||||||
[Microsoft
|
|
||||||
Docs](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> For a detailed list of URLs that need to be allowed, please see [this article](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
**Manual static proxy configuration:**
|
|
||||||
|
|
||||||
- Registry-based configuration
|
|
||||||
|
|
||||||
- WinHTTP configured using netsh command <br> Suitable only for desktops in a
|
|
||||||
stable topology (for example: a desktop in a corporate network behind the
|
|
||||||
same proxy)
|
|
||||||
|
|
||||||
### Configure the proxy server manually using a registry-based static proxy
|
|
||||||
|
|
||||||
Configure a registry-based static proxy to allow only Microsoft Defender for Endpoint
|
|
||||||
sensor to report diagnostic data and communicate with Microsoft Defender for Endpoint
|
|
||||||
services if a computer is not permitted to connect to the Internet. The static
|
|
||||||
proxy is configurable through Group Policy (GP). The group policy can be found
|
|
||||||
under:
|
|
||||||
|
|
||||||
- Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service
|
|
||||||
- Set it to **Enabled** and select **Disable Authenticated Proxy usage**
|
|
||||||
|
|
||||||
1. Open the Group Policy Management Console.
|
|
||||||
2. Create a policy or edit an existing policy based off the organizational practices.
|
|
||||||
3. Edit the Group Policy and navigate to **Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service**.
|
|
||||||

|
|
||||||
|
|
||||||
4. Select **Enabled**.
|
|
||||||
5. Select **Disable Authenticated Proxy usage**.
|
|
||||||
|
|
||||||
6. Navigate to **Administrative Templates \> Windows Components \> Data Collection and Preview Builds \> Configure connected user experiences and telemetry**.
|
|
||||||

|
|
||||||
7. Select **Enabled**.
|
|
||||||
8. Enter the **Proxy Server Name**.
|
|
||||||
|
|
||||||
The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DataCollection`.
|
|
||||||
|
|
||||||
The registry value `TelemetryProxyServer` takes the following string format:
|
|
||||||
|
|
||||||
```text
|
|
||||||
<server name or ip>:<port>
|
|
||||||
```
|
|
||||||
|
|
||||||
For example: 10.0.0.6:8080
|
|
||||||
|
|
||||||
The registry value `DisableEnterpriseAuthProxy` should be set to 1.
|
|
||||||
|
|
||||||
### Configure the proxy server manually using netsh command
|
|
||||||
|
|
||||||
Use netsh to configure a system-wide static proxy.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> - This will affect all applications including Windows services which use WinHTTP with default proxy.</br>
|
|
||||||
> - Laptops that are changing topology (for example: from office to home) will malfunction with netsh. Use the registry-based static proxy configuration.
|
|
||||||
|
|
||||||
1. Open an elevated command line:
|
|
||||||
|
|
||||||
1. Go to **Start** and type **cmd**.
|
|
||||||
|
|
||||||
1. Right-click **Command prompt** and select **Run as administrator**.
|
|
||||||
|
|
||||||
2. Enter the following command and press **Enter**:
|
|
||||||
|
|
||||||
```PowerShell
|
|
||||||
netsh winhttp set proxy <proxy>:<port>
|
|
||||||
```
|
|
||||||
|
|
||||||
For example: netsh winhttp set proxy 10.0.0.6:8080
|
|
||||||
|
|
||||||
|
|
||||||
### Proxy Configuration for down-level devices
|
|
||||||
|
|
||||||
Down-Level devices include Windows 7 SP1 and Windows 8.1 workstations as well
|
|
||||||
as Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and
|
|
||||||
versions of Windows Server 2016 prior to Windows Server CB 1803. These operating
|
|
||||||
systems will have the proxy configured as part of the Microsoft Management Agent
|
|
||||||
to handle communication from the endpoint to Azure. Refer to the
|
|
||||||
Microsoft Management Agent Fast Deployment Guide for information on how a proxy
|
|
||||||
is configured on these devices.
|
|
||||||
|
|
||||||
### Proxy Service URLs
|
|
||||||
URLs that include v20 in them are only needed if you have Windows 10, version
|
|
||||||
1803 or later devices. For example, ```us-v20.events.data.microsoft.com``` is only
|
|
||||||
needed if the device is on Windows 10, version 1803 or later.
|
|
||||||
|
|
||||||
|
|
||||||
If a proxy or firewall is blocking anonymous traffic, as Microsoft Defender for Endpoint sensor is connecting from system context, make sure anonymous traffic is permitted in the listed URLs.
|
|
||||||
|
|
||||||
The following downloadable spreadsheet lists the services and their associated URLs that your network must be able to connect to. Ensure that there are no firewall or network filtering rules that would deny access to these URLs, or you may need to create an *allow* rule specifically for them.
|
|
||||||
|
|
||||||
|**Spreadsheet of domains list**|**Description**|
|
|
||||||
|:-----|:-----|
|
|
||||||
|<br/> | Spreadsheet of specific DNS records for service locations, geographic locations, and OS. <br><br>[Download the spreadsheet here.](https://download.microsoft.com/download/8/a/5/8a51eee5-cd02-431c-9d78-a58b7f77c070/mde-urls.xlsx)
|
|
||||||
|
|
||||||
|
|
||||||
### Microsoft Defender for Endpoint service backend IP range
|
|
||||||
|
|
||||||
If you network devices don't support the URLs listed in the prior section, you can use the following information.
|
|
||||||
|
|
||||||
Defender for Endpoint is built on Azure cloud, deployed in the following regions:
|
|
||||||
|
|
||||||
- \+\<Region Name="uswestcentral">
|
|
||||||
- \+\<Region Name="useast2">
|
|
||||||
- \+\<Region Name="useast">
|
|
||||||
- \+\<Region Name="europenorth">
|
|
||||||
- \+\<Region Name="europewest">
|
|
||||||
- \+\<Region Name="uksouth">
|
|
||||||
- \+\<Region Name="ukwest">
|
|
||||||
|
|
||||||
You can find the Azure IP range on [Microsoft Azure Datacenter IP Ranges](https://www.microsoft.com/en-us/download/details.aspx?id=41653).
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> As a cloud-based solution, the IP address range can change. It's recommended you move to DNS resolving setting.
|
|
||||||
|
|
||||||
## Next step
|
|
||||||
|
|
||||||
 <br>[Phase 3: Onboard](onboarding.md): Onboard devices to the service so that the Microsoft Defender for Endpoint service can get sensor data from them.
|
|
@ -1,77 +0,0 @@
|
|||||||
---
|
|
||||||
title: Use role-based access control to grant fine-grained access to Microsoft Defender Security Center
|
|
||||||
description: Create roles and groups within your security operations to grant access to the portal.
|
|
||||||
keywords: rbac, role, based, access, control, groups, control, tier, aad
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: macapara
|
|
||||||
author: mjcaparas
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Manage portal access using role-based access control
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- Azure Active Directory
|
|
||||||
- Office 365
|
|
||||||
|
|
||||||
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-rbac-abovefoldlink)
|
|
||||||
|
|
||||||
Using role-based access control (RBAC), you can create roles and groups within your security operations team to grant appropriate access to the portal. Based on the roles and groups you create, you have fine-grained control over what users with access to the portal can see and do.
|
|
||||||
|
|
||||||
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4bJ2a]
|
|
||||||
|
|
||||||
Large geo-distributed security operations teams typically adopt a tier-based model to assign and authorize access to security portals. Typical tiers include the following three levels:
|
|
||||||
|
|
||||||
Tier | Description
|
|
||||||
:---|:---
|
|
||||||
Tier 1 | **Local security operations team / IT team** <br> This team usually triages and investigates alerts contained within their geolocation and escalates to Tier 2 in cases where an active remediation is required.
|
|
||||||
Tier 2 | **Regional security operations team** <br> This team can see all the devices for their region and perform remediation actions.
|
|
||||||
Tier 3 | **Global security operations team** <br> This team consists of security experts and are authorized to see and perform all actions from the portal.
|
|
||||||
|
|
||||||
Defender for Endpoint RBAC is designed to support your tier- or role-based model of choice and gives you granular control over what roles can see, devices they can access, and actions they can take. The RBAC framework is centered around the following controls:
|
|
||||||
|
|
||||||
- **Control who can take specific action**
|
|
||||||
- Create custom roles and control what Defender for Endpoint capabilities they can access with granularity.
|
|
||||||
|
|
||||||
- **Control who can see information on specific device group or groups**
|
|
||||||
- [Create device groups](machine-groups.md) by specific criteria such as names, tags, domains, and others, then grant role access to them using a specific Azure Active Directory (Azure AD) user group.
|
|
||||||
|
|
||||||
To implement role-based access, you'll need to define admin roles, assign corresponding permissions, and assign Azure AD user groups assigned to the roles.
|
|
||||||
|
|
||||||
|
|
||||||
### Before you begin
|
|
||||||
Before using RBAC, it's important that you understand the roles that can grant permissions and the consequences of turning on RBAC.
|
|
||||||
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> Before enabling the feature, it's important that you have a Global Administrator role or Security Administrator role in Azure AD and that you have your Azure AD groups ready to reduce the risk of being locked out of the portal.
|
|
||||||
|
|
||||||
When you first log in to Microsoft Defender Security Center, you're granted either full access or read only access. Full access rights are granted to users with Security Administrator or Global Administrator roles in Azure AD. Read only access is granted to users with a Security Reader role in Azure AD.
|
|
||||||
|
|
||||||
Someone with a Defender for Endpoint Global administrator role has unrestricted access to all devices, regardless of their device group association and the Azure AD user groups assignments
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> Initially, only those with Azure AD Global Administrator or Security Administrator rights will be able to create and assign roles in Microsoft Defender Security Center, therefore, having the right groups ready in Azure AD is important.
|
|
||||||
>
|
|
||||||
> **Turning on role-based access control will cause users with read-only permissions (for example, users assigned to Azure AD Security reader role) to lose access until they are assigned to a role.**
|
|
||||||
>
|
|
||||||
>Users with admin permissions are automatically assigned the default built-in Defender for Endpoint global administrator role with full permissions. After opting in to use RBAC, you can assign additional users that are not Azure AD Global or Security Administrators to the Defender for Endpoint global administrator role.
|
|
||||||
>
|
|
||||||
> After opting in to use RBAC, you cannot revert to the initial roles as when you first logged into the portal.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Related topic
|
|
||||||
- [Create and manage device groups in Microsoft Defender for Endpoint](machine-groups.md)
|
|
@ -1,240 +0,0 @@
|
|||||||
---
|
|
||||||
title: Switch to Microsoft Defender for Endpoint - Setup
|
|
||||||
description: This is phase 2, Setup, for switching to Microsoft Defender for Endpoint.
|
|
||||||
keywords: migration, windows defender advanced threat protection, atp, edr
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.technology: mde
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: deniseb
|
|
||||||
author: denisebmsft
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- M365-security-compliance
|
|
||||||
- m365solution-migratetomdatp
|
|
||||||
ms.topic: article
|
|
||||||
ms.custom: migrationguides
|
|
||||||
ms.date: 02/18/2021
|
|
||||||
ms.reviewer: jesquive, chventou, jonix, chriggs, owtho
|
|
||||||
---
|
|
||||||
|
|
||||||
# Switch to Microsoft Defender for Endpoint - Phase 2: Setup
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
|[](switch-to-microsoft-defender-prepare.md)<br/>[Phase 1: Prepare2](switch-to-microsoft-defender-prepare.md) |<br/>Phase 2: Set up |[](switch-to-microsoft-defender-onboard.md)<br/>[Phase 3: Onboard2](switch-to-microsoft-defender-onboard.md) |
|
|
||||||
|[](switch-to-microsoft-defender-prepare.md)<br/>[Phase 1: Prepare4](switch-to-microsoft-defender-prepare.md) |<br/>Phase 2: Set up |[](switch-to-microsoft-defender-onboard.md)<br/>[Phase 3: Onboard4](switch-to-microsoft-defender-onboard.md) |
|
|
||||||
|--|--|--|
|
|
||||||
||*You are here!* | |
|
|
||||||
|
|
||||||
|
|
||||||
**Welcome to the Setup phase of [switching to Microsoft Defender for Endpoint](switch-to-microsoft-defender-migration.md#the-migration-process)**. This phase includes the following steps:
|
|
||||||
1. [Enable Microsoft Defender Antivirus and confirm it's in passive mode](#enable-microsoft-defender-antivirus-and-confirm-its-in-passive-mode).
|
|
||||||
2. [Get updates for Microsoft Defender Antivirus](#get-updates-for-microsoft-defender-antivirus).
|
|
||||||
3. [Add Microsoft Defender for Endpoint to the exclusion list for your existing endpoint solution](#add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-your-existing-solution).
|
|
||||||
4. [Add your existing solution to the exclusion list for Microsoft Defender Antivirus](#add-your-existing-solution-to-the-exclusion-list-for-microsoft-defender-antivirus).
|
|
||||||
5. [Add your existing solution to the exclusion list for Microsoft Defender for Endpoint](#add-your-existing-solution-to-the-exclusion-list-for-microsoft-defender-for-endpoint).
|
|
||||||
6. [Set up your device groups, device collections, and organizational units](#set-up-your-device-groups-device-collections-and-organizational-units).
|
|
||||||
7. [Configure antimalware policies and real-time protection](#configure-antimalware-policies-and-real-time-protection).
|
|
||||||
|
|
||||||
## Enable Microsoft Defender Antivirus and confirm it's in passive mode
|
|
||||||
|
|
||||||
On certain versions of Windows, such as Windows Server, Microsoft Defender Antivirus might have been uninstalled or disabled when your McAfee solution was installed. This is because Microsoft Defender Antivirus does not enter passive or disabled mode when you install a third-party antivirus product, such as McAfee. (To learn more about this, see [Microsoft Defender Antivirus compatibility](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).)
|
|
||||||
|
|
||||||
This step of the migration process includes the following tasks:
|
|
||||||
- [Setting DisableAntiSpyware to false on Windows Server](#set-disableantispyware-to-false-on-windows-server)
|
|
||||||
- [Reinstalling Microsoft Defender Antivirus on Windows Server](#reinstall-microsoft-defender-antivirus-on-windows-server);
|
|
||||||
- [Setting Microsoft Defender Antivirus to passive mode on Windows Server](#set-microsoft-defender-antivirus-to-passive-mode-on-windows-server)
|
|
||||||
- [Enabling Microsoft Defender Antivirus on your Windows client devices](#enable-microsoft-defender-antivirus-on-your-windows-client-devices); and
|
|
||||||
- [Confirming that Microsoft Defender Antivirus is set to passive mode](#confirm-that-microsoft-defender-antivirus-is-in-passive-mode).
|
|
||||||
|
|
||||||
### Set DisableAntiSpyware to false on Windows Server
|
|
||||||
|
|
||||||
The [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware) registry key was used in the past to disable Microsoft Defender Antivirus, and deploy another antivirus product, such as McAfee. In general, you should not have this registry key on your Windows devices and endpoints; however, if you do have `DisableAntiSpyware` configured, here's how to set its value to false:
|
|
||||||
|
|
||||||
1. On your Windows Server device, open Registry Editor.
|
|
||||||
2. Navigate to `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`.
|
|
||||||
3. In that folder, look for a DWORD entry called **DisableAntiSpyware**.
|
|
||||||
- If you do not see that entry, you're all set.
|
|
||||||
- If you do see **DisableAntiSpyware**, proceed to step 4.
|
|
||||||
4. Right-click the DisableAntiSpyware DWORD, and then choose **Modify**.
|
|
||||||
5. Set the value to `0`. (This sets the registry key's value to *false*.)
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> To learn more about this registry key, see [DisableAntiSpyware](https://docs.microsoft.com/windows-hardware/customize/desktop/unattend/security-malware-windows-defender-disableantispyware).
|
|
||||||
|
|
||||||
### Reinstall Microsoft Defender Antivirus on Windows Server
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The following procedure applies only to endpoints or devices that are running the following versions of Windows:
|
|
||||||
> - Windows Server 2019
|
|
||||||
> - Windows Server, version 1803 (core-only mode)
|
|
||||||
> - Windows Server 2016
|
|
||||||
|
|
||||||
1. As a local administrator on the endpoint or device, open Windows PowerShell.
|
|
||||||
2. Run the following PowerShell cmdlets: <br/>
|
|
||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` <br/>
|
|
||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender` <br/>
|
|
||||||
> [!NOTE]
|
|
||||||
> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required.
|
|
||||||
> Example:<br/>
|
|
||||||
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`<br/>
|
|
||||||
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`<br/>
|
|
||||||
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet: <br/>
|
|
||||||
`Get-Service -Name windefend`
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Need help? See [Microsoft Defender Antivirus on Windows Server](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016).
|
|
||||||
|
|
||||||
### Set Microsoft Defender Antivirus to passive mode on Windows Server
|
|
||||||
|
|
||||||
Because your organization is still using your existing endpoint protection solution, you must set Microsoft Defender Antivirus to passive mode. That way, your existing solution and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
|
||||||
|
|
||||||
1. Open Registry Editor, and then navigate to <br/>
|
|
||||||
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
|
|
||||||
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
|
||||||
- Set the DWORD's value to **1**.
|
|
||||||
- Under **Base**, select **Hexadecimal**.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You can use other methods to set the registry key, such as the following:
|
|
||||||
>- [Group Policy Preference](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn581922(v=ws.11))
|
|
||||||
>- [Local Group Policy Object tool](https://docs.microsoft.com/windows/security/threat-protection/security-compliance-toolkit-10#what-is-the-local-group-policy-object-lgpo-tool)
|
|
||||||
>- [A package in Configuration Manager](https://docs.microsoft.com/mem/configmgr/apps/deploy-use/packages-and-programs)
|
|
||||||
|
|
||||||
### Enable Microsoft Defender Antivirus on your Windows client devices
|
|
||||||
|
|
||||||
Because your organization has been using a non-Microsoft antivirus solution, Microsoft Defender Antivirus is most likely disabled on your organization's Windows devices. This step of the migration process involves enabling Microsoft Defender Antivirus.
|
|
||||||
|
|
||||||
To enable Microsoft Defender Antivirus, we recommend using Intune. However, you can any of the methods that are listed in the following table:
|
|
||||||
|
|
||||||
|Method |What to do |
|
|
||||||
|---------|---------|
|
|
||||||
|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) <br/>**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.<br/>2. Select **Devices** > **Configuration profiles**, and then select the profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).<br/>3. Select **Properties**, and then select **Configuration settings: Edit**.<br/>4. Expand **Microsoft Defender Antivirus**. <br/>5. Enable **Cloud-delivered protection**.<br/>6. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.<br/>7. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.<br/>8. Select **Review + save**, and then choose **Save**.<br/>**TIP**: For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles).|
|
|
||||||
|Control Panel in Windows |Follow the guidance here: [Turn on Microsoft Defender Antivirus](https://docs.microsoft.com/mem/intune/user-help/turn-on-defender-windows). <br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. |
|
|
||||||
|[Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm/) <br/>or<br/>[Group Policy Management Console](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus) |1. Go to `Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus`. <br/>2. Look for a policy called **Turn off Microsoft Defender Antivirus**.<br/>3. Choose **Edit policy setting**, and make sure that policy is disabled. This enables Microsoft Defender Antivirus. <br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. |
|
|
||||||
|
|
||||||
### Confirm that Microsoft Defender Antivirus is in passive mode
|
|
||||||
|
|
||||||
Microsoft Defender Antivirus can run alongside your existing endpoint protection solution if you set Microsoft Defender Antivirus to passive mode. You can use either Command Prompt or PowerShell to perform this task, as described in the following table:
|
|
||||||
|
|
||||||
|Method |What to do |
|
|
||||||
|---------|---------|
|
|
||||||
|Command Prompt |1. On a Windows device, open Command Prompt as an administrator. <br/>2. Type `sc query windefend`, and then press Enter.<br/>3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode. |
|
|
||||||
|PowerShell |1. On a Windows device, open Windows PowerShell as an administrator.<br/>2. Run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/Get-MpComputerStatus) cmdlet. <br/>3. In the list of results, look for either **AMRunningMode: Passive Mode** or **AMRunningMode: SxS Passive Mode**. |
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.
|
|
||||||
|
|
||||||
## Get updates for Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques, even if Microsoft Defender Antivirus is running in [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
|
|
||||||
|
|
||||||
There are two types of updates related to keeping Microsoft Defender Antivirus up to date:
|
|
||||||
- Security intelligence updates
|
|
||||||
- Product updates
|
|
||||||
|
|
||||||
To get your updates, follow the guidance in [Manage Microsoft Defender Antivirus updates and apply baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
## Add Microsoft Defender for Endpoint to the exclusion list for your existing solution
|
|
||||||
|
|
||||||
This step of the setup process involves adding Microsoft Defender for Endpoint to the exclusion list for your existing endpoint protection solution and any other security products your organization is using.
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> To get help configuring exclusions, refer to your solution provider's documentation.
|
|
||||||
|
|
||||||
The specific exclusions to configure depend on which version of Windows your endpoints or devices are running, and are listed in the following table:
|
|
||||||
|
|
||||||
|OS |Exclusions |
|
|
||||||
|--|--|
|
|
||||||
|- Windows 10, [version 1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later (See [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information))<br/>- Windows 10, version 1703 or [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709) with [KB4493441](https://support.microsoft.com/help/4493441) installed <br/>- [Windows Server 2019](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019)<br/>- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`<br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`<br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`<br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`<br/> |
|
|
||||||
|- [Windows 8.1](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2) <br/>- [Windows 7](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)<br/>- [Windows Server 2016](https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/>- [Windows Server 2012 R2](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/>- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`<br/>**NOTE**: Where Monitoring Host Temporary Files 6\45 can be different numbered subfolders.<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` |
|
|
||||||
|
|
||||||
## Add your existing solution to the exclusion list for Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
During this step of the setup process, you add your existing solution to the Microsoft Defender Antivirus exclusion list.
|
|
||||||
|
|
||||||
When you add [exclusions to Microsoft Defender Antivirus scans](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions. Keep the following points in mind:
|
|
||||||
- Path exclusions exclude specific files and whatever those files access.
|
|
||||||
- Process exclusions exclude whatever a process touches, but does not exclude the process itself.
|
|
||||||
- If you list each executable (.exe) as both a path exclusion and a process exclusion, the process and whatever it touches are excluded.
|
|
||||||
- List your process exclusions using their full path and not by their name only. (The name-only method is less secure.)
|
|
||||||
|
|
||||||
You can choose from several methods to add your exclusions to Microsoft Defender Antivirus, as listed in the following table:
|
|
||||||
|
|
||||||
|Method | What to do|
|
|
||||||
|--|--|
|
|
||||||
|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) <br/>**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.<br/>2. Select **Devices** > **Configuration profiles**, and then select the profile that you want to configure.<br/>3. Under **Manage**, select **Properties**. <br/>4. Select **Configuration settings: Edit**.<br/>5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.<br/>6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).<br/>7. Choose **Review + save**, and then choose **Save**. |
|
|
||||||
|[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/) |1. Using the [Configuration Manager console](https://docs.microsoft.com/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** > **Endpoint Protection** > **Antimalware Policies**, and then select the policy that you want to modify. <br/>2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. |
|
|
||||||
|[Group Policy Object](https://docs.microsoft.com/previous-versions/windows/desktop/Policy/group-policy-objects) | 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.<br/>2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.<br/>3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Exclusions**.<br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.<br/>4. Double-click the **Path Exclusions** setting and add the exclusions.<br/>- Set the option to **Enabled**.<br/>- Under the **Options** section, click **Show...**.<br/>- Specify each folder on its own line under the **Value name** column.<br/>- If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.<br/>5. Click **OK**.<br/>6. Double-click the **Extension Exclusions** setting and add the exclusions.<br/>- Set the option to **Enabled**.<br/>- Under the **Options** section, click **Show...**.<br/>- Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.<br/>7. Click **OK**. |
|
|
||||||
|Local group policy object |1. On the endpoint or device, open the Local Group Policy Editor. <br/>2. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Exclusions**. <br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.<br/>3. Specify your path and process exclusions. |
|
|
||||||
|Registry key |1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.<br/>2. Import the registry key. Here are two examples:<br/>- Local path: `regedit.exe /s c:\temp\ MDAV_Exclusion.reg` <br/>- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg` |
|
|
||||||
|
|
||||||
## Add your existing solution to the exclusion list for Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
To add exclusions to Microsoft Defender for Endpoint, you create [indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators#create-indicators-for-files).
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)) and sign in.
|
|
||||||
2. In the navigation pane, choose **Settings** > **Rules** > **Indicators**.
|
|
||||||
3. On the **File hashes** tab, choose **Add indicator**.
|
|
||||||
4. On the **Indicator** tab, specify the following settings:
|
|
||||||
- File hash (Need help? See [Find a file hash using CMPivot](#find-a-file-hash-using-cmpivot) in this article.)
|
|
||||||
- Under **Expires on (UTC)**, choose **Never**.
|
|
||||||
5. On the **Action** tab, specify the following settings:
|
|
||||||
- **Response Action**: **Allow**
|
|
||||||
- Title and description
|
|
||||||
6. On the **Scope** tab, under **Device groups**, select either **All devices in my scope** or **Select from list**.
|
|
||||||
7. On the **Summary** tab, review the settings, and then click **Save**.
|
|
||||||
|
|
||||||
### Find a file hash using CMPivot
|
|
||||||
|
|
||||||
CMPivot is an in-console utility for Configuration Manager. CMPivot provides access to the real-time state of devices in your environment. It immediately runs a query on all currently connected devices in the target collection and returns the results. To learn more, see [CMPivot overview](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot-overview).
|
|
||||||
|
|
||||||
To use CMPivot to get your file hash, follow these steps:
|
|
||||||
|
|
||||||
1. Review the [prerequisites](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#prerequisites).
|
|
||||||
2. [Start CMPivot](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#start-cmpivot).
|
|
||||||
3. Connect to Configuration Manager (`SCCM_ServerName.DomainName.com`).
|
|
||||||
4. Select the **Query** tab.
|
|
||||||
5. In the **Device Collection** list, and choose **All Systems (default)**.
|
|
||||||
6. In the query box, type the following query:<br/>
|
|
||||||
|
|
||||||
```kusto
|
|
||||||
File(c:\\windows\\notepad.exe)
|
|
||||||
| project Hash
|
|
||||||
```
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> In the query above, replace *notepad.exe* with the your third-party security product process name.
|
|
||||||
|
|
||||||
## Set up your device groups, device collections, and organizational units
|
|
||||||
|
|
||||||
| Collection type | What to do |
|
|
||||||
|--|--|
|
|
||||||
|[Device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groups) (formerly called machine groups) enable your security operations team to configure security capabilities, such as automated investigation and remediation.<br/> Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed. <br/>Device groups are created in the Microsoft Defender Security Center. |1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)).<br/>2. In the navigation pane on the left, choose **Settings** > **Permissions** > **Device groups**. <br/>3. Choose **+ Add device group**.<br/>4. Specify a name and description for the device group.<br/>5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated).<br/>6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags). <br/>7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group. <br/>8. Choose **Done**. |
|
|
||||||
|[Device collections](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization. <br/>Device collections are created by using [Configuration Manager](https://docs.microsoft.com/mem/configmgr/). |Follow the steps in [Create a collection](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create). |
|
|
||||||
|[Organizational units](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings.<br/> Organizational units are defined in [Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services). | Follow the steps in [Create an Organizational Unit in an Azure Active Directory Domain Services managed domain](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou). |
|
|
||||||
|
|
||||||
## Configure antimalware policies and real-time protection
|
|
||||||
|
|
||||||
Using Configuration Manager and your device collection(s), configure your antimalware policies.
|
|
||||||
- See [Create and deploy antimalware policies for Endpoint Protection in Configuration Manager](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies).
|
|
||||||
- While you create and configure your antimalware policies, make sure to review the [real-time protection settings](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) and [enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> You can deploy the policies before your organization's devices on onboarded.
|
|
||||||
|
|
||||||
## Next step
|
|
||||||
|
|
||||||
**Congratulations**! You have completed the Setup phase of [switching to Microsoft Defender for Endpoint](switch-to-microsoft-defender-migration.md#the-migration-process)!
|
|
||||||
|
|
||||||
- [Proceed to Phase 3: Onboard to Microsoft Defender for Endpoint](switch-to-microsoft-defender-onboard.md)
|
|
@ -1,227 +0,0 @@
|
|||||||
---
|
|
||||||
title: Symantec to Microsoft Defender for Endpoint - Phase 2, Setting Up
|
|
||||||
description: This is Phase 2, Setup, of migrating from Symantec to Microsoft Defender for Endpoint
|
|
||||||
keywords: migration, windows defender advanced threat protection, atp, edr
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.technology: mde
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: deniseb
|
|
||||||
author: denisebmsft
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- M365-security-compliance
|
|
||||||
- m365solution-symantecmigrate
|
|
||||||
ms.topic: article
|
|
||||||
ms.date: 02/18/2021
|
|
||||||
ms.custom: migrationguides
|
|
||||||
ms.reviewer: depicker, yongrhee, chriggs
|
|
||||||
---
|
|
||||||
|
|
||||||
# Migrate from Symantec - Phase 2: Set up Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
> Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink)
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
|
|
||||||
|[](symantec-to-microsoft-defender-atp-prepare.md)<br/>[Phase 1: Prepare](symantec-to-microsoft-defender-atp-prepare.md) |<br/>Phase 2: Set up |[](symantec-to-microsoft-defender-atp-onboard.md)<br/>[Phase 3: Onboard](symantec-to-microsoft-defender-atp-onboard.md) |
|
|
||||||
|--|--|--|
|
|
||||||
||*You are here!* | |
|
|
||||||
|
|
||||||
|
|
||||||
**Welcome to the Setup phase of [migrating from Symantec to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-migration.md#the-migration-process)**. This phase includes the following steps:
|
|
||||||
1. [Enable or reinstall Microsoft Defender Antivirus (for certain versions of Windows)](#enable-or-reinstall-microsoft-defender-antivirus-for-certain-versions-of-windows).
|
|
||||||
2. [Enable Microsoft Defender Antivirus](#enable-microsoft-defender-antivirus).
|
|
||||||
3. [Get updates for Microsoft Defender Antivirus](#get-updates-for-microsoft-defender-antivirus).
|
|
||||||
4. [Add Microsoft Defender for Endpoint to the exclusion list for Symantec](#add-microsoft-defender-for-endpoint-to-the-exclusion-list-for-symantec).
|
|
||||||
5. [Add Symantec to the exclusion list for Microsoft Defender Antivirus](#add-symantec-to-the-exclusion-list-for-microsoft-defender-antivirus).
|
|
||||||
6. [Add Symantec to the exclusion list for Microsoft Defender for Endpoint](#add-symantec-to-the-exclusion-list-for-microsoft-defender-for-endpoint).
|
|
||||||
7. [Set up your device groups, device collections, and organizational units](#set-up-your-device-groups-device-collections-and-organizational-units).
|
|
||||||
8. [Configure antimalware policies and real-time protection](#configure-antimalware-policies-and-real-time-protection).
|
|
||||||
|
|
||||||
## Enable or reinstall Microsoft Defender Antivirus (for certain versions of Windows)
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> If you're running Windows 10, you do not need to perform this task. Proceed to **[Enable Microsoft Defender Antivirus](#enable-microsoft-defender-antivirus)**.
|
|
||||||
|
|
||||||
On certain versions of Windows, Microsoft Defender Antivirus might have been uninstalled or disabled. This is because Microsoft Defender Antivirus does not enter passive or disabled mode when you install a third-party antivirus product, such as Symantec. To learn more, see [Microsoft Defender Antivirus compatibility](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
|
|
||||||
|
|
||||||
Now that you're moving from Symantec to Microsoft Defender for Endpoint, you'll need to enable or reinstall Microsoft Defender Antivirus, and set it to passive mode.
|
|
||||||
|
|
||||||
### Reinstall Microsoft Defender Antivirus on Windows Server
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> The following procedure applies only to endpoints or devices that are running the following versions of Windows:
|
|
||||||
> - Windows Server 2019
|
|
||||||
> - Windows Server, version 1803 (core-only mode)
|
|
||||||
> - Windows Server 2016
|
|
||||||
>
|
|
||||||
> Microsoft Defender Antivirus is built into Windows 10, but it might be disabled. In this case, proceed to [Enable Microsoft Defender Antivirus](#enable-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
1. As a local administrator on the endpoint or device, open Windows PowerShell.
|
|
||||||
2. Run the following PowerShell cmdlets:
|
|
||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features` <br/>
|
|
||||||
`Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> When using the DISM command within a task sequence running PS, the following path to cmd.exe is required.
|
|
||||||
> Example:<br/>
|
|
||||||
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender-Features`<br/>
|
|
||||||
> `c:\windows\sysnative\cmd.exe /c Dism /online /Get-FeatureInfo /FeatureName:Windows-Defender`<br/>
|
|
||||||
3. To verify Microsoft Defender Antivirus is running, use the following PowerShell cmdlet: <br/>
|
|
||||||
`Get-Service -Name windefend`
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Need help? See [Microsoft Defender Antivirus on Windows Server 2016 and 2019](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016).
|
|
||||||
|
|
||||||
### Set Microsoft Defender Antivirus to passive mode on Windows Server
|
|
||||||
|
|
||||||
Because your organization is still using Symantec, you must set Microsoft Defender Antivirus to passive mode. That way, Symantec and Microsoft Defender Antivirus can run side by side until you have finished onboarding to Microsoft Defender for Endpoint.
|
|
||||||
|
|
||||||
1. Open Registry Editor, and then navigate to <br/>
|
|
||||||
`Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
|
|
||||||
2. Edit (or create) a DWORD entry called **ForceDefenderPassiveMode**, and specify the following settings:
|
|
||||||
- Set the DWORD's value to **1**.
|
|
||||||
- Under **Base**, select **Hexadecimal**.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You can use other methods to set the registry key, such as the following:
|
|
||||||
>- [Group Policy Preference](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn581922(v=ws.11))
|
|
||||||
>- [Local Group Policy Object tool](https://docs.microsoft.com/windows/security/threat-protection/security-compliance-toolkit-10#what-is-the-local-group-policy-object-lgpo-tool)
|
|
||||||
>- [A package in Configuration Manager](https://docs.microsoft.com/mem/configmgr/apps/deploy-use/packages-and-programs)
|
|
||||||
|
|
||||||
## Enable Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
Because your organization has been using Symantec as your primary antivirus solution, Microsoft Defender Antivirus is most likely disabled on your organization's Windows devices. This step of the migration process involves enabling Microsoft Defender Antivirus.
|
|
||||||
|
|
||||||
To enable Microsoft Defender Antivirus, we recommend using Intune. However, you can any of the methods that are listed in the following table:
|
|
||||||
|
|
||||||
|Method |What to do |
|
|
||||||
|---------|---------|
|
|
||||||
|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) <br/>**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.<br/>2. Select **Devices** > **Configuration profiles**, and then select the profile type you want to configure. If you haven't yet created a **Device restrictions** profile type, or if you want to create a new one, see [Configure device restriction settings in Microsoft Intune](https://docs.microsoft.com/intune/device-restrictions-configure).<br/>3. Select **Properties**, and then select **Configuration settings: Edit**.<br/>4. Expand **Microsoft Defender Antivirus**. <br/>5. Enable **Cloud-delivered protection**.<br/>6. In the **Prompt users before sample submission** dropdown, select **Send all samples automatically**.<br/>7. In the **Detect potentially unwanted applications** dropdown, select **Enable** or **Audit**.<br/>8. Select **Review + save**, and then choose **Save**.<br/>For more information about Intune device profiles, including how to create and configure their settings, see [What are Microsoft Intune device profiles?](https://docs.microsoft.com/intune/device-profiles).|
|
|
||||||
|Control Panel in Windows |Follow the guidance here: [Turn on Microsoft Defender Antivirus](https://docs.microsoft.com/mem/intune/user-help/turn-on-defender-windows). <br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. |
|
|
||||||
|[Advanced Group Policy Management](https://docs.microsoft.com/microsoft-desktop-optimization-pack/agpm/) <br/>or<br/>[Group Policy Management Console](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus) |1. Go to `Computer configuration > Administrative templates > Windows components > Microsoft Defender Antivirus`. <br/>2. Look for a policy called **Turn off Microsoft Defender Antivirus**.<br/>3. Choose **Edit policy setting**, and make sure that policy is disabled. This enables Microsoft Defender Antivirus. <br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows. |
|
|
||||||
|
|
||||||
### Verify that Microsoft Defender Antivirus is in passive mode
|
|
||||||
|
|
||||||
Microsoft Defender Antivirus can run alongside Symantec if you set Microsoft Defender Antivirus to passive mode. You can use either Command Prompt or PowerShell to perform this task, as described in the following table:
|
|
||||||
|
|
||||||
|Method |What to do |
|
|
||||||
|---------|---------|
|
|
||||||
|Command Prompt |1. On a Windows device, open Command Prompt as an administrator. <br/>2. Type `sc query windefend`, and then press Enter.<br/>3. Review the results to confirm that Microsoft Defender Antivirus is running in passive mode. |
|
|
||||||
|PowerShell |1. On a Windows device, open Windows PowerShell as an administrator.<br/>2. Run the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/Get-MpComputerStatus) cmdlet. <br/>3. In the list of results, look for either **AMRunningMode: Passive Mode** or **AMRunningMode: SxS Passive Mode**.|
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.
|
|
||||||
|
|
||||||
## Get updates for Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques, even if Microsoft Defender Antivirus is running in [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
|
|
||||||
|
|
||||||
There are two types of updates related to keeping Microsoft Defender Antivirus up to date:
|
|
||||||
- Security intelligence updates
|
|
||||||
- Product updates
|
|
||||||
|
|
||||||
To get your updates, follow the guidance in [Manage Microsoft Defender Antivirus updates and apply baselines](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
## Add Microsoft Defender for Endpoint to the exclusion list for Symantec
|
|
||||||
|
|
||||||
This step of the setup process involves adding Microsoft Defender for Endpoint to the exclusion list for Symantec and any other security products your organization is using. The specific exclusions to configure depend on which version of Windows your endpoints or devices are running, and are listed in the following table:
|
|
||||||
|
|
||||||
|OS |Exclusions |
|
|
||||||
|--|--|
|
|
||||||
|- Windows 10, [version 1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later (See [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information))<br/>- Windows 10, version 1703 or [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709) with [KB4493441](https://support.microsoft.com/help/4493441) installed <br/>- [Windows Server 2019](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019)<br/>- [Windows Server, version 1803](https://docs.microsoft.com/windows-server/get-started/whats-new-in-windows-server-1803) |`C:\Program Files\Windows Defender Advanced Threat Protection\MsSense.exe`<br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseCncProxy.exe`<br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseSampleUploader.exe`<br/>`C:\Program Files\Windows Defender Advanced Threat Protection\SenseIR.exe`<br/> |
|
|
||||||
|- [Windows 8.1](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2) <br/>- [Windows 7](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1)<br/>- [Windows Server 2016](https://docs.microsoft.com/windows/release-health/status-windows-10-1607-and-windows-server-2016)<br/>- [Windows Server 2012 R2](https://docs.microsoft.com/windows/release-health/status-windows-8.1-and-windows-server-2012-r2)<br/>- [Windows Server 2008 R2 SP1](https://docs.microsoft.com/windows/release-health/status-windows-7-and-windows-server-2008-r2-sp1) |`C:\Program Files\Microsoft Monitoring Agent\Agent\Health Service State\Monitoring Host Temporary Files 6\45\MsSenseS.exe`<br/>**NOTE**: Where Monitoring Host Temporary Files 6\45 can be different numbered subfolders.<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\AgentControlPanel.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HealthService.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\HSLockdown.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MOMPerfSnapshotHelper.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\MonitoringHost.exe`<br/>`C:\Program Files\Microsoft Monitoring Agent\Agent\TestCloudConnection.exe` |
|
|
||||||
|
|
||||||
## Add Symantec to the exclusion list for Microsoft Defender Antivirus
|
|
||||||
|
|
||||||
During this step of the setup process, you add Symantec and your other security solutions to the Microsoft Defender Antivirus exclusion list.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> To get an idea of which processes and services to exclude, see Broadcom's [Processes and services used by Endpoint Protection 14](https://knowledge.broadcom.com/external/article/170706/processes-and-services-used-by-endpoint.html).
|
|
||||||
|
|
||||||
When you add [exclusions to Microsoft Defender Antivirus scans](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus), you should add path and process exclusions. Keep the following points in mind:
|
|
||||||
- Path exclusions exclude specific files and whatever those files access.
|
|
||||||
- Process exclusions exclude whatever a process touches, but does not exclude the process itself.
|
|
||||||
- If you list each executable (.exe) as both a path exclusion and a process exclusion, the process and whatever it touches are excluded.
|
|
||||||
- List your process exclusions using their full path and not by their name only. (The name-only method is less secure.)
|
|
||||||
|
|
||||||
You can choose from several methods to add your exclusions to Microsoft Defender Antivirus, as listed in the following table:
|
|
||||||
|
|
||||||
|Method | What to do|
|
|
||||||
|--|--|
|
|
||||||
|[Intune](https://docs.microsoft.com/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager) <br/>**NOTE**: Intune is now Microsoft Endpoint Manager. |1. Go to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and sign in.<br/>2. Select **Devices** > **Configuration profiles**, and then select the profile that you want to configure.<br/>3. Under **Manage**, select **Properties**. <br/>4. Select **Configuration settings: Edit**.<br/>5. Expand **Microsoft Defender Antivirus**, and then expand **Microsoft Defender Antivirus Exclusions**.<br/>6. Specify the files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. For reference, see [Microsoft Defender Antivirus exclusions](https://docs.microsoft.com/mem/intune/configuration/device-restrictions-windows-10#microsoft-defender-antivirus-exclusions).<br/>7. Choose **Review + save**, and then choose **Save**. |
|
|
||||||
|[Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/mem/configmgr/) |1. Using the [Configuration Manager console](https://docs.microsoft.com/mem/configmgr/core/servers/manage/admin-console), go to **Assets and Compliance** > **Endpoint Protection** > **Antimalware Policies**, and then select the policy that you want to modify. <br/>2. Specify exclusion settings for files and folders, extensions, and processes to exclude from Microsoft Defender Antivirus scans. |
|
|
||||||
|[Group Policy Object](https://docs.microsoft.com/previous-versions/windows/desktop/Policy/group-policy-objects) | 1. On your Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.<br/>2. In the **Group Policy Management Editor**, go to **Computer configuration** and click **Administrative templates**.<br/>3. Expand the tree to **Windows components > Microsoft Defender Antivirus > Exclusions**.<br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.<br/>4. Double-click the **Path Exclusions** setting and add the exclusions.<br/>- Set the option to **Enabled**.<br/>- Under the **Options** section, click **Show...**.<br/>- Specify each folder on its own line under the **Value name** column.<br/>- If you specify a file, make sure to enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column.<br/>5. Click **OK**.<br/>6. Double-click the **Extension Exclusions** setting and add the exclusions.<br/>- Set the option to **Enabled**.<br/>- Under the **Options** section, click **Show...**.<br/>- Enter each file extension on its own line under the **Value name** column. Enter **0** in the **Value** column.<br/>7. Click **OK**. |
|
|
||||||
|Local group policy object |1. On the endpoint or device, open the Local Group Policy Editor. <br/>2. Go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Exclusions**. <br/>**NOTE**: You might see *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus* in some versions of Windows.<br/>3. Specify your path and process exclusions. |
|
|
||||||
|Registry key |1. Export the following registry key: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\exclusions`.<br/>2. Import the registry key. Here are two examples:<br/>- Local path: `regedit.exe /s c:\temp\ MDAV_Exclusion.reg` <br/>- Network share: `regedit.exe /s \\FileServer\ShareName\MDAV_Exclusion.reg` |
|
|
||||||
|
|
||||||
## Add Symantec to the exclusion list for Microsoft Defender for Endpoint
|
|
||||||
|
|
||||||
To add exclusions to Microsoft Defender for Endpoint, you create [indicators](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/manage-indicators#create-indicators-for-files).
|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)) and sign in.
|
|
||||||
2. In the navigation pane, choose **Settings** > **Rules** > **Indicators**.
|
|
||||||
3. On the **File hashes** tab, choose **Add indicator**.
|
|
||||||
4. On the **Indicator** tab, specify the following settings:
|
|
||||||
- File hash (Need help? See [Find a file hash using CMPivot](#find-a-file-hash-using-cmpivot) in this article.)
|
|
||||||
- Under **Expires on (UTC)**, choose **Never**.
|
|
||||||
5. On the **Action** tab, specify the following settings:
|
|
||||||
- **Response Action**: **Allow**
|
|
||||||
- Title and description
|
|
||||||
6. On the **Scope** tab, under **Device groups**, select either **All devices in my scope** or **Select from list**.
|
|
||||||
7. On the **Summary** tab, review the settings, and then click **Save**.
|
|
||||||
|
|
||||||
### Find a file hash using CMPivot
|
|
||||||
|
|
||||||
CMPivot is an in-console utility for Configuration Manager. CMPivot provides access to the real-time state of devices in your environment. It immediately runs a query on all currently connected devices in the target collection and returns the results. To learn more, see [CMPivot overview](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot-overview).
|
|
||||||
|
|
||||||
To use CMPivot to get your file hash, follow these steps:
|
|
||||||
|
|
||||||
1. Review the [prerequisites](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#prerequisites).
|
|
||||||
2. [Start CMPivot](https://docs.microsoft.com/mem/configmgr/core/servers/manage/cmpivot#start-cmpivot).
|
|
||||||
3. Connect to Configuration Manager (`SCCM_ServerName.DomainName.com`).
|
|
||||||
4. Select the **Query** tab.
|
|
||||||
5. In the **Device Collection** list, and choose **All Systems (default)**.
|
|
||||||
6. In the query box, type the following query:<br/>
|
|
||||||
```kusto
|
|
||||||
File(c:\\windows\\notepad.exe)
|
|
||||||
| project Hash
|
|
||||||
```
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> In the query above, replace *notepad.exe* with the your third-party security product process name.
|
|
||||||
|
|
||||||
|
|
||||||
## Set up your device groups, device collections, and organizational units
|
|
||||||
|
|
||||||
| Collection type | What to do |
|
|
||||||
|--|--|
|
|
||||||
|[Device groups](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-groups) (formerly called machine groups) enable your security operations team to configure security capabilities, such as automated investigation and remediation.<br/> Device groups are also useful for assigning access to those devices so that your security operations team can take remediation actions if needed. <br/>Device groups are created in the Microsoft Defender Security Center. |1. Go to the Microsoft Defender Security Center ([https://aka.ms/MDATPportal](https://aka.ms/MDATPportal)).<br/>2. In the navigation pane on the left, choose **Settings** > **Permissions** > **Device groups**. <br/>3. Choose **+ Add device group**.<br/>4. Specify a name and description for the device group.<br/>5. In the **Automation level** list, select an option. (We recommend **Full - remediate threats automatically**.) To learn more about the various automation levels, see [How threats are remediated](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/automated-investigations#how-threats-are-remediated).<br/>6. Specify conditions for a matching rule to determine which devices belong to the device group. For example, you can choose a domain, OS versions, or even use [device tags](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/machine-tags). <br/>7. On the **User access** tab, specify roles that should have access to the devices that are included in the device group. <br/>8. Choose **Done**. |
|
|
||||||
|[Device collections](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/introduction-to-collections) enable your security operations team to manage applications, deploy compliance settings, or install software updates on the devices in your organization. <br/>Device collections are created by using [Configuration Manager](https://docs.microsoft.com/mem/configmgr/). |Follow the steps in [Create a collection](https://docs.microsoft.com/mem/configmgr/core/clients/manage/collections/create-collections#bkmk_create). |
|
|
||||||
|[Organizational units](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou) enable you to logically group objects such as user accounts, service accounts, or computer accounts. You can then assign administrators to specific organizational units, and apply group policy to enforce targeted configuration settings.<br/> Organizational units are defined in [Azure Active Directory Domain Services](https://docs.microsoft.com/azure/active-directory-domain-services). | Follow the steps in [Create an Organizational Unit in an Azure Active Directory Domain Services managed domain](https://docs.microsoft.com/azure/active-directory-domain-services/create-ou). |
|
|
||||||
|
|
||||||
## Configure antimalware policies and real-time protection
|
|
||||||
|
|
||||||
Using Configuration Manager and your device collection(s), configure your antimalware policies.
|
|
||||||
|
|
||||||
- See [Create and deploy antimalware policies for Endpoint Protection in Configuration Manager](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies).
|
|
||||||
- While you create and configure your antimalware policies, make sure to review the [real-time protection settings](https://docs.microsoft.com/mem/configmgr/protect/deploy-use/endpoint-antimalware-policies#real-time-protection-settings) and [enable block at first sight](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus).
|
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> You can deploy the policies before your organization's devices on onboarded.
|
|
||||||
|
|
||||||
## Next step
|
|
||||||
|
|
||||||
**Congratulations**! You have completed the Setup phase of [migrating from Symantec to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-migration.md#the-migration-process)!
|
|
||||||
- [Proceed to Phase 3: Onboard to Microsoft Defender for Endpoint](symantec-to-microsoft-defender-atp-onboard.md)
|
|
@ -1,98 +0,0 @@
|
|||||||
---
|
|
||||||
title: Techniques in the device timeline
|
|
||||||
description: Understanding the device timeline in Microsoft Defender for Endpoint
|
|
||||||
keywords: device timeline, endpoint, MITRE, MITRE ATT&CK, techniques, tactics
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: maccruz
|
|
||||||
author: schmurky
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Techniques in the device timeline
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
|
||||||
|
|
||||||
|
|
||||||
You can gain more insight in an investigation by analyzing the events that happened on a specific device. First, select the device of interest from the [Devices list](machines-view-overview.md). On the device page, you can select the **Timeline** tab to view all the events that occurred on the device.
|
|
||||||
|
|
||||||
## Understand techniques in the timeline
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>Some information relates to a prereleased product feature in public preview which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
|
||||||
|
|
||||||
In Microsoft Defender for Endpoint, **Techniques** are an additional data type in the event timeline. Techniques provide more insight on activities associated with [MITRE ATT&CK](https://attack.mitre.org/) techniques or sub-techniques.
|
|
||||||
|
|
||||||
This feature simplifies the investigation experience by helping analysts understand the activities that were observed on a device. Analysts can then decide to investigate further.
|
|
||||||
|
|
||||||
For public preview, Techniques are available by default and shown together with events when a device's timeline is viewed.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Techniques are highlighted in bold text and appear with a blue icon on the left. The corresponding MITRE ATT&CK ID and technique name also appear as tags under Additional information.
|
|
||||||
|
|
||||||
Search and Export options are also available for Techniques.
|
|
||||||
|
|
||||||
## Investigate using the side pane
|
|
||||||
|
|
||||||
Select a Technique to open its corresponding side pane. Here you can see additional information and insights like related ATT&CK techniques, tactics, and descriptions.
|
|
||||||
|
|
||||||
Select the specific *Attack technique* to open the related ATT&CK technique page where you can find more information about it.
|
|
||||||
|
|
||||||
You can copy an entity's details when you see a blue icon on the right. For instance, to copy a related file's SHA1, select the blue page icon.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
You can do the same for command lines.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
## Investigate related events
|
|
||||||
|
|
||||||
To use [advanced hunting](advanced-hunting-overview.md) to find events related to the selected Technique, select **Hunt for related events**. This leads to the advanced hunting page with a query to find events related to the Technique.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Querying using the **Hunt for related events** button from a Technique side pane displays all the events related to the identified technique but does not include the Technique itself in the query results.
|
|
||||||
|
|
||||||
|
|
||||||
## Customize your device timeline
|
|
||||||
|
|
||||||
On the upper right-hand side of the device timeline, you can choose a date range to limit the number of events and techniques in the timeline.
|
|
||||||
|
|
||||||
You can customize which columns to expose. You can also filter for flagged events by data type or by event group.
|
|
||||||
|
|
||||||
### Choose columns to expose
|
|
||||||
You can choose which columns to expose in the timeline by selecting the **Choose columns** button.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
From there you can select which information set to include.
|
|
||||||
|
|
||||||
### Filter to view techniques or events only
|
|
||||||
|
|
||||||
To view only either events or techniques, select **Filters** from the device timeline and choose your preferred Data type to view.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## See also
|
|
||||||
- [View and organize the Devices list](machines-view-overview.md)
|
|
||||||
- [Microsoft Defender for Endpoint device timeline event flags](device-timeline-event-flag.md)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -1,80 +0,0 @@
|
|||||||
---
|
|
||||||
title: Hunt for exposed devices
|
|
||||||
description: Learn how threat and vulnerability management can be used to help security admins, IT admins, and SecOps collaborate.
|
|
||||||
keywords: mdatp-tvm scenarios, mdatp, tvm, tvm scenarios, reduce threat & vulnerability exposure, reduce threat and vulnerability, improve security configuration, increase Microsoft Secure Score for Devices, increase threat & vulnerability Microsoft Secure Score for Devices, Microsoft Secure Score for Devices, exposure score, security controls
|
|
||||||
search.product: eADQiWindows 10XVcnh
|
|
||||||
search.appverid: met150
|
|
||||||
ms.prod: m365-security
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.author: ellevin
|
|
||||||
author: levinec
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
manager: dansimp
|
|
||||||
audience: ITPro
|
|
||||||
ms.collection:
|
|
||||||
- m365-security-compliance
|
|
||||||
- m365initiative-defender-endpoint
|
|
||||||
ms.topic: article
|
|
||||||
ms.technology: mde
|
|
||||||
---
|
|
||||||
|
|
||||||
# Hunt for exposed devices - threat and vulnerability management
|
|
||||||
|
|
||||||
[!INCLUDE [Microsoft 365 Defender rebranding](../../includes/microsoft-defender.md)]
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/?linkid=2154037)
|
|
||||||
- [Threat and vulnerability management](next-gen-threat-and-vuln-mgt.md)
|
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
|
||||||
|
|
||||||
>Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
|
||||||
|
|
||||||
## Use advanced hunting to find devices with vulnerabilities
|
|
||||||
|
|
||||||
Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate threat indicators and entities. The flexible access to data enables unconstrained hunting for both known and potential threats. [Learn more about advanced hunting](advanced-hunting-overview.md)
|
|
||||||
|
|
||||||
### Schema tables
|
|
||||||
|
|
||||||
- [DeviceTvmSoftwareInventory](advanced-hunting-devicetvmsoftwareinventory-table.md) - Inventory of software installed on devices, including their version information and end-of-support status
|
|
||||||
|
|
||||||
- [DeviceTvmSoftwareVulnerabilities](advanced-hunting-devicetvmsoftwarevulnerabilities-table.md) - Software vulnerabilities found on devices and the list of available security updates that address each vulnerability
|
|
||||||
|
|
||||||
- [DeviceTvmSoftwareVulnerabilitiesKB](advanced-hunting-devicetvmsoftwarevulnerabilitieskb-table.md) - Knowledge base of publicly disclosed vulnerabilities, including whether exploit code is publicly available
|
|
||||||
|
|
||||||
- [DeviceTvmSecureConfigurationAssessment](advanced-hunting-devicetvmsecureconfigurationassessment-table.md) - Threat & Vulnerability Management assessment events, indicating the status of various security configurations on devices
|
|
||||||
|
|
||||||
- [DeviceTvmSecureConfigurationAssessmentKB](advanced-hunting-devicetvmsecureconfigurationassessmentkb-table.md) - Knowledge base of various security configurations used by Threat & Vulnerability Management to assess devices; includes mappings to various standards and benchmarks
|
|
||||||
|
|
||||||
## Check which devices are involved in high severity alerts
|
|
||||||
|
|
||||||
1. Go to **Advanced hunting** from the left-hand navigation pane of the Microsoft Defender Security Center.
|
|
||||||
|
|
||||||
2. Scroll down to the TVM advanced hunting schemas to familiarize yourself with the column names.
|
|
||||||
|
|
||||||
3. Enter the following queries:
|
|
||||||
|
|
||||||
```kusto
|
|
||||||
// Search for devices with High active alerts or Critical CVE public exploit
|
|
||||||
DeviceTvmSoftwareVulnerabilities
|
|
||||||
| join kind=inner(DeviceTvmSoftwareVulnerabilitiesKB) on CveId
|
|
||||||
| where IsExploitAvailable == 1 and CvssScore >= 7
|
|
||||||
| summarize NumOfVulnerabilities=dcount(CveId),
|
|
||||||
DeviceName=any(DeviceName) by DeviceId
|
|
||||||
| join kind =inner(DeviceAlertEvents) on DeviceId
|
|
||||||
| summarize NumOfVulnerabilities=any(NumOfVulnerabilities),
|
|
||||||
DeviceName=any(DeviceName) by DeviceId, AlertId
|
|
||||||
| project DeviceName, NumOfVulnerabilities, AlertId
|
|
||||||
| order by NumOfVulnerabilities desc
|
|
||||||
```
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
- [Threat and vulnerability management overview](next-gen-threat-and-vuln-mgt.md)
|
|
||||||
- [Security recommendations](tvm-security-recommendation.md)
|
|
||||||
- [APIs](next-gen-threat-and-vuln-mgt.md#apis)
|
|
||||||
- [Configure data access for threat and vulnerability management roles](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group)
|
|
||||||
- [Advanced hunting overview](overview-hunting.md)
|
|
||||||
- [All advanced hunting tables](advanced-hunting-reference.md)
|
|