diff --git a/defender-endpoint/device-control-deploy-manage-gpo.md b/defender-endpoint/device-control-deploy-manage-gpo.md index ca6b86b59f..baf6b833a7 100644 --- a/defender-endpoint/device-control-deploy-manage-gpo.md +++ b/defender-endpoint/device-control-deploy-manage-gpo.md @@ -4,7 +4,7 @@ description: Learn how to deploy and manage device control in Defender for Endpo author: siosulli ms.author: siosulli manager: deniseb -ms.date: 02/14/2024 +ms.date: 08/27/2024 ms.topic: overview ms.service: defender-endpoint ms.subservice: asr @@ -34,7 +34,7 @@ If you're using Group Policy to manage Defender for Endpoint settings, you can u :::image type="content" source="media/deploy-dc-gpo/enable-disable-rsac.png" alt-text="Screenshot of enable disable rsac." lightbox="media/deploy-dc-gpo/enable-disable-rsac.png"::: -1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Features** \> **Device Control**. +1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Features** > **Device Control**. 2. In the **Device Control** window, select **Enabled**. @@ -49,7 +49,7 @@ You can set default access such as, `Deny` or `Allow` for all device control fea For example, you can have either a `Deny` or an `Allow` policy for `RemovableMediaDevices`, but not for `CdRomDevices` or `WpdDevices`. If you set `Default Deny` through this policy, then Read/Write/Execute access to `CdRomDevices` or `WpdDevices` is blocked. If you only want to manage storage, make sure to create `Allow` policy for printers. Otherwise, default enforcement (Deny) is applied to printers, too. -1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Features** \> **Device Control** \> **Select Device Control Default Enforcement Policy**. +1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Features** > **Device Control** > **Select Device Control Default Enforcement Policy**. 2. In the **Select Device Control Default Enforcement Policy** window, select **Default Deny**. @@ -59,7 +59,7 @@ For example, you can have either a `Deny` or an `Allow` policy for `RemovableMed To configure the device types that a device control policy is applied, follow these steps: -1. On a computer running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Turn on device control for specific device types**. +1. On a computer running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Turn on device control for specific device types**. 2. In the **Turn on device control for specific types** window, specify the product family IDs, separate by a pipe (`|`). Product family IDs include `RemovableMediaDevices`, `CdRomDevices`, `WpdDevices`, or `PrinterDevices`. @@ -75,7 +75,7 @@ To configure the device types that a device control policy is applied, follow th 4. Define the settings as follows: - 1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define device control policy groups**. + 1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy groups**. 2. In the **Define device control policy groups** window, specify the network share file path containing the XML groups data. @@ -97,33 +97,15 @@ You can create different group types. Here's one group example XML file for any 4. Define the settings as follows: - 1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define device control policy rules**. + 1. On a device running Windows, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Device Control** > **Define device control policy rules**. 2. In the **Define device control policy rules** window, select **Enabled**, and then specify the network share file path containing the XML rules data. +> [!NOTE] +> To capture evidence of files being copied or printed, use [Endpoint DLP.](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview) > [!NOTE] > Comments using XML comment notation `` can be used in the Rule and Group XML files, but they must be inside the first XML tag, not the first line of the XML file. -## Set location for a copy of the file (evidence) - -:::image type="content" source="media/deploy-dc-gpo/set-loc-copy-file.png" alt-text="Screenshot of set location for a copy of the file." lightbox="media/deploy-dc-gpo/set-loc-copy-file.png"::: - -If you want to have a copy of the file (evidence) having Write access, set right **Options** in your removable storage access policy rule in the XML file, and then specify the location where system can save the copy. - -1. On a device running Windows, go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Define Device Control evidence data remote location**. - -2. In the **Define Device Control evidence data remote location** window, select **Enabled**, and then specify the local or network share folder path. - -## Retention period for local evidence cache - -:::image type="content" source="media/deploy-dc-gpo/retention-loc-cache.png" alt-text="Screenshot of retention period for local cache." lightbox="media/deploy-dc-gpo/retention-loc-cache.png"::: - -If you want to change the default value of 60 days for persisting the local cache for file evidence, follow these steps: - -1. Go to **Computer Configuration** \> **Administrative Templates** \> **Windows Components** \> **Microsoft Defender Antivirus** \> **Device Control** \> **Set the retention period for files in the local device control cache**. - -2. In the **Set the retention period for files in the local device control cache** window, select **Enabled**, and then enter the number of days to retain the local cache (default 60). - ## See also - [Device control in Defender for Endpoint](device-control-overview.md) diff --git a/defender-endpoint/device-control-overview.md b/defender-endpoint/device-control-overview.md index be4f7261df..ae1314c569 100644 --- a/defender-endpoint/device-control-overview.md +++ b/defender-endpoint/device-control-overview.md @@ -4,7 +4,7 @@ description: Get an overview of device control, including removable storage acce author: siosulli ms.author: siosulli manager: deniseb -ms.date: 05/15/2024 +ms.date: 08/27/2024 ms.topic: overview ms.service: defender-endpoint ms.subservice: asr @@ -62,7 +62,7 @@ Device control capabilities from Microsoft can be organized into three main cate - Device control in Microsoft Defender can be managed using Intune or [Group Policy](device-control-deploy-manage-gpo.md). - **Device control in Microsoft Defender and Intune**. Intune provides a rich experience for managing complex device control policies for organizations. You can configure and deploy device restriction settings in Defender for Endpoint, for example. See [Deploy and manage device control with Microsoft Intune](device-control-deploy-manage-intune.md). -- **Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about). +- **Endpoint data loss prevention** (Endpoint DLP). Endpoint DLP monitors sensitive information on devices that are onboarded to Microsoft Purview solutions. DLP policies can enforce protective actions on sensitive information and where it's stored or used. Endpoint DLP can capture file evidence. [Learn about Endpoint DLP](/purview/endpoint-dlp-learn-about). ## Common device control scenarios @@ -187,6 +187,10 @@ Device control can also restrict the types of files that are printed. Device con To block printing of documents based on information classification use [Endpoint DLP](/purview/endpoint-dlp-learn-about). +### Use Endpoint DLP to capture file evidence of printed files + +To capture evidence of a file being printed, use [Endpoint DLP](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview) + ## Control access to Bluetooth devices You can use device control to control access to Bluetooth services on Windows devices or by using Endpoint DLP. @@ -202,6 +206,10 @@ Administrators can control the behavior of the Bluetooth service (Allowing adver To block copying of sensitive document to any Bluetooth Device use [Endpoint DLP](/purview/endpoint-dlp-learn-about). +### Use Endpoint DLP to capture file evidence of files copied to USB + +To capture evidence of a file being copied to a USB, use [Endpoint DLP](/purview/dlp-copy-matched-items-get-started?tabs=purview-portal%2Cpurview) + ## Device control policy samples and scenarios Device control in Defender for Endpoint provides your security team with a robust access control model that enables a wide range of scenarios (see [Device control policies](device-control-policies.md)). We have put together a GitHub repository that contains samples and scenarios you can explore. See the following resources: diff --git a/defender-endpoint/device-control-policies.md b/defender-endpoint/device-control-policies.md index 98d2ae2e78..da22d597cf 100644 --- a/defender-endpoint/device-control-policies.md +++ b/defender-endpoint/device-control-policies.md @@ -4,7 +4,7 @@ description: Learn about Device control policies in Defender for Endpoint author: siosulli ms.author: siosulli manager: deniseb -ms.date: 06/04/2024 +ms.date: 08/27/2024 ms.topic: overview ms.service: defender-endpoint ms.subservice: asr @@ -194,9 +194,9 @@ Device control policies define access (called an entry) for a set of devices. En | Entry setting | Options | |---|---| -| AccessMask | Applies the action only if the access operations match the access mask - The access mask is the bit-wise OR of the access values:

1 - Device Read
2 - Device Write
4 - Device Execute
8 - File Read
16 - File Write
32 - File Execute
64 - Print

For example:
Device Read, Write, and Execute = 7 (1+2+4)
Device Read, Disk Read = 9 (1+8)
+| AccessMask | Applies the action only if the access operations match the access mask - The access mask is the bit-wise OR of the access values:

1 - Device Read
2 - Device Write
4 - Device Execute
8 - File Read
16 - File Write
32 - File Execute
64 - Print

For example:
Device Read, Write, and Execute = 7 (1+2+4)
Device Read, Disk Read = 9 (1+8)
| | Action | Allow
Deny
AuditAllow
AuditDeny | -| Notification | None (default)
An event is generated
The user receives notification
File evidence is captured | +| Notification | None (default)
An event is generated
The user receives notification
| If device control is configured, and a user attempts to use a device that's not allowed, the user gets a notification that contains the name of the device control policy and the name of the device. The notification appears once every hour after initial access is denied. @@ -254,7 +254,7 @@ The following table provides more context for the XML code snippet: |---|---|---| | `Entry Id` | GUID, a unique ID, represents the entry and is used in reporting and troubleshooting. | You can generate the GUID by using PowerShell. | | `Type` | Defines the action for the removable storage groups in `IncludedIDList`.
- `Allow`
- `Deny`
- `AuditAllowed`: Defines notification and event when access is allowed
- `AuditDenied`: Defines notification and event when access is denied; works together with a `Deny` entry.

When there are conflict types for the same media, the system applies the first one in the policy. An example of a conflict type is `Allow` and `Deny`. | - `Allow`
- `Deny`
- `AuditAllowed`
- `AuditDenied` | -| `Option` | If type is `Allow` | - `0`: nothing
- `4`: disable `AuditAllowed` and `AuditDenied` for this entry. If `Allow` occurs and the `AuditAllowed` setting is configured, events aren't generated.
- `8`: create a copy of the file as evidence, and generate a `RemovableStorageFileEvent` event. This setting must be used together with the **Set location for a copy of the file** setting in [Intune](device-control-deploy-manage-intune.md) or [Group Policy](device-control-deploy-manage-gpo.md). | +| `Option` | If type is `Allow` | - `0`: nothing
- `4`: disable `AuditAllowed` and `AuditDenied` for this entry. If `Allow` occurs and the `AuditAllowed` setting is configured, events aren't generated. | | `Option` | If type is `Deny` | - `0`: nothing
- `4`: disable `AuditDenied` for this Entry. If Block occurs and the `AuditDenied` is setting configured, the system doesn't show notifications. | | `Option` | If type is `AuditAllowed` | - `0`: nothing
- `1`: nothing
- `2`: send event | | `Option` | If type is `AuditDenied` | - `0`: nothing
- `1`: show notification
- `2`: send event
- `3`: show notification and send event | diff --git a/defender-endpoint/enable-troubleshooting-mode.md b/defender-endpoint/enable-troubleshooting-mode.md index 69badcb5d7..389a6c9803 100644 --- a/defender-endpoint/enable-troubleshooting-mode.md +++ b/defender-endpoint/enable-troubleshooting-mode.md @@ -15,7 +15,7 @@ ms.collection: - mde-ngp ms.topic: conceptual ms.subservice: ngp -ms.date: 09/25/2023 +ms.date: 08/27/2024 --- # Get started with troubleshooting mode in Microsoft Defender for Endpoint @@ -62,7 +62,9 @@ During troubleshooting mode, you can use the PowerShell command `Set-MPPreferenc - Logs and snapshots are collected and are available for an admin to collect using the [Collect investigation package](respond-machine-alerts.md#collect-investigation-package-from-devices) feature on the device page. Microsoft doesn't remove this data from the device until an admin has collected it. -- Admins can also review the changes in settings that take place during Troubleshooting mode in **Event Viewer** on the device page. +- Admins can also review the changes in settings that take place during troubleshooting mode in **Event Viewer** on the device itself. + - Open Event Viewer, and then expand **Applications and Services Logs** > **Microsoft** > **Windows** > **Windows Defender**, and then select **Operational**. + - Potential events can include events with IDs 5000, 5001, 5004, 5007 and others. See more details at [Review event logs and error codes to troubleshoot issues with Microsoft Defender Antivirus](troubleshoot-microsoft-defender-antivirus.yml#event-id-5000). - Troubleshooting mode automatically turns off after reaching the expiration time (it lasts for 4 hours). After expiration, all policy-managed configurations become read-only again and revert back to how the device was configured before enabling troubleshooting mode. @@ -81,19 +83,17 @@ During troubleshooting mode, you can use the PowerShell command `Set-MPPreferenc - A device running Windows 10 (version 19044.1618 or later), Windows 11, Windows Server 2019, or Windows Server 2022. - Semester/Redstone|OS version|Release - :---|:---|:--- - 21H2/SV1|>=22000.593|[KB5011563: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5019275) - 20H1/20H2/21H1|>=19042.1620
>=19041.1620
>=19043.1620|[KB5011543: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011543) - Windows Server 2022|>=20348.617|[KB5011558: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011558) - Windows Server 2019 (RS5)|>=17763.2746|[KB5011551: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011551) + |Semester/Redstone|OS version|Release| + |:---|:---|:---| + | 21H2/SV1|>=22000.593|[KB5011563: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5019275) | + | 20H1/20H2/21H1|>=19042.1620
>=19041.1620
>=19043.1620|[KB5011543: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011543) | + | Windows Server 2022|>=20348.617|[KB5011558: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011558) | + | Windows Server 2019 (RS5)|>=17763.2746|[KB5011551: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5011551) | - Troubleshooting mode is also available for machines running the modern, unified solution for Windows Server 2012 R2 and Windows Server 2016. Before you use troubleshooting mode, make sure all of the following components are up to date: - Sense version `10.8049.22439.1084` or later ([KB5005292: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB5005292)) - - Microsoft Defender Antivirus - Platform: `4.18.2207.7` or later ([KB4052623: Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Search.aspx?q=KB4052623)) - - Microsoft Defender Antivirus - Engine: `1.1.19500.2` or later ([KB2267602: Microsoft Update Catalog](https://www.microsoft.com/en-us/wdsi/defenderupdates)) - For troubleshooting mode to be applied, Microsoft Defender for Endpoint must be tenant-enrolled and active on the device. diff --git a/defender-endpoint/linux-support-offline-security-intelligence-update.md b/defender-endpoint/linux-support-offline-security-intelligence-update.md index d26d69553f..91f0ba0d33 100644 --- a/defender-endpoint/linux-support-offline-security-intelligence-update.md +++ b/defender-endpoint/linux-support-offline-security-intelligence-update.md @@ -15,7 +15,7 @@ ms.collection: - mde-linux ms.topic: conceptual search.appverid: met150 -ms.date: 07/22/2024 +ms.date: 08/27/2024 --- # Configure Offline Security Intelligence Update for Microsoft Defender for Endpoint on Linux @@ -30,9 +30,6 @@ ms.date: 07/22/2024 This document describes the Offline Security Intelligence Update feature of Microsoft Defender for Endpoint on Linux. -> [!IMPORTANT] -> Information in this article relates to a prerelease product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - This feature enables an organization to update the security intelligence (also referred to as definitions or signatures in this document) on Linux endpoints with limited or no exposure to the internet using a local hosting server (termed as *Mirror Server* in this document). Mirror Server is any server in the customer's environment that can connect to the Microsoft cloud to download the signatures. Other Linux endpoints pull the signatures from the Mirror Server at a predefined interval. @@ -45,7 +42,7 @@ Key benefits include: - Local server can run any of the three OS - Windows, Mac, Linux, and isn't required to install Defender for Endpoint. - Provides the most up to date antivirus protection as signatures are always downloaded along with the latest compatible AV engine. - In each iteration, signature with n-1 version is moved to a backup folder on the local server. If there's any issue with the latest signature, you can pull the n-1 signature version from the backup folder to your endpoints. -- On the rare occasion the offline update fails, you can also choose to fallback to online updates from Microsoft cloud(traditional method). +- On the rare occasion the offline update fails, you can also choose to fall back to online updates from Microsoft cloud(traditional method). ## How Offline Security Intelligence Update works diff --git a/defender-endpoint/mac-whatsnew.md b/defender-endpoint/mac-whatsnew.md index 54a8ecc2bb..8f2d3633d4 100644 --- a/defender-endpoint/mac-whatsnew.md +++ b/defender-endpoint/mac-whatsnew.md @@ -2,11 +2,11 @@ title: What's new in Microsoft Defender for Endpoint on Mac description: Learn about the major changes for previous versions of Microsoft Defender for Endpoint on Mac. ms.service: defender-endpoint -author: YongRhee-MSFT -ms.author: yongrhee +author: dansimp +ms.author: dansimp manager: deniseb ms.localizationpriority: medium -ms.date: 06/21/2024 +ms.date: 08/27/2024 audience: ITPro ms.collection: - m365-security @@ -53,7 +53,19 @@ Microsoft Defender for Endpoint no longer supports Big Sur (11) Behavior monitoring monitors process behavior to detect and analyze potential threats based on the behavior of the applications, daemons, and files within the system. As behavior monitoring observes how the software behaves in real-time, it can adapt quickly to new and evolving threats and block them. To learn more, see [Behavior Monitoring in Microsoft Defender for Endpoint on macOS](behavior-monitor-macos.md). -### Jul-2024 (Build: 101.24062.0009 | Release version: ) +### Aug-2024 (Build: 101.24072.0006 | Release version: 20.124072.6.0) + +| Build: | **101.24072.0006** | +|--------------------|-----------------------| +| Release version: | 20.124072.6.0 | +| Engine version: | 1.1.24060.7 | +| Signature version: | 1.417.325.0 | + +##### What's new + +- Bug and performance fixes + +### Jul-2024 (Build: 101.24062.0009 | Release version: 20.124062.9.0) | Build: | **101.24062.0009** | |--------------------|-----------------------|